Full Text:   <405>

Summary:  <68>

CLC number: TP309

On-line Access: 2024-12-26

Received: 2024-06-09

Revision Accepted: 2024-12-26

Crosschecked: 2024-06-16

Cited: 0

Clicked: 835

Citations:  Bibtex RefMan EndNote GB/T7714

 ORCID:

Zhong CAO

https://orcid.org/0000-0002-2301-8030

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.11 P.1466-1478

http://doi.org/10.1631/FITEE.2400497


Lightweight authentication scheme for edge control systems in Industrial Internet of Things


Author(s):  Wenli SHANG, Xudong WEN, Zhuo CHEN, Wenze XIONG, Zhiwei CHANG, Zhong CAO

Affiliation(s):  School of Electronics and Communication Engineering, Guangzhou University, Guangzhou 510006, China; more

Corresponding email(s):   zhongc@gzhu.edu.cn

Key Words:  Edge intelligent controller (EIC), Edge control systems (ECSs), Terminal devices (TDs), Anonymous authentication, Lightweight authentication


Wenli SHANG, Xudong WEN, Zhuo CHEN, Wenze XIONG, Zhiwei CHANG, Zhong CAO. Lightweight authentication scheme for edge control systems in Industrial Internet of Things[J]. Frontiers of Information Technology & Electronic Engineering, 2024, 25(11): 1466-1478.

@article{title="Lightweight authentication scheme for edge control systems in Industrial Internet of Things",
author="Wenli SHANG, Xudong WEN, Zhuo CHEN, Wenze XIONG, Zhiwei CHANG, Zhong CAO",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="25",
number="11",
pages="1466-1478",
year="2024",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2400497"
}

%0 Journal Article
%T Lightweight authentication scheme for edge control systems in Industrial Internet of Things
%A Wenli SHANG
%A Xudong WEN
%A Zhuo CHEN
%A Wenze XIONG
%A Zhiwei CHANG
%A Zhong CAO
%J Frontiers of Information Technology & Electronic Engineering
%V 25
%N 11
%P 1466-1478
%@ 2095-9184
%D 2024
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2400497

TY - JOUR
T1 - Lightweight authentication scheme for edge control systems in Industrial Internet of Things
A1 - Wenli SHANG
A1 - Xudong WEN
A1 - Zhuo CHEN
A1 - Wenze XIONG
A1 - Zhiwei CHANG
A1 - Zhong CAO
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 25
IS - 11
SP - 1466
EP - 1478
%@ 2095-9184
Y1 - 2024
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2400497


Abstract: 
In edge control systems (ECSs), edge computing demands more local data processing power, while traditional industrial programmable logic controllers (PLCs) cannot meet this demand. Thus, edge intelligent controllers (EICs) have been developed, making their secure and reliable operation crucial. However, as EICs communicate sensitive information with resource-limited terminal devices (TDs), a low-cost, efficient authentication solution is urgently needed since it is challenging to implement traditional asymmetric cryptography on TDs. In this paper, we design a lightweight authentication scheme for ECSs using low-computational-cost hash functions and exclusive OR (XOR) operations; this scheme can achieve bidirectional anonymous authentication and key agreement between the EIC and TDs to protect the privacy of the devices. Through security analysis, we demonstrate that the authentication scheme can provide the necessary security features and resist major known attacks. Performance analysis and comparisons indicate that the proposed authentication scheme is effective and feasible for deployment in ECSs.

工业物联网边缘控制系统轻量级认证方案

尚文利1,温旭东1,陈卓1,熊文泽2,常志伟1,曹忠1
1广州大学电子与通信工程学院,中国广州市,510006
2机械工业仪器仪表综合技术经济研究所,中国北京市,100055
摘要:在边缘控制系统中,边缘计算需要更强的本地数据处理能力,而传统的工业可编程逻辑控制器无法满足这一需求。因此,边缘智能控制器得到发展,其安全可靠的运行至关重要。然而,由于边缘智能控制器需与资源有限的终端设备进行敏感信息通信,且在终端设备上实现传统的非对称加密具有挑战性,因此迫切需要一种低成本、高效的身份验证解决方案。本文使用低计算成本的哈希函数和异或运算为边缘控制系统设计了一种轻量级身份验证方案;该方案可在边缘智能控制器与终端设备之间实现双向匿名身份验证和密钥协议,以保护设备隐私。安全性分析证明该认证方案可提供必要的安全特性并抵御主要的已知攻击。性能分析和比较表明,所提方案在边缘控制系统中的部署可行、有效。

关键词:边缘智能控制器;边缘控制系统;终端设备;匿名认证;轻量级认证

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1]Aman MN, Taneja S, Sikdar B, et al., 2019. Token-based security for the Internet of Things with dynamic energy-quality tradeoff. IEEE Int Things J, 6(2):2843-2859.

[2]Cao Z, Chen Z, Shang WL, et al., 2023. Efficient revocable anonymous authentication mechanism for edge intelligent controllers. IEEE Int Things J, 10(12):10357-10367.

[3]Cui J, Wang FQ, Zhang QY, et al., 2021. Anonymous message authentication scheme for semitrusted edge-enabled IIoT. IEEE Trans Ind Electron, 68(12):12921-12929.

