Robust and efficient three-factor authentication solution for WSN-based industrial IoT deployment

IF 6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
{"title":"Robust and efficient three-factor authentication solution for WSN-based industrial IoT deployment","authors":"","doi":"10.1016/j.iot.2024.101372","DOIUrl":null,"url":null,"abstract":"<div><div>The relentless advancements in Cyber-Physical Systems (CPS) and Wireless Sensor Networks (WSN) have paved the way for various practical applications across networking, public safety, smart transportation, and industrial sectors. The Industrial Internet of Things (IIoT) integrates these technologies into complex, interconnected environments where vast amounts of data are transmitted between devices and systems. However, the inherent openness of communication channels in IIoT systems introduces distinctive security and privacy vulnerabilities, where malevolent entities can effortlessly intercept, forge, or delete communication messages. These vulnerabilities are exacerbated by the critical nature of industrial applications, where breaches can lead to significant operational disruptions or safety hazards To address these challenges, several authentication protocols have been proposed. Nevertheless, many of these protocols remain susceptible to various security attacks. To ensure privacy and security in IIoT environments, we introduce a robust and efficient authentication protocol for a WSN-based IIoT environment. This protocol preserves the privacy of information transmitted among all entities and provides an effective solution for securing this sensitive information. Additionally, we present a detailed security analysis of the proposed protocol to formally and informally demonstrate its security strength. The performance analysis is carried out to compare the proposed protocol against existing related protocols, with results unequivocally demonstrating that our protocol offers enhanced privacy and security with reduced costs.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":null,"pages":null},"PeriodicalIF":6.0000,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2542660524003135","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The relentless advancements in Cyber-Physical Systems (CPS) and Wireless Sensor Networks (WSN) have paved the way for various practical applications across networking, public safety, smart transportation, and industrial sectors. The Industrial Internet of Things (IIoT) integrates these technologies into complex, interconnected environments where vast amounts of data are transmitted between devices and systems. However, the inherent openness of communication channels in IIoT systems introduces distinctive security and privacy vulnerabilities, where malevolent entities can effortlessly intercept, forge, or delete communication messages. These vulnerabilities are exacerbated by the critical nature of industrial applications, where breaches can lead to significant operational disruptions or safety hazards To address these challenges, several authentication protocols have been proposed. Nevertheless, many of these protocols remain susceptible to various security attacks. To ensure privacy and security in IIoT environments, we introduce a robust and efficient authentication protocol for a WSN-based IIoT environment. This protocol preserves the privacy of information transmitted among all entities and provides an effective solution for securing this sensitive information. Additionally, we present a detailed security analysis of the proposed protocol to formally and informally demonstrate its security strength. The performance analysis is carried out to compare the proposed protocol against existing related protocols, with results unequivocally demonstrating that our protocol offers enhanced privacy and security with reduced costs.
为基于 WSN 的工业物联网部署提供稳健高效的三因素身份验证解决方案
网络物理系统(CPS)和无线传感器网络(WSN)的不断进步为网络、公共安全、智能交通和工业领域的各种实际应用铺平了道路。工业物联网(IIoT)将这些技术集成到复杂的互联环境中,大量数据在设备和系统之间传输。然而,IIoT 系统固有的通信渠道开放性带来了明显的安全和隐私漏洞,恶意实体可以毫不费力地拦截、伪造或删除通信信息。这些漏洞因工业应用的关键性而加剧,在这些应用中,漏洞可能导致严重的运行中断或安全隐患。 为了应对这些挑战,已经提出了几种身份验证协议。然而,其中许多协议仍然容易受到各种安全攻击。为了确保物联网环境中的隐私和安全,我们为基于 WSN 的物联网环境引入了一种稳健高效的身份验证协议。该协议保护了所有实体之间传输信息的隐私,并为保护这些敏感信息提供了有效的解决方案。此外,我们还对提出的协议进行了详细的安全分析,以正式和非正式地证明其安全强度。我们还进行了性能分析,将提议的协议与现有的相关协议进行了比较,结果明确表明我们的协议在降低成本的同时增强了隐私性和安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Internet of Things
Internet of Things Multiple-
CiteScore
3.60
自引率
5.10%
发文量
115
审稿时长
37 days
期刊介绍: Internet of Things; Engineering Cyber Physical Human Systems is a comprehensive journal encouraging cross collaboration between researchers, engineers and practitioners in the field of IoT & Cyber Physical Human Systems. The journal offers a unique platform to exchange scientific information on the entire breadth of technology, science, and societal applications of the IoT. The journal will place a high priority on timely publication, and provide a home for high quality. Furthermore, IOT is interested in publishing topical Special Issues on any aspect of IOT.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信