| Literature DB >> 36236523 |
Fumin Yi1, Lei Zhang1, Lijuan Xu1, Shumian Yang1, Yanrong Lu2, Dawei Zhao1.
Abstract
With the development of the Industrial Internet of Things (IIoT), industrial wireless sensors need to upload the collected private data to the cloud servers, resulting in a large amount of private data being exposed on the Internet. Private data are vulnerable to hacking. Many complex wireless-sensor-authentication protocols have been proposed. In this paper, we proposed an efficient authentication protocol for IIoT-oriented wireless sensor networks. The protocol introduces the PUF chip, and uses the Bloom filter to save and query the challenge-response pairs generated by the PUF chip. It ensures the security of the physical layer of the device and reduces the computing cost and communication cost of the wireless sensor side. The protocol introduces a pre-authentication mechanism to achieve continuous authentication between the gateway and the cloud server. The overall computational cost of the protocol is reduced. Formal security analysis and informal security analysis proved that our proposed protocol has more security features. We implemented various security primitives using the MIRACL cryptographic library and GMP large number library. Our proposed protocol was compared in-depth with related work. Detailed experiments show that our proposed protocol significantly reduces the computational cost and communication cost on the wireless sensor side and the overall computational cost of the protocol.Entities:
Keywords: IIoT; PUF; authentication; efficient; wireless sensor network
Mesh:
Year: 2022 PMID: 36236523 PMCID: PMC9571722 DOI: 10.3390/s22197413
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1IIoT-oriented wireless sensor communication network model.
Symbol meaning table.
| Notation | Description |
|---|---|
|
| Challenge value for the challenge-response pair |
|
| Physically unclonable functions |
|
| Response value of the challenge-response pair |
|
| Random number |
|
| Hash value |
|
| Hash algorithm |
|
| Xor operation and join operation |
|
| Communication message |
|
| Symmetric encryption and Symmetric decryption |
|
| Encrypted and Decrypted values |
|
| Nonlinear function |
Figure 2Protocol communication flowchart.
Figure 3Registration process.
Figure 4Average time taken by various operations.
Comparison of security features table.
| Protocol | ST1 | ST2 | ST3 | ST4 | ST5 | ST6 | ST7 | ST8 | ST9 | ST10 |
|---|---|---|---|---|---|---|---|---|---|---|
| Alladi 2020 [ | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | ✕ | 🗸 | 🗸 | ✕ |
| Kwon 2021 [ | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | ✕ | 🗸 | 🗸 | 🗸 |
| Chen 2021 [ | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | ✕ | ✕ | 🗸 | 🗸 | 🗸 |
| Raque 2022 [ | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | ✕ | 🗸 | 🗸 | 🗸 |
| Our | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 |
ST1: Mutual authentication; ST2: Identity anonymity and untraceability; ST3: Resist tampering attacks; ST4: Resist repaly attacks; ST5: Resist simulation and forgery attacks; ST6: No clock synchronization; ST7: Resist physical attacks; ST8: Forward and backward security of session keys; ST9: Resist internal attacks; ST10: Resist desynchronization attacks.
Overall performance of the protocol.
| Protocol | Total Computational Cost of Wireless Sensors | Total Communication Cost of Wireless Sensors | Total Computational Cost of Protocols | Total Communication Cost of Protocols |
|---|---|---|---|---|
| Alladi 2020 [ | 9.110 μs | 1408 bits | 36.932 μs | 3584 bits |
| Kwon 2021 [ | 7.995 μs | 1152 bits | 46.360 μs | 2432 bits |
| Chen 2021 [ | 8.271 μs | 1312 bits | 29.289 μs | 2496 bits |
| Raque 2022 [ | 9.252 μs | 1920 bits | 36.363 μs | 3840 bits |
| Our | 4.577 μs | 1152 bits | 22.404 μs | 2688 bits |
The experimental environment and parameters.
| CPU Processor | Memory | OS | Software Tools | Toolset |
|---|---|---|---|---|
| Intel(R) Core(TM) i5-5200U CPU @ 2.20 GHz | 8.00 GB | Win10 64-bit | Microsoft Visual C++ | MIRACL cryptographic library and GMP large number library |
Figure 5Total computational cost of wireless sensors.
Figure 6Communication cost of wireless sensors.
Figure 7Total computational costs of operations and protocols.
The number of operations.
| Protocol | Sensor Node | Gateway | Cloud Server/User | Total |
|---|---|---|---|---|
| Alladi 2020 [ |
|
|
|
|
| Kwon 2021 [ |
|
|
|
|
| Chen 2021 [ |
|
|
|
|
| Raque 2022 [ |
|
|
|
|
| Our |
|
|
|
|
.
Figure 8Total communication cost of protocols.