当前位置: X-MOL 学术Comput. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
3P-SAKE: Privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks
Computer Communications ( IF 6 ) Pub Date : 2021-04-28 , DOI: 10.1016/j.comcom.2021.04.021
Mehedi Masud , Mamoun Alazab , Karanjeet Choudhary , Gurjot Singh Gaba

A new industrial revolution is emerging with the Internet of Things (IoT) growing use in enabling the machine to machine communication between the devices, sensors, actuators, and gateways. IoT lets the communication across devices and the network happen in real-time and helps make technologically smart homes, smart hospitals, and smart industrial applications. The authentication schemes in IoT have to be robust and lightweight to be useful for resource-constrained real-time applications where user privacy and physical security are the priority concerns. The IoT devices are prone to physical attacks due to their installation in hostile environments. The intruders want to physically capture the IoT nodes for cloning and accessing the stored confidential information, thus necessitating IoT nodes’ physical protection. This article proposes a less expensive and physically secured user authentication and secure key exchange protocol for industry 4.0 applications. Physically unclonable functions (PUF), hash, and XOR operations are used in the proposed method to attain robustness and efficiency. The scheme’s other benefits include low computational cost, retaining the device’s confidentiality, safety from major security threats, low communication, and storage overhead.



中文翻译:

3P-SAKE:无线工业网络的隐私保护和物理安全认证密钥建立协议

随着物联网(IoT)在使机器之间实现设备,传感器,执行器和网关之间的机器通信的日益广泛的使用,正在掀起一场新的工业革命。物联网使跨设备和网络的通信实时发生,并有助于制造技术上智能的家庭,智能医院和智能工业应用程序。物联网中的身份验证方案必须健壮且轻巧,才能在资源受限的实时应用中有用,在这些应用中,用户隐私和物理安全性是优先考虑的问题。由于将IoT设备安装在不利的环境中,因此容易受到物理攻击。入侵者想要物理捕获IoT节点以克隆和访问存储的机密信息,因此需要IoT节点的物理保护。本文提出了一种针对工业4.0应用的廉价且物理保护的用户身份验证和安全密钥交换协议。物理上不可克隆的函数(PUF),哈希和XOR操作被用于所提出的方法中,以获得鲁棒性和效率。该方案的其他好处包括计算成本低,保持设备的机密性,免受主要安全威胁的安全性,较低的通信量和存储开销。

更新日期:2021-05-10
down
wechat
bug