CLC number: TP309
On-line Access: 2024-12-26
Received: 2024-06-09
Revision Accepted: 2025-01-24
Crosschecked: 2024-06-16
Cited: 0
Clicked: 1220
Wenli SHANG, Xudong WEN, Zhuo CHEN, Wenze XIONG, Zhiwei CHANG, Zhong CAO. Lightweight authentication scheme for edge control systems in Industrial Internet of Things[J]. Frontiers of Information Technology & Electronic Engineering,in press.https://doi.org/10.1631/FITEE.2400497 @article{title="Lightweight authentication scheme for edge control systems in Industrial Internet of Things", %0 Journal Article TY - JOUR
工业物联网边缘控制系统轻量级认证方案1广州大学电子与通信工程学院,中国广州市,510006 2机械工业仪器仪表综合技术经济研究所,中国北京市,100055 摘要:在边缘控制系统中,边缘计算需要更强的本地数据处理能力,而传统的工业可编程逻辑控制器无法满足这一需求。因此,边缘智能控制器得到发展,其安全可靠的运行至关重要。然而,由于边缘智能控制器需与资源有限的终端设备进行敏感信息通信,且在终端设备上实现传统的非对称加密具有挑战性,因此迫切需要一种低成本、高效的身份验证解决方案。本文使用低计算成本的哈希函数和异或运算为边缘控制系统设计了一种轻量级身份验证方案;该方案可在边缘智能控制器与终端设备之间实现双向匿名身份验证和密钥协议,以保护设备隐私。安全性分析证明该认证方案可提供必要的安全特性并抵御主要的已知攻击。性能分析和比较表明,所提方案在边缘控制系统中的部署可行、有效。 关键词组: Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article
Reference[1]Aman MN, Taneja S, Sikdar B, et al., 2019. Token-based security for the Internet of Things with dynamic energy-quality tradeoff. IEEE Int Things J, 6(2):2843-2859. ![]() [2]Cao Z, Chen Z, Shang WL, et al., 2023. Efficient revocable anonymous authentication mechanism for edge intelligent controllers. IEEE Int Things J, 10(12):10357-10367. ![]() [3]Cui J, Wang FQ, Zhang QY, et al., 2021. Anonymous message authentication scheme for semitrusted edge-enabled IIoT. IEEE Trans Ind Electron, 68(12):12921-12929. ![]() [4]Cui J, Bian FY, Zhong H, et al., 2022. An anonymous and outsourcing-supported multiauthority access control scheme with revocation for edge-enabled IIoT system. IEEE Syst J, 16(4):6569-6580. ![]() [5]Cui J, Wang FQ, Zhang QY, et al., 2023. Efficient batch authentication scheme based on edge computing in IIoT. IEEE Trans Netw Serv Manag, 20(1):357-368. ![]() [6]Dolev D, Yao A, 1983. On the security of public key protocols. IEEE Trans Inform Theory, 29(2):198-208. ![]() [7]Ehui BB, Han YR, Guo H, et al., 2022. A lightweight mutual authentication protocol for IoT. J Commun Inform Netw, 7(2):181-191. ![]() [8]Esfahani A, Mantas G, Matischek R, et al., 2019. A lightweight authentication mechanism for M2M communications in Industrial IoT environment. IEEE Int Things J, 6(1):288-296. ![]() [9]Esposito C, Castiglione A, Palmieri F, et al., 2018. Integrity for an event notification within the Industrial Internet of Things by using group signatures. IEEE Trans Ind Inform, 14(8):3669-3678. ![]() [10]Gadekallu TR, Pham QV, Nguyen DC, et al., 2022. Blockchain for Edge of Things: applications, opportunities, and challenges. IEEE Int Things J, 9(2):964-988. ![]() [11]Jan MA, Khan F, Mastorakis S, et al., 2021. LightIoT: lightweight and secure communication for energy-efficient IoT in health informatics. IEEE Trans Green Commun Netw, 5(3):1202-1211. ![]() [12]Khan R, Teo J, Jan MA, et al., 2023. A trustworthy, reliable, and lightweight privacy and data integrity approach for the Internet of Things. IEEE Trans Ind Inform, 19(1):511-518. ![]() [13]Li JL, Su Z, Guo DK, et al., 2021. PSL-MAAKA: provably secure and lightweight mutual authentication and key agreement protocol for fully public channels in Internet of Medical Things. IEEE Int Things J, 8(17):13183-13195. ![]() [14]Liu Y, Chi C, Zhang YW, et al., 2022. Identification and resolution for Industrial Internet: architecture and key technology. IEEE Int Things J, 9(18):16780-16794. ![]() [15]Mahmood K, Chaudhry SA, Naqvi H, et al., 2018. