Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3549206.3549229acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesic3Conference Proceedingsconference-collections
research-article

Mutual Authentication of Devices under Multi-Cluster Environment in Industrial Internet of Things (IIoT) Networks

Published: 24 October 2022 Publication History

Abstract

Wireless Sensor Nodes have become crucial part of Industrial Internet of Things (IIoT) applications currently being designed. Many innovative and practical solutions are given to the problems which belongs to heterogenous and integrated domains. With aggressive use of wireless sensors in IIoT environments, concern of security has increased. As communications between the devices in IIoT environment involve exchange of information that is crucial and sensitive which must be secure transactions. Many security protocols have been proposed using various cryptographic techniques, but there is extra constraint on computational resources of sensor devices which makes it difficult to apply standard security protocols. In this paper, we proposed a security protocol in which we use hierarchal architecture of wireless sensor networks. A group of devices in a region are considered as a cluster, each cluster contains a Cluster Head through which a sensor device requests a token from server for mutual authentication both in inter/intra cluster environment. This token contains combined computed hash of Identity of Device, Cluster Head and Server along with random number generated by device. This token-based authentication provides secure communication between devices because of added validity and timestamps in the event of any attack. This proposed protocol is verified as safe by BAN logic and AVISPA.

References

[1]
Wang, Ding, and Ping Wang, "Understanding security failures of two factor authentication schemes for real- time applications in hierarchical wireless sensor networks." Ad Hoc Networks 20 (2014): 1-15.
[2]
Diffie, Whitfield, and Martin Hellman, "New directions in cryptography." IEEE transactions on Information Theory 22.6 (1976): 644-654.
[3]
Rivest, Ronald L., Adi Shamir, and Leonard Adleman, "A method for obtaining digital signatures and public- key cryptosystems." Communications of the ACM 21.2 (1978): 120-126.
[4]
Watro, R., Kong, D., Cuti, S. F., Gardiner, C., Lynn, C., & Kruus, P. (2004, October), "TinyPK: securing sensor networks with public key technology." Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. ACM, 2004.
[5]
Blab, Erik-Oliver, and Martina Zitterbart, "Towards Acceptable Public- Key Encryption in Sensor Networks."
[6]
IWUC. 2005.
[7]
Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004, May), "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks." Security and privacy, 2004. Proceedings. 2004 IEEE symposium on. IEEE, 2004.
[8]
Zhu, Sencun, Sanjeev Setia, and Sushil Jajodia, "LEAP+: Efficient security mechanisms for large scale distributed sensor networks." ACM Transactions on Sensor Networks (TOSN) 2.4 (2006): 500-528.
[9]
Chen, Chin-Ling, and Cheng-Ta Li, "Dynamic session-key generation for wireless sensor networks." EURASIP Journal on Wireless Communications and Networking 2008.1 (2008): 1-10.
[10]
Zhang, J., Shankaran, R., Orgun, M. A., Sattar, A., & Varadharajan, V, "A dynamic authentication scheme for hierarchical wireless sensor networks." International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services. Springer Berlin Heidelberg, 2010.
[11]
Rathore, Reena, and Muzzammil Hussain, "Simple, secure, efficient, lightweight and token based protocol for mutual authentication in wireless sensor networks." Emerging Research in Computing, Information, Communication and Applications. Springer India, 2015. 451-462.
[12]
Boyd, Colin, and Wenbo Mao, "On a limitation of BAN logic." Workshop on the Theory and Application of of Cryptographic Techniques. Springer Berlin Heidelberg, 1993.
[13]
Nessett, Dan M, "A critique of the Burrows, Abadi and Needham logic." ACM SIGOPS Operating Systems Review 24.2 (1990): 35-38.
[14]
Fan, Kai, Hui Li, and Yue Wang, "Security Analysis of the Kerberos Protocol Using BAN Logic." IAS. Vol. 9. 2009.
[15]
Meadows, Catherine A., "Formal verification of cryptographic protocols: A survey." International Conference on the Theory and Application of Cryptology. Springer Berlin Heidelberg, 1994.
[16]
Team, A. V. I. S. P. A. "AVISPA v1. 0 User Manual." (2006).
[17]
Viganò, Luca, "Automated security protocol analysis with the AVISPA tool." Electronic Notes in Theoretical Computer Science 155 (2006): 61-86.
[18]
Boichut, Y., Genet, T., Glouche, Y., & Heen, O., "Using animation to improve formal specifications of security protocols." 2nd Conference on Security in Network Architectures and Information Systems (SARSSI 2007). 2007.
[19]
Chi-Tung Chen, C.-C. L.-C. (2020). Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments. PLOS ONE, 1-28.
[20]
Deok Kyu Kwon, S. J. (2021). WSN-SLAP: Secure and Lightweight Mutual Authentication Protocol for Wireless Sensor Networks. sensors, 1-23.
[21]
Qi Xie, K. L. (2021). A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city. EURASIP Journal on Wireless Communications and Networking, 1-17.
[22]
Rangwani, D., Sadhukhan, D., Ray, S. A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things. Peer-to-Peer Netw. Appl. 14, 1548–1571 (2021).
[23]
Khalid H, Hashim SJ, Ahmad SMS, Hashim F, Chaudhary MA. SELAMAT: A New Secure and Lightweight Multi-Factor Authentication Scheme for Cross-Platform Industrial IoT Systems. Sensors. 2021; 21(4):1428.
[24]
Khalid Mahmood, S. A. (2016). A lightweight message authentication scheme for Smart Grid communications in power sector. Elsevier, 1-11.
[25]
Savio Sciancalepore, A. C. (2015). Key Management Protocol with Implicit Certificates for IoT systems. ACM- IoT-Sys, 1-6.
[26]
Tobias Marktscheffel, W. G. (2016). QR Code Based Mutual Authentication Protocol for Internet of Things. European Union, 1-6.
[27]
U. Senthil kumaran, P. I. (2014). Secure authentication and integrity techniques for randomized secured routing in WSN. Springer Science+Buisiness Media New York, 1-9.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
IC3-2022: Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing
August 2022
710 pages
ISBN:9781450396752
DOI:10.1145/3549206
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 October 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Hash computation
  2. Mutual Authentication
  3. Random Number
  4. Symmetric Key
  5. Token
  6. Validity

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

IC3-2022

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 50
    Total Downloads
  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)2
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media