CLC number: TP309
On-line Access: 2024-12-26
Received: 2024-06-09
Revision Accepted: 2024-12-26
Crosschecked: 2024-06-16
Cited: 0
Clicked: 835
Wenli SHANG, Xudong WEN, Zhuo CHEN, Wenze XIONG, Zhiwei CHANG, Zhong CAO. Lightweight authentication scheme for edge control systems in Industrial Internet of Things[J]. Frontiers of Information Technology & Electronic Engineering, 2024, 25(11): 1466-1478.
@article{title="Lightweight authentication scheme for edge control systems in Industrial Internet of Things",
author="Wenli SHANG, Xudong WEN, Zhuo CHEN, Wenze XIONG, Zhiwei CHANG, Zhong CAO",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="25",
number="11",
pages="1466-1478",
year="2024",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2400497"
}
%0 Journal Article
%T Lightweight authentication scheme for edge control systems in Industrial Internet of Things
%A Wenli SHANG
%A Xudong WEN
%A Zhuo CHEN
%A Wenze XIONG
%A Zhiwei CHANG
%A Zhong CAO
%J Frontiers of Information Technology & Electronic Engineering
%V 25
%N 11
%P 1466-1478
%@ 2095-9184
%D 2024
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2400497
TY - JOUR
T1 - Lightweight authentication scheme for edge control systems in Industrial Internet of Things
A1 - Wenli SHANG
A1 - Xudong WEN
A1 - Zhuo CHEN
A1 - Wenze XIONG
A1 - Zhiwei CHANG
A1 - Zhong CAO
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 25
IS - 11
SP - 1466
EP - 1478
%@ 2095-9184
Y1 - 2024
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2400497
Abstract: In edge control systems (ECSs), edge computing demands more local data processing power, while traditional industrial programmable logic controllers (PLCs) cannot meet this demand. Thus, edge intelligent controllers (EICs) have been developed, making their secure and reliable operation crucial. However, as EICs communicate sensitive information with resource-limited terminal devices (TDs), a low-cost, efficient authentication solution is urgently needed since it is challenging to implement traditional asymmetric cryptography on TDs. In this paper, we design a lightweight authentication scheme for ECSs using low-computational-cost hash functions and exclusive OR (XOR) operations; this scheme can achieve bidirectional anonymous authentication and key agreement between the EIC and TDs to protect the privacy of the devices. Through security analysis, we demonstrate that the authentication scheme can provide the necessary security features and resist major known attacks. Performance analysis and comparisons indicate that the proposed authentication scheme is effective and feasible for deployment in ECSs.
[1]Aman MN, Taneja S, Sikdar B, et al., 2019. Token-based security for the Internet of Things with dynamic energy-quality tradeoff. IEEE Int Things J, 6(2):2843-2859.
[2]Cao Z, Chen Z, Shang WL, et al., 2023. Efficient revocable anonymous authentication mechanism for edge intelligent controllers. IEEE Int Things J, 10(12):10357-10367.
[3]Cui J, Wang FQ, Zhang QY, et al., 2021. Anonymous message authentication scheme for semitrusted edge-enabled IIoT. IEEE Trans Ind Electron, 68(12):12921-12929.
[4]Cui J, Bian FY, Zhong H, et al., 2022. An anonymous and outsourcing-supported multiauthority access control scheme with revocation for edge-enabled IIoT system. IEEE Syst J, 16(4):6569-6580.
[5]Cui J, Wang FQ, Zhang QY, et al., 2023. Efficient batch authentication scheme based on edge computing in IIoT. IEEE Trans Netw Serv Manag, 20(1):357-368.
[6]Dolev D, Yao A, 1983. On the security of public key protocols. IEEE Trans Inform Theory, 29(2):198-208.
[7]Ehui BB, Han YR, Guo H, et al., 2022. A lightweight mutual authentication protocol for IoT. J Commun Inform Netw, 7(2):181-191.
[8]Esfahani A, Mantas G, Matischek R, et al., 2019. A lightweight authentication mechanism for M2M communications in Industrial IoT environment. IEEE Int Things J, 6(1):288-296.
[9]Esposito C, Castiglione A, Palmieri F, et al., 2018. Integrity for an event notification within the Industrial Internet of Things by using group signatures. IEEE Trans Ind Inform, 14(8):3669-3678.
