An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems

International Journal of Information Technology - Tập 15 - Trang 1221-1230 - 2023
G. Umarani Srikanth1, R. Geetha2, S. Prabhu2
1Department of Computer Science and Engineering, Panimalar Engineering College, Chennai, India
2Department of Computer Science and Engineering, S.A. Engineering College, Chennai, India

Tóm tắt

Internet of Things is one of the prevalent and inevitable trends of the current era where data is found to be scattered among sensing devices. This paper addresses about preserving the privacy and security of the data that is distributed among the sensors collected by the users in Industrial Internet of Things infrastructure domain. This work adopts a dynamic authentication key agreement strategy which permits authenticated users to access the data which is distributed among various IoT sensing devices. In the proposed work an efficient Key Agreement and Authentication Scheme is designed to ensure the establishment of secure data communication. The model called Real-or-Random and tool named Automated Validation of Internet Security Protocols are deployed to ensure the secured transmission of data collected by innumerous sensors deployed across the network. Scaling of the network is done by addition of new nodes followed by pre-deployment phase and restoration of the transmission route is done effectively if any intrusion is found. The performance of the scheme is validated by measuring the parameters such as throughput, residual energy, packet dropping rate and delay analysis and it is found that the proposed scheme is superior compared with existing schemes.

Tài liệu tham khảo

Geetha S (2020) Umarani : cloud integrated IoT enabled sensor network security: research issues and solutions. Wireless Pers Commun 113:747–771 Xiangwang H, Zhiyuan R, Kun Y, Chen C, Hailin Z, Yao X (2019) IIoT-MEC: a novel mobile edge computing framework for 5G-enabled IIoT Tessema M, Abdulrahman A, Abdullah A, Yousef A, Dunren C (2017) A no data center solution to cloud computing. In: IEEE 10th International Conference on Cloud Computing. pp. 714–717 Kai F, Qiang P, Junxiong W, Tingting L, Hui L, Yintang Y (2018) Cross-domain based data sharing scheme in cooperative edge computing. In: IEEE International Conference on Edge Computing. pp. 87–92 Alka L, Rao P (2017) Platforms for big data analytics: trend towards hybrid era. In: International Conference on Energy, Communication, Data Analytics and Soft Computing. pp. 3235–3238 Ahmad AS, Sumari AD (2017) Cognitive artificial intelligence: brain-inspired intelligent computation in artificial intelligence. In: Computing Conference, 135–141 Geetha M (2019) Padmavathy, lallithasree: a light weight secure communication scheme for wireless sensor networks. Wireless Pers Commun 108:1957–1976 Geetha P (2020) Thilagam, lallithasree : tamilian cryptography: an efficient hybrid symmetric key encryption algorithm. Wireless Pers Commun 112:21–36 Gope P, Sikdar B (2018) An efficient data aggregation scheme for privacy-friendly dynamic pricing-based billing and demand-response management in smart grids. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2018.2833863 Mishra N, Shahid HM, Tripathi JP (2015) A compendium over cloud computing cryptographic algorithms and security issues. BIJIT—BVICAM’s International Journal of Information Technology. Vol. 7 Ndrseco. 1; ISSN 0973–5658 Yeh H-L, Chen T-H, Liu P-C, Kim T-H, Wei H-W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779 Gope P, Hwang T (2016) BSN-care: a secure IoT-based modern healthcare system using body sensor network. IEEE Sensors J 16(5):1368–1376 Chang C-C, Le H-D (2016) A provably secure, efficient and flexible authentication scheme for Ad hoc wireless sensor networks. IEEE Trans Wirel Commun 15(1):357–366 Pandey A, Saini JR (2017) Comprehensive security mechanism for defending cyber attacks based upon spoofing and poisoning. BIJIT—BVICAM’s Int J Inf Technol. 8(2). ISSN 0973–5658 Sriharsha B, Zabiullah, Vishnu S B, Sanju V (2016) Password protected locking system using arduino. BVICAM’s Int J Inf Technol. 8(1). ISSN 0973–5658 959 Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sensor Netw. 2013:1–7 Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2018) Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet Things J 5(1):269–282 Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo K-KR (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194–204 Gope P, Sikdar B (2018) Privacy-aware authenticated key agreement scheme for secure smart grid communication. IEEE Trans Smart Grid. https://doi.org/10.1109/TSG.2018.2844403 Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772 Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2017.2714179 Wazid M, Das AK, Khan MK, Al-Ghaiheb AAD, Kumar N, Vasilakos AV (2017) Secure authentication scheme for medicine anti-counterfeiting system in IoT environment. IEEE Internet Things J 4(5):1634–1646 Hameed K, Khan A, Ahmed M, Reddy AG, Rathore MM (2018) Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks. Future Gener Comput Syst. 82:274–289 Gope P, Lee J, Quek TQS (2018) Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Trans Inf Forensics Secur 13(11):2831–2843 Jiang Q, Ma J, Wei F, Tian Y, Shen J, Yang Y (2016) An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J Netw Comput Appl 76:37–48 Beigh BM (2015) Framework for choosing best intrusion detection system. BIJIT—BVICAM’s Int J Inf Technol. 7(1); ISSN 0973–5658 821