Khalid Mahmood , Muhammad Asad Saleem , Zahid Ghaffar , Salman Shamshad , Ashok Kumar Das , Mohammed J.F. Alenazi
{"title":"Robust and efficient three-factor authentication solution for WSN-based industrial IoT deployment","authors":"Khalid Mahmood , Muhammad Asad Saleem , Zahid Ghaffar , Salman Shamshad , Ashok Kumar Das , Mohammed J.F. Alenazi","doi":"10.1016/j.iot.2024.101372","DOIUrl":null,"url":null,"abstract":"<div><div>The relentless advancements in Cyber-Physical Systems (CPS) and Wireless Sensor Networks (WSN) have paved the way for various practical applications across networking, public safety, smart transportation, and industrial sectors. The Industrial Internet of Things (IIoT) integrates these technologies into complex, interconnected environments where vast amounts of data are transmitted between devices and systems. However, the inherent openness of communication channels in IIoT systems introduces distinctive security and privacy vulnerabilities, where malevolent entities can effortlessly intercept, forge, or delete communication messages. These vulnerabilities are exacerbated by the critical nature of industrial applications, where breaches can lead to significant operational disruptions or safety hazards To address these challenges, several authentication protocols have been proposed. Nevertheless, many of these protocols remain susceptible to various security attacks. To ensure privacy and security in IIoT environments, we introduce a robust and efficient authentication protocol for a WSN-based IIoT environment. This protocol preserves the privacy of information transmitted among all entities and provides an effective solution for securing this sensitive information. Additionally, we present a detailed security analysis of the proposed protocol to formally and informally demonstrate its security strength. The performance analysis is carried out to compare the proposed protocol against existing related protocols, with results unequivocally demonstrating that our protocol offers enhanced privacy and security with reduced costs.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"28 ","pages":"Article 101372"},"PeriodicalIF":6.0000,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2542660524003135","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The relentless advancements in Cyber-Physical Systems (CPS) and Wireless Sensor Networks (WSN) have paved the way for various practical applications across networking, public safety, smart transportation, and industrial sectors. The Industrial Internet of Things (IIoT) integrates these technologies into complex, interconnected environments where vast amounts of data are transmitted between devices and systems. However, the inherent openness of communication channels in IIoT systems introduces distinctive security and privacy vulnerabilities, where malevolent entities can effortlessly intercept, forge, or delete communication messages. These vulnerabilities are exacerbated by the critical nature of industrial applications, where breaches can lead to significant operational disruptions or safety hazards To address these challenges, several authentication protocols have been proposed. Nevertheless, many of these protocols remain susceptible to various security attacks. To ensure privacy and security in IIoT environments, we introduce a robust and efficient authentication protocol for a WSN-based IIoT environment. This protocol preserves the privacy of information transmitted among all entities and provides an effective solution for securing this sensitive information. Additionally, we present a detailed security analysis of the proposed protocol to formally and informally demonstrate its security strength. The performance analysis is carried out to compare the proposed protocol against existing related protocols, with results unequivocally demonstrating that our protocol offers enhanced privacy and security with reduced costs.
期刊介绍:
Internet of Things; Engineering Cyber Physical Human Systems is a comprehensive journal encouraging cross collaboration between researchers, engineers and practitioners in the field of IoT & Cyber Physical Human Systems. The journal offers a unique platform to exchange scientific information on the entire breadth of technology, science, and societal applications of the IoT.
The journal will place a high priority on timely publication, and provide a home for high quality.
Furthermore, IOT is interested in publishing topical Special Issues on any aspect of IOT.