[10]Gadekallu TR, Pham QV, Nguyen DC, et al., 2022. Blockchain for Edge of Things: applications, opportunities, and challenges. IEEE Int Things J, 9(2):964-988.
[11]Jan MA, Khan F, Mastorakis S, et al., 2021. LightIoT: lightweight and secure communication for energy-efficient IoT in health informatics. IEEE Trans Green Commun Netw, 5(3):1202-1211.
[12]Khan R, Teo J, Jan MA, et al., 2023. A trustworthy, reliable, and lightweight privacy and data integrity approach for the Internet of Things. IEEE Trans Ind Inform, 19(1):511-518.
[13]Li JL, Su Z, Guo DK, et al., 2021. PSL-MAAKA: provably secure and lightweight mutual authentication and key agreement protocol for fully public channels in Internet of Medical Things. IEEE Int Things J, 8(17):13183-13195.
[14]Liu Y, Chi C, Zhang YW, et al., 2022. Identification and resolution for Industrial Internet: architecture and key technology. IEEE Int Things J, 9(18):16780-16794.
[15]Mahmood K, Chaudhry SA, Naqvi H, et al., 2018. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Fut Gener Comput Syst, 81:557-565.
[16]Nkenyereye L, Hwang J, Pham QV, et al., 2021. Virtual IoT service slice functions for multiaccess edge computing platform. IEEE Int Things J, 8(14):11233-11248.
[17]Rose SGH, Jayasree T, 2019. Detection of jamming attack using timestamp for WSN. Ad Hoc Netw, 91:101874.
[18]Sharp M, Ak R, Hedberg TJr, 2018. A survey of the advancing use and development of machine learning in smart manufacturing. J Manuf Syst, 48:170-179.
[19]Sisinni E, Saifullah A, Han S, et al., 2018. Industrial Internet of Things: challenges, opportunities, and directions. IEEE Trans Ind Inform, 14(11):4724-4734.
[20]Sodhro AH, Pirbhulal S, de Albuquerque VHC, 2019. Artificial intelligence-driven mechanism for edge computing-based industrial applications. IEEE Trans Ind Inform, 15(7):4235-4243.
[21]Sun XB, Men S, Zhao CL, et al., 2015. A security authentication scheme in machine-to-machine home network service. Secure Commun Netw, 8(16):2678-2686.
[22]Tan CC, Sheng B, Li Q, 2008. Secure and serverless RFID authentication and search protocols. IEEE Trans Wirel Commun, 7(4):1400-1407.
[23]Wang JJ, Ma YL, Zhang LB, et al., 2018. Deep learning for smart manufacturing: methods and applications. J Manuf Syst, 48:144-156.
[24]Wazid M, Das AK, Odelu V, et al., 2020. Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Depend Secure Comput, 17(2):391-406.
[25]Xiao SY, Ge XH, Han QL, et al., 2022. Secure distributed adaptive platooning control of automated vehicles over vehicular ad-hoc networks under denial-of-service attacks. IEEE Trans Cybern, 52(11):12003-12015.
[26]Xiao SY, Ge XH, Ding L, et al., 2024a. A bandwidth-conscious event-based control approach to secondary frequency regulation under vehicle-to-grid service. IEEE Trans Smart Grid, 15(4):3739-3750.
[27]Xiao SY, Ge XH, Wu Q, et al., 2024b. Co-design of bandwidth-aware communication scheduler and cruise controller for multiple high-speed trains. IEEE Trans Veh Technol, 73(4):4993-5004.
[28]Zhang LP, Zhao LC, Yin SJ, et al., 2019. A lightweight authentication scheme with privacy protection for smart grid communications. Fut Gener Comput Syst, 100:770-778.
[29]Zhang QY, Wu J, Zhong H, et al., 2023. Efficient anonymous authentication based on physically unclonable function in Industrial Internet of Things. IEEE Trans Inform Forens Secur, 18:233-247.
[30]Zhang Y, Wei HY, 2021. Risk-aware cloud-edge computing framework for delay-sensitive industrial IoTs. IEEE Trans Netw Serv Manag, 18(3):2659-2671.
[31]Zhou W, Jia Y, Peng AN, et al., 2019. The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Int Things J, 6(2):1606-1616.
Open peer comments: Debate/Discuss/Question/Opinion
<1>