MSAUPL: A multi-server authentication and key agreement protocol for industrial IoT based on user privacy level

IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS
Yi Wu , Tao Feng , Chunhua Su , Chunyan Liu
{"title":"MSAUPL: A multi-server authentication and key agreement protocol for industrial IoT based on user privacy level","authors":"Yi Wu ,&nbsp;Tao Feng ,&nbsp;Chunhua Su ,&nbsp;Chunyan Liu","doi":"10.1016/j.jisa.2025.103991","DOIUrl":null,"url":null,"abstract":"<div><div>With the rapid development of the Industrial Internet of Things (IIoT), industrial control systems are characterized by increasing complexity of access users and diversity of data sources, making it crucial to implement hierarchical data transmission protocols for industrial servers based on user privacy level. However, traditional industrial systems often lack the flexibility to provide hierarchical services to access users according to their privacy level, leading to frequent incidents of data or privacy disclosure. This study addresses the need for hierarchical data services for various access users in an IIoT environment by proposing a multi-server authentication and key agreement protocol based on user privacy level (MSAUPL). To enhance the security and integrity of message transmission, a multi-factor authentication mechanism is adopted. Considering the computational and storage limitations of IIoT devices, the MSAUPL protocol primarily relies on hash functions for authentication and key agreement. Moreover, to allow access users to derive keys with lower privilege level after completing a single authentication for their privacy level, a key derivation scheme based on a directed graph is introduced. Additionally, to alleviate the storage burden on servers, a multi-level user privilege scheme based on a Merkle tree structure is proposed, enabling servers to efficiently compute different user access level. Finally, security analysis and comprehensive performance evaluation demonstrate that the MSAUPL protocol not only enhances functionality but also significantly reduces resource consumption, making it well-suited for multi-server IIoT environments.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 103991"},"PeriodicalIF":3.8000,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625000298","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

With the rapid development of the Industrial Internet of Things (IIoT), industrial control systems are characterized by increasing complexity of access users and diversity of data sources, making it crucial to implement hierarchical data transmission protocols for industrial servers based on user privacy level. However, traditional industrial systems often lack the flexibility to provide hierarchical services to access users according to their privacy level, leading to frequent incidents of data or privacy disclosure. This study addresses the need for hierarchical data services for various access users in an IIoT environment by proposing a multi-server authentication and key agreement protocol based on user privacy level (MSAUPL). To enhance the security and integrity of message transmission, a multi-factor authentication mechanism is adopted. Considering the computational and storage limitations of IIoT devices, the MSAUPL protocol primarily relies on hash functions for authentication and key agreement. Moreover, to allow access users to derive keys with lower privilege level after completing a single authentication for their privacy level, a key derivation scheme based on a directed graph is introduced. Additionally, to alleviate the storage burden on servers, a multi-level user privilege scheme based on a Merkle tree structure is proposed, enabling servers to efficiently compute different user access level. Finally, security analysis and comprehensive performance evaluation demonstrate that the MSAUPL protocol not only enhances functionality but also significantly reduces resource consumption, making it well-suited for multi-server IIoT environments.
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Information Security and Applications
Journal of Information Security and Applications Computer Science-Computer Networks and Communications
CiteScore
10.90
自引率
5.40%
发文量
206
审稿时长
56 days
期刊介绍: Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信