| Literature DB >> 32927788 |
Karanjeet Choudhary1, Gurjot Singh Gaba1, Ismail Butun2, Pardeep Kumar3.
Abstract
Continuous development of the Industrial Internet of Things (IIoT) has opened up enormous opportunities for the engineers to enhance the efficiency of the machines. Despite the development, many industry administrators still fear to use Internet for operating their machines due to untrusted nature of the communication channel. The utilization of internet for managing industrial operations can be widespread adopted if the authentication of the entities are performed and trust is ensured. The traditional schemes with their inherent security issues and other complexities, cannot be directly deployed to resource constrained network devices. Therefore, we have proposed a strong mutual authentication and secret key exchange protocol to address the vulnerabilities of the existing schemes. We have used various cryptography operations such as hashing, ciphering, and so forth, for providing secure mutual authentication and secret key exchange between different entities to restrict unauthorized access. Performance and security analysis clearly demonstrates that the proposed work is energy efficient (computation and communication inexpensive) and more robust against the attacks in comparison to the traditional schemes.Entities:
Keywords: authentication; industrial internet of things (IIoT); industry 4.0; protocol; security
Year: 2020 PMID: 32927788 PMCID: PMC7570918 DOI: 10.3390/s20185166
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Industrial transformation and various applications of Industrial Internet of Things (IIoT).
Figure 2Few use cases of IIoT.
Figure 3System model.
Notations and Descriptions.
| Notations | Description | Notations | Description |
|---|---|---|---|
| The user and gateway id |
| Random secret | |
| Source and port address of user | Location and MAC address of user | ||
| Source and port address of gateway | Location and MAC address of gateway | ||
| SK | Shared secret key | Private key of gateway and | |
| h, ⊕ | The hash and XOR operation |
| Concatenation operation |
| Messages and timestamps | Public key of gateway and |
Figure 4User device registration phase in MAKE-IT Protocol.
Figure 5Mutual Authentication and Secret Key Generation Phase in MAKE-IT Protocol.
Notations and Descriptions for the symbols used in High Level Protocol Specification Language (HLPSL) script, Automated Validation of Internet Security Protocols and Applications (AVISPA).
| Notations | Description | Notations | Description |
|---|---|---|---|
| The |
| Public and private key of gateway | |
|
| Secret key | Compromised sending and receiving wireless channels | |
| Pieu, Pieg | Alias | . | Concatenation operation |
| Rho1, Rho2 | Alias |
| dolev-yao attack model |
| Psi | Alias |
| Encryption of component |
| Security goals |
| Sending and receiving channel of user | |
| Omega | Alias |
| Sending and receiving channel of gateway |
| Protocol ids |
| Intruder |
Figure 6AVISPA Role Specification of the User and Gateway for our proposed MAKE-IT Protocol.
Figure 7AVISPA Role Specification of the Session, Environment and Goal for MAKE-IT Protocol.
Figure 8AVISPA results by using on-the-fly model-checker (OFMC) and Constraint-Logic-based ATtack SEarcher (CL-AtSe) backend for our proposed MAKE-IT Protocol.
Storage cost of proposed protocol.
| Parameter | Size (Bytes) | User | Authentication Server | Gateway |
|---|---|---|---|---|
| 16, 24, 48, 24, 40 | ✓ | |||
| 24, 1, 24, 48, 26 | ✓ | |||
| 16, 16 | ✓ | ✓ | ||
| 16, 16 | ✓ | ✓ | ✓ | |
| 26, 16, 40, 24, 24 | ✓ | |||
| 16, 16, 16 | ✓ | ✓ | ||
|
| 264 | 187 | 210 | |
Computational cost of proposed protocol.
| Phase I | Phase II | Total cost | |
|---|---|---|---|
| User | |||
|
| - | ||
| Gateway | |||
| Total Cost |
Acronyms: C: Computation, E: Encryption, D: Decryption, : Ex-or operation, H: Hash, : random number generation, : User device registration, : Mutual authentication and secret key generation.
Computation cost comparison with different schemes.
| Schemes | Resource Constrained Device |
|---|---|
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| [ | |
| MAKE-IT |
Communication energy cost.
| Schemes | Transmission ( | Reception ( | Total Energy Consumption ( |
|---|---|---|---|
| [ | 459 | 309 | 768 |
| [ | 229 | 520 | 749 |
| [ | 371 | 287 | 658 |
| [ | 348 | 391 | 739 |
| [ |
| 742 | 742 |
| [ | 279 | 419 | 698 |
| [ | 371 | 1040 | 1411 |
| MAKE-IT | 230 | 155 | 385 |
Acronyms: : Undisclosed.
Analysis and Comparison of Protocols based on protection against attacks and security goals.
| Attacks | [ | [ | [ | [ | [ | [ | [ | MAKE-IT |
|---|---|---|---|---|---|---|---|---|
| Replay attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Man in the middle attack | ✓ | × | ✓ | × | ✓ | × | ✓ | ✓ |
| Modification attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Impersonation attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Mutual authentication | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Secure secret key | × | × | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Prevention from unauthorized access | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Data confidentiality | × | × |
| × | × | × | × | ✓ |
| Identity anonymity |
| ✓ |
| ✓ |
|
| ✓ | ✓ |
Acronyms: ✓: Protected against attacks/Compliance to security goals, ×: Vulnerable against attacks/non compliance to security goals, : Partially achieved.
Figure 9Communication Cost Comparison in terms of the number of message exchanges.