{"title":"Lightweight Authentication Scheme for Resource-Constrained Devices in IIoT","authors":"Zhong Cao, Xudong Wen, Shan Ai, Haitao Cao, Wenli Shang","doi":"10.1049/cmu2.70039","DOIUrl":null,"url":null,"abstract":"<p>The industrial Internet of Things (IIoT) involves interconnected devices and sensors that exchange data in resource-constrained industrial environments. As the number of IIoT devices grows, ensuring secure communication becomes increasingly important. This paper proposes a lightweight authentication scheme leveraging elliptic curve cryptography (ECC) and other lightweight cryptographic techniques to facilitate secure communication among IIoT devices while minimizing computational, communication, and storage overheads. We conduct thorough security evaluations using a stochastic Oracle model and the automated validation of Internet security protocols and applications (AVISPA) tool, as well as informal security analyses based on the Dolev–Yao channel model to validate the correctness of our approach. Simulation results demonstrate that the proposed scheme offers superior security and computational efficiency compared to existing authentication methods in similar contexts.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70039","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Communications","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cmu2.70039","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
The industrial Internet of Things (IIoT) involves interconnected devices and sensors that exchange data in resource-constrained industrial environments. As the number of IIoT devices grows, ensuring secure communication becomes increasingly important. This paper proposes a lightweight authentication scheme leveraging elliptic curve cryptography (ECC) and other lightweight cryptographic techniques to facilitate secure communication among IIoT devices while minimizing computational, communication, and storage overheads. We conduct thorough security evaluations using a stochastic Oracle model and the automated validation of Internet security protocols and applications (AVISPA) tool, as well as informal security analyses based on the Dolev–Yao channel model to validate the correctness of our approach. Simulation results demonstrate that the proposed scheme offers superior security and computational efficiency compared to existing authentication methods in similar contexts.
期刊介绍:
IET Communications covers the fundamental and generic research for a better understanding of communication technologies to harness the signals for better performing communication systems using various wired and/or wireless media. This Journal is particularly interested in research papers reporting novel solutions to the dominating problems of noise, interference, timing and errors for reduction systems deficiencies such as wasting scarce resources such as spectra, energy and bandwidth.
Topics include, but are not limited to:
Coding and Communication Theory;
Modulation and Signal Design;
Wired, Wireless and Optical Communication;
Communication System
Special Issues. Current Call for Papers:
Cognitive and AI-enabled Wireless and Mobile - https://digital-library.theiet.org/files/IET_COM_CFP_CAWM.pdf
UAV-Enabled Mobile Edge Computing - https://digital-library.theiet.org/files/IET_COM_CFP_UAV.pdf