当前位置: X-MOL 学术Peer-to-Peer Netw. Appl. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
Peer-to-Peer Networking and Applications ( IF 4.2 ) Pub Date : 2021-04-01 , DOI: 10.1007/s12083-020-01063-5
Diksha Rangwani , Dipanwita Sadhukhan , Sangram Ray , Muhammad Khurram Khan , Mou Dasgupta

Wireless sensor networks (WSNs) accomplish a key aspect in the Industrial Internet of Things (IIoT) that has turned out to be the most flourishing perception for computerizations in an industrial maneuver. IIoT environment is a significant application of the Internet of Things (IoT) that facilitate the professionals related to industries for remote supervision of factory, warehouses, etc. In this environment, the data must constantly be analyzed to take important real-time decisions. It makes remote confirmation most essential to secure the data transmission through insure channel so that alteration, interception, modifications of data cannot occur. As a result, there remains an immense requirement of remote user authentication protocol to restrict any illicit access to the data. In this scenario, to eradicate all the security attacks, it is aimed to design a robust provable-secure privacy-preserving three-factor authentication protocol for IIoT in this research. Our scheme is analyzed using both informal and formal security reviews using broadly known random oracle models, BAN logic as well as simulated using a well-accepted ProVerif simulation tool that confirms that the protocol is well-secured against all existing security threats. It is exhibited in the performance estimation that the proposed scheme is more efficient as well as lightweight than other existing schemes. To conclude it can be said that the proposed scheme is easy to be realized in the resource-constrained IIoT environment.



中文翻译:

适用于工业物联网的可靠的可证明安全的隐私保护身份验证协议

无线传感器网络(WSN)实现了工业物联网(IIoT)的一个关键方面,事实证明这是对工业化操作中计算机化的最蓬勃发展的认识。IIoT环境是物联网(IoT)的重要应用,可促进与行业相关的专业人员对工厂,仓库等进行远程监管。在这种环境下,必须不断分析数据以做出重要的实时决策。它使远程确认对于确保通过保险通道的数据传输最为重要,这样就不会发生数据的更改,拦截,修改。结果,仍然存在对远程用户认证协议的巨大要求,以限制对数据的任何非法访问。在这种情况下,要消除所有安全攻击,本研究旨在为IIoT设计一个可靠的可证明安全的隐私保护三要素身份验证协议。我们的计划使用非正式和正式的安全检查进行分析,并使用广为人知的随机Oracle模型,BAN逻辑进行分析,并使用公认的ProVerif仿真工具进行仿真,该工具确认该协议针对所有现有安全威胁均具有良好的安全性。在性能估计中显示,所提出的方案比其他现有方案更有效且更轻便。总而言之,可以说该方案很容易在资源受限的IIoT环境中实现。我们的计划使用非正式和正式的安全检查进行分析,并使用广为人知的随机Oracle模型,BAN逻辑进行分析,并使用公认的ProVerif仿真工具进行仿真,该工具确认该协议针对所有现有安全威胁均具有良好的安全性。在性能估计中显示,所提出的方案比其他现有方案更有效且更轻便。总而言之,可以说该方案很容易在资源受限的IIoT环境中实现。我们的计划使用非正式和正式的安全检查进行分析,并使用广为人知的随机Oracle模型,BAN逻辑进行分析,并使用公认的ProVerif仿真工具进行仿真,该工具确认该协议针对所有现有安全威胁均具有良好的安全性。在性能估计中显示,所提出的方案比其他现有方案更有效且更轻便。总而言之,可以说该方案很容易在资源受限的IIoT环境中实现。在性能估计中显示,所提出的方案比其他现有方案更有效且更轻便。总而言之,可以说该方案很容易在资源受限的IIoT环境中实现。在性能估计中显示,所提出的方案比其他现有方案更有效且更轻便。总而言之,可以说该方案很容易在资源受限的IIoT环境中实现。

更新日期:2021-04-01
down
wechat
bug