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Fut Gener Comput Syst, 81:557-565. ![]() [16]Nkenyereye L, Hwang J, Pham QV, et al., 2021. Virtual IoT service slice functions for multiaccess edge computing platform. IEEE Int Things J, 8(14):11233-11248. ![]() [17]Rose SGH, Jayasree T, 2019. Detection of jamming attack using timestamp for WSN. Ad Hoc Netw, 91:101874. ![]() [18]Sharp M, Ak R, Hedberg TJr, 2018. A survey of the advancing use and development of machine learning in smart manufacturing. J Manuf Syst, 48:170-179. ![]() [19]Sisinni E, Saifullah A, Han S, et al., 2018. Industrial Internet of Things: challenges, opportunities, and directions. IEEE Trans Ind Inform, 14(11):4724-4734. ![]() [20]Sodhro AH, Pirbhulal S, de Albuquerque VHC, 2019. Artificial intelligence-driven mechanism for edge computing-based industrial applications. IEEE Trans Ind Inform, 15(7):4235-4243. ![]() [21]Sun XB, Men S, Zhao CL, et al., 2015. A security authentication scheme in machine-to-machine home network service. Secure Commun Netw, 8(16):2678-2686. ![]() [22]Tan CC, Sheng B, Li Q, 2008. Secure and serverless RFID authentication and search protocols. IEEE Trans Wirel Commun, 7(4):1400-1407. ![]() [23]Wang JJ, Ma YL, Zhang LB, et al., 2018. Deep learning for smart manufacturing: methods and applications. J Manuf Syst, 48:144-156. ![]() [24]Wazid M, Das AK, Odelu V, et al., 2020. Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Depend Secure Comput, 17(2):391-406. ![]() [25]Xiao SY, Ge XH, Han QL, et al., 2022. Secure distributed adaptive platooning control of automated vehicles over vehicular ad-hoc networks under denial-of-service attacks. IEEE Trans Cybern, 52(11):12003-12015. ![]() [26]Xiao SY, Ge XH, Ding L, et al., 2024a. A bandwidth-conscious event-based control approach to secondary frequency regulation under vehicle-to-grid service. IEEE Trans Smart Grid, 15(4):3739-3750. ![]() [27]Xiao SY, Ge XH, Wu Q, et al., 2024b. Co-design of bandwidth-aware communication scheduler and cruise controller for multiple high-speed trains. IEEE Trans Veh Technol, 73(4):4993-5004. ![]() [28]Zhang LP, Zhao LC, Yin SJ, et al., 2019. A lightweight authentication scheme with privacy protection for smart grid communications. Fut Gener Comput Syst, 100:770-778. ![]() [29]Zhang QY, Wu J, Zhong H, et al., 2023. Efficient anonymous authentication based on physically unclonable function in Industrial Internet of Things. IEEE Trans Inform Forens Secur, 18:233-247. ![]() [30]Zhang Y, Wei HY, 2021. Risk-aware cloud-edge computing framework for delay-sensitive industrial IoTs. IEEE Trans Netw Serv Manag, 18(3):2659-2671. ![]() [31]Zhou W, Jia Y, Peng AN, et al., 2019. The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Int Things J, 6(2):1606-1616. ![]() Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou
310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE |
Open peer comments: Debate/Discuss/Question/Opinion
<1>