| Literature DB >> 36236609 |
Xingwen Zhao1,2, Dexin Li1,2, Hui Li1,2.
Abstract
Because the majority of information in the industrial Internet of things (IIoT) is transmitted over an open and insecure channel, it is indispensable to design practical and secure authentication and key agreement protocols. Considering the weak computational power of sensors, many scholars have designed lightweight authentication protocols that achieve limited security properties. Moreover, these existing protocols are mostly implemented in a single-gateway scenario, whereas the multigateway scenario is not considered. To deal with these problems, this paper presents a novel three-factor authentication and key agreement protocol based on elliptic curve cryptography for IIoT environments. Based on the elliptic curve Diffie-Hellman problem, we present a protocol achieving desirable forward and backward secrecy. The proposed protocol applies to single-gateway and is also extended to multigateway simultaneously. A formal security analysis is described to prove the security of the proposed scheme. Finally, the comparison results demonstrate that our protocol provides more security attributes at a relatively lower computational cost.Entities:
Keywords: authentication and key agreement; elliptic curve cryptography; forward secrecy; industrial Internet of things; wireless sensor network
Year: 2022 PMID: 36236609 PMCID: PMC9572988 DOI: 10.3390/s22197510
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1Architecture for an IIoT.
Figure 2Single-gateway model.
Figure 3Multigateway model.
Figure 4Points over the elliptic curve.
Symbol description.
| Symbol | Description |
|---|---|
|
| System administrator |
|
| |
|
| |
|
| Smart card of |
|
| Home gateway node |
|
| Foreign gateway node |
|
| Identity of |
|
| Identity of |
|
| Password of |
|
| Biometric information of |
|
| Private key and public key of |
|
| Private key and public key of |
|
| Random numbers |
|
| Random numbers |
|
| A point on the elliptic curve |
|
| Timestamps |
|
| Acceptable maximum transmission delay |
|
| Session key |
|
| One-way hash function |
| ⊕ | Exclusive-or operation |
|
| Concatenation operation |
|
| Fuzzy extractor probabilistic generation procedure |
|
| Fuzzy extractor deterministic reproduction procedure |
Figure 5User registration phase.
Figure 6Sensor registration phase.
Figure 7User login phase.
Figure 8Authentication and key agreement in the HGWN.
Figure 9Authentication and key agreement phase 1 in the FGWN.
Figure 10Authentication and key agreement phase 2 in the FGWN.
Figure 11Simulation result in HGWN.
Figure 12Simulation result in FGWN.
Security comparison.
| Security Properties | [ | [ | [ | [ | [ | Ours |
|---|---|---|---|---|---|---|
| Mutual authentication | × | ✓ | ✓ | ✓ | ✓ | ✓ |
| Session key agreement | ✓ | ✓ | ✓ | × | × | ✓ |
| Forward and backward secrecy | × | × | × | × | × | ✓ |
| User anonymity | ✓ | × | × | × | × | ✓ |
| Untraceability property | × | × | ✓ | × | × | ✓ |
| Illegal login detection | × | ✓ | ✓ | × | ✓ | ✓ |
| Stolen smart card attack | × | × | ✓ | ✓ | ✓ | ✓ |
| Replay attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Insider attack | ✓ | ✓ | ✓ | × | ✓ | ✓ |
| Desynchronization attack | × | × | ✓ | ✓ | × | ✓ |
| Impersonation attack | × | × | ✓ | × | ✓ | ✓ |
Communication cost comparison.
| Scheme | Number of Messages | Communication Cost (bits) | |
|---|---|---|---|
| [ | Case-1 | 2 | 1504 |
| [ | Case-1 | 4 | 2528 |
| Case-2 | 5 | 3008 | |
| [ | Case-1 | 3 | 2784 |
| Case-2 | 6 | 4704 | |
| [ | Case-1 | 4 | 2688 |
| Case-2 | 8 | 4480 | |
| [ | Case-1 | 4 | 2368 |
| Case-2 | 7 | 3904 | |
| Ours | Case-1 | 4 | 2848 |
| Case-2 | 8 | 4416 |
Execution time of various cryptographic operations.
| Symbol | Description | Approximate Computation Time (s) |
|---|---|---|
|
| Hash function | 0.00032 |
|
| ECC point multiplication | 0.0171 |
|
| ECC point addition | 0.0044 |
|
| Symmetric encryption/decryption | 0.0056 |
|
| Fuzzy extractor function | 0.0171 |
Computational cost comparison.
| Protocols | User | HGWN | FGWN | Sensor | Total (s) | |
|---|---|---|---|---|---|---|
| [ | Case-1 |
|
| - |
| 0.20092 |
| [ | Case-1 |
|
| - |
| 0.00640 |
| Case-2 |
|
|
|
| 0.00672 | |
| [ | Case-1 |
|
| - |
| 0.04494 |
| Case-2 |
| 0 |
|
| 0.05118 | |
| [ | Case-1 |
|
| - |
| 0.00768 |
| Case-2 |
|
|
|
| 0.00928 | |
| [ | Case-1 |
|
| - |
| 0.00992 |
| Case-2 |
|
|
|
| 0.01376 | |
| Ours | Case-1 |
|
| - |
| 0.16094 |
| Case-2 |
|
|
|
| 0.38780 |