[4]Cui J, Bian FY, Zhong H, et al., 2022. An anonymous and outsourcing-supported multiauthority access control scheme with revocation for edge-enabled IIoT system. IEEE Syst J, 16(4):6569-6580.

[5]Cui J, Wang FQ, Zhang QY, et al., 2023. Efficient batch authentication scheme based on edge computing in IIoT. IEEE Trans Netw Serv Manag, 20(1):357-368.

[6]Dolev D, Yao A, 1983. On the security of public key protocols. IEEE Trans Inform Theory, 29(2):198-208.

[7]Ehui BB, Han YR, Guo H, et al., 2022. A lightweight mutual authentication protocol for IoT. J Commun Inform Netw, 7(2):181-191.

[8]Esfahani A, Mantas G, Matischek R, et al., 2019. A lightweight authentication mechanism for M2M communications in Industrial IoT environment. IEEE Int Things J, 6(1):288-296.

[9]Esposito C, Castiglione A, Palmieri F, et al., 2018. Integrity for an event notification within the Industrial Internet of Things by using group signatures. IEEE Trans Ind Inform, 14(8):3669-3678.

[10]Gadekallu TR, Pham QV, Nguyen DC, et al., 2022. Blockchain for Edge of Things: applications, opportunities, and challenges. IEEE Int Things J, 9(2):964-988.

[11]Jan MA, Khan F, Mastorakis S, et al., 2021. LightIoT: lightweight and secure communication for energy-efficient IoT in health informatics. IEEE Trans Green Commun Netw, 5(3):1202-1211.

[12]Khan R, Teo J, Jan MA, et al., 2023. A trustworthy, reliable, and lightweight privacy and data integrity approach for the Internet of Things. IEEE Trans Ind Inform, 19(1):511-518.

[13]Li JL, Su Z, Guo DK, et al., 2021. PSL-MAAKA: provably secure and lightweight mutual authentication and key agreement protocol for fully public channels in Internet of Medical Things. IEEE Int Things J, 8(17):13183-13195.

[14]Liu Y, Chi C, Zhang YW, et al., 2022. Identification and resolution for Industrial Internet: architecture and key technology. IEEE Int Things J, 9(18):16780-16794.

[15]Mahmood K, Chaudhry SA, Naqvi H, et al., 2018. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Fut Gener Comput Syst, 81:557-565.

[16]Nkenyereye L, Hwang J, Pham QV, et al., 2021. Virtual IoT service slice functions for multiaccess edge computing platform. IEEE Int Things J, 8(14):11233-11248.

[17]Rose SGH, Jayasree T, 2019. Detection of jamming attack using timestamp for WSN. Ad Hoc Netw, 91:101874.

[18]Sharp M, Ak R, Hedberg TJr, 2018. A survey of the advancing use and development of machine learning in smart manufacturing. J Manuf Syst, 48:170-179.

[19]Sisinni E, Saifullah A, Han S, et al., 2018. Industrial Internet of Things: challenges, opportunities, and directions. IEEE Trans Ind Inform, 14(11):4724-4734.

[20]Sodhro AH, Pirbhulal S, de Albuquerque VHC, 2019. Artificial intelligence-driven mechanism for edge computing-based industrial applications. IEEE Trans Ind Inform, 15(7):4235-4243.

[21]Sun XB, Men S, Zhao CL, et al., 2015. A security authentication scheme in machine-to-machine home network service. Secure Commun Netw, 8(16):2678-2686.

[22]Tan CC, Sheng B, Li Q, 2008. Secure and serverless RFID authentication and search protocols. IEEE Trans Wirel Commun, 7(4):1400-1407.

[23]Wang JJ, Ma YL, Zhang LB, et al., 2018. Deep learning for smart manufacturing: methods and applications. J Manuf Syst, 48:144-156.

[24]Wazid M, Das AK, Odelu V, et al., 2020. Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Depend Secure Comput, 17(2):391-406.

[25]Xiao SY, Ge XH, Han QL, et al., 2022. Secure distributed adaptive platooning control of automated vehicles over vehicular ad-hoc networks under denial-of-service attacks. IEEE Trans Cybern, 52(11):12003-12015.

[26]Xiao SY, Ge XH, Ding L, et al., 2024a. A bandwidth-conscious event-based control approach to secondary frequency regulation under vehicle-to-grid service. IEEE Trans Smart Grid, 15(4):3739-3750.

[27]Xiao SY, Ge XH, Wu Q, et al., 2024b. Co-design of bandwidth-aware communication scheduler and cruise controller for multiple high-speed trains. IEEE Trans Veh Technol, 73(4):4993-5004.

[28]Zhang LP, Zhao LC, Yin SJ, et al., 2019. A lightweight authentication scheme with privacy protection for smart grid communications. Fut Gener Comput Syst, 100:770-778.

[29]Zhang QY, Wu J, Zhong H, et al., 2023. Efficient anonymous authentication based on physically unclonable function in Industrial Internet of Things. IEEE Trans Inform Forens Secur, 18:233-247.

[30]Zhang Y, Wei HY, 2021. Risk-aware cloud-edge computing framework for delay-sensitive industrial IoTs. IEEE Trans Netw Serv Manag, 18(3):2659-2671.

[31]Zhou W, Jia Y, Peng AN, et al., 2019. The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Int Things J, 6(2):1606-1616.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE