Skip to main content
Erschienen in: The Journal of Supercomputing 9/2023

21.01.2023

RKMIS: robust key management protocol for industrial sensor network system

verfasst von: Samiulla Itoo, Musheer Ahmad, Vinod Kumar, Ahmed Alkhayyat

Erschienen in: The Journal of Supercomputing | Ausgabe 9/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things is a well-known and emerging technology that allows authorised users to monitor and access sensors deployed in various industrial units. A robust key management protocol for industrial sensor network system is used to provide for such access and monitoring. The difficulty emerges when it comes to establishing a secure mutual authentication framework that allows users to safely communicate with sensors installed in Industrial Internet of Things (IIoT) systems. In the literature, only a few fundamental agreement protocols have been shown to be effective. Such protocols, however, have higher processing and communication costs. So, the objective would be to develop an effective mutual authentication approach that outperforms existing protocols. Therefore, we propose a secure key management framework that is both computationally and communicatively efficient. Additionally, the proposed mutual authentication framework allows users to securely communicate with sensors. The objective of this research is to provide a robust, secure, and anonymity preserving three-factor mutual authentication framework for the IIoT in order to eliminate any security vulnerabilities. We used widely known random oracle models and Scyther tool stimulation’s to perform both informal and formal security analysis on the proposed scheme, ensuring that it is secure against all known security risks. The performance study demonstrates that the suggested framework is more efficient and lightweight than other existing frameworks. In addition, in a resource-constrained IIoT context, the suggested framework is relatively easy to implement.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener Comput Syst 78:1005–1019CrossRef Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener Comput Syst 78:1005–1019CrossRef
2.
Zurück zum Zitat Kumar V, Mahmoud MS, Alkhayyat A, Srinivas J, Ahmad M, Kumari A (2022) RAPCHI: robust authentication protocol for IoMT-based cloud-healthcare infrastructure. J Supercomput 78:16167–16196CrossRef Kumar V, Mahmoud MS, Alkhayyat A, Srinivas J, Ahmad M, Kumari A (2022) RAPCHI: robust authentication protocol for IoMT-based cloud-healthcare infrastructure. J Supercomput 78:16167–16196CrossRef
3.
Zurück zum Zitat Kumar V, Kumar R, Khan AA, Kumar V, Chen Y-C, Chang C-C (2022) RAFI: robust authentication framework for IoT-based RFID infrastructure. Sensors 22(9):3110CrossRef Kumar V, Kumar R, Khan AA, Kumar V, Chen Y-C, Chang C-C (2022) RAFI: robust authentication framework for IoT-based RFID infrastructure. Sensors 22(9):3110CrossRef
4.
Zurück zum Zitat Ahmed MR, Huang X, Sharma D, Cui H (2012) Wireless sensor network: characteristics and architectures. Int J Inf Commun Eng 6(12):1398–1401 Ahmed MR, Huang X, Sharma D, Cui H (2012) Wireless sensor network: characteristics and architectures. Int J Inf Commun Eng 6(12):1398–1401
5.
Zurück zum Zitat Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443CrossRef Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443CrossRef
6.
Zurück zum Zitat Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun. 8(3):1086–1090CrossRef Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun. 8(3):1086–1090CrossRef
7.
Zurück zum Zitat Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors 10(3):2450–2459CrossRef Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors 10(3):2450–2459CrossRef
8.
Zurück zum Zitat He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10(4):361–371 He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10(4):361–371
9.
Zurück zum Zitat Lee C-C, Li C-T, Chen S-D (2011) Two attacks on a two-factor user authentication in wireless sensor networks. Parallel Process Lett 21(01):21–26CrossRefMATHMathSciNet Lee C-C, Li C-T, Chen S-D (2011) Two attacks on a two-factor user authentication in wireless sensor networks. Parallel Process Lett 21(01):21–26CrossRefMATHMathSciNet
10.
Zurück zum Zitat Vaidya B, Makrakis D, Mouftah H (2016) Two-factor mutual authentication with key agreement in wireless sensor networks. Secur Commun Netw 9(2):171–183CrossRef Vaidya B, Makrakis D, Mouftah H (2016) Two-factor mutual authentication with key agreement in wireless sensor networks. Secur Commun Netw 9(2):171–183CrossRef
11.
Zurück zum Zitat Kim J, Lee D, Jeon W, Lee Y, Won D (2014) Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4):6443–6462CrossRef Kim J, Lee D, Jeon W, Lee Y, Won D (2014) Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4):6443–6462CrossRef
12.
Zurück zum Zitat Chang I-P, Lee T-F, Lin T-H, Liu C-M (2015) Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks. Sensors 15(12):29841–29854CrossRef Chang I-P, Lee T-F, Lin T-H, Liu C-M (2015) Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks. Sensors 15(12):29841–29854CrossRef
13.
Zurück zum Zitat Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sens Netw 9(4):730831CrossRef Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sens Netw 9(4):730831CrossRef
14.
Zurück zum Zitat Yeh H-L, Chen T-H, Liu P-C, Kim T-H, Wei H-W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779CrossRef Yeh H-L, Chen T-H, Liu P-C, Kim T-H, Wei H-W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779CrossRef
15.
Zurück zum Zitat Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10081–10106CrossRef Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10081–10106CrossRef
16.
Zurück zum Zitat Nam J, Kim M, Paik J, Lee Y, Won D (2014) A provably-secure ECC-based authentication scheme for wireless sensor networks. Sensors 14(11):21023–21044CrossRef Nam J, Kim M, Paik J, Lee Y, Won D (2014) A provably-secure ECC-based authentication scheme for wireless sensor networks. Sensors 14(11):21023–21044CrossRef
17.
Zurück zum Zitat Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376–3392CrossRef Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376–3392CrossRef
18.
Zurück zum Zitat Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2017) A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans Ind Inform 14(8):3599–3609CrossRef Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2017) A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans Ind Inform 14(8):3599–3609CrossRef
19.
Zurück zum Zitat Sadhukhan D, Ray S, Biswas G, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J Supercomput 77(2):1114–1151CrossRef Sadhukhan D, Ray S, Biswas G, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J Supercomput 77(2):1114–1151CrossRef
20.
Zurück zum Zitat Amin R, Islam SH, Biswas G, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener Comput Syst 80:483–495CrossRef Amin R, Islam SH, Biswas G, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener Comput Syst 80:483–495CrossRef
22.
Zurück zum Zitat Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132–146CrossRef Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132–146CrossRef
23.
Zurück zum Zitat Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154CrossRef Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154CrossRef
24.
Zurück zum Zitat Ray S, Biswas G, Dasgupta M (2016) Secure multi-purpose mobile-banking using elliptic curve cryptography. Wirel Pers Commun 90(3):1331–1354CrossRef Ray S, Biswas G, Dasgupta M (2016) Secure multi-purpose mobile-banking using elliptic curve cryptography. Wirel Pers Commun 90(3):1331–1354CrossRef
25.
Zurück zum Zitat Ali R, Pal AK, Kumari S, Karuppiah M, Conti M (2018) A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Future Gener Comput Syst 84:200–215CrossRef Ali R, Pal AK, Kumari S, Karuppiah M, Conti M (2018) A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Future Gener Comput Syst 84:200–215CrossRef
26.
Zurück zum Zitat Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJ (2018) Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment. IEEE Internet Things J 5(6):4900–4913CrossRef Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJ (2018) Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment. IEEE Internet Things J 5(6):4900–4913CrossRef
27.
Zurück zum Zitat Shuai M, Xiong L, Wang C, Yu N (2020) A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem. Comput Commun 160:215–227CrossRef Shuai M, Xiong L, Wang C, Yu N (2020) A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem. Comput Commun 160:215–227CrossRef
28.
Zurück zum Zitat Rangwani D, Sadhukhan D, Ray S, Khan MK, Dasgupta M (2021) A robust provable-secure privacy-preserving authentication protocol for industrial internet of things. Peer-to-Peer Netw Appl 14(3):1548–1571CrossRef Rangwani D, Sadhukhan D, Ray S, Khan MK, Dasgupta M (2021) A robust provable-secure privacy-preserving authentication protocol for industrial internet of things. Peer-to-Peer Netw Appl 14(3):1548–1571CrossRef
30.
Zurück zum Zitat Wang C, Xu G, Sun J (2017) An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors 17(12):2946CrossRef Wang C, Xu G, Sun J (2017) An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors 17(12):2946CrossRef
31.
Zurück zum Zitat Li N, Guo F, Mu Y, Susilo W, Nepal S (2017) Fuzzy extractors for biometric identification. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp 667–677 Li N, Guo F, Mu Y, Susilo W, Nepal S (2017) Fuzzy extractors for biometric identification. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp 667–677
33.
Zurück zum Zitat Canetti R, Krawczyk H (2002) Universally composable notions of key exchange and secure channels. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 337–351 Canetti R, Krawczyk H (2002) Universally composable notions of key exchange and secure channels. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 337–351
34.
Zurück zum Zitat Khan AA, Kumar V, Ahmad M, Rana S (2021) LAKAF: lightweight authentication and key agreement framework for smart grid network. J Syst Archit 116:102053CrossRef Khan AA, Kumar V, Ahmad M, Rana S (2021) LAKAF: lightweight authentication and key agreement framework for smart grid network. J Syst Archit 116:102053CrossRef
35.
Zurück zum Zitat Abdalla M, Chevassut O, Fouque P-A, Pointcheval D (2005) A simple threshold authenticated key exchange from short secrets. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 566–584 Abdalla M, Chevassut O, Fouque P-A, Pointcheval D (2005) A simple threshold authenticated key exchange from short secrets. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 566–584
36.
Zurück zum Zitat Cremers CJ (2008) The Scyther tool: verification, falsification, and analysis of security protocols. In: International conference on computer aided verification. Springer, pp 414–418 Cremers CJ (2008) The Scyther tool: verification, falsification, and analysis of security protocols. In: International conference on computer aided verification. Springer, pp 414–418
Metadaten
Titel
RKMIS: robust key management protocol for industrial sensor network system
verfasst von
Samiulla Itoo
Musheer Ahmad
Vinod Kumar
Ahmed Alkhayyat
Publikationsdatum
21.01.2023
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 9/2023
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-022-05041-x

Weitere Artikel der Ausgabe 9/2023

The Journal of Supercomputing 9/2023 Zur Ausgabe