{"title":"基于工业物联网边缘计算的高效 RLWE 隐私保护认证方案","authors":"Yongfei Huang;Guangxia Xu;Xiaoling Song;Yuqing Xu","doi":"10.1109/TSC.2024.3433534","DOIUrl":null,"url":null,"abstract":"An industrial network connects devices, sensors, and other physical devices through wireless networks to collect, share, and analyze data to increase productivity, reduce costs, and improve product quality. Due to the accessibility of wireless channels to everyone, the number of malicious exploits of these services is increasing. Thus, confirming the validity of smart devices and servers and guaranteeing communication security are essential. Mutual authentication has become an essential security concern in wireless communication to meet this tendency. However, available techniques rely on prime factorization and discrete logarithm problems that cannot effectively resist quantum attacks. This study presents an anonymous authentication system based on edge computing for the Industrial Internet of Things (IIoT). Specifically, we devised an RLWE-based authentication method to withstand diverse attacks while improving operating efficiency. The proposed scheme achieves mutual authentication in a single-message exchange round, while ensuring user anonymity and perfect forward security. Security analysis and verification with ProVerif demonstrate that our scheme enhances privacy and reliability. Furthermore, experimental results show that our scheme outperforming existing schemes in terms of communication and computing costs.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":null,"pages":null},"PeriodicalIF":5.5000,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Efficient RLWE-Based Privacy-Preserving Authentication Scheme Based on Edge Computing in Industrial Internet of Things\",\"authors\":\"Yongfei Huang;Guangxia Xu;Xiaoling Song;Yuqing Xu\",\"doi\":\"10.1109/TSC.2024.3433534\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An industrial network connects devices, sensors, and other physical devices through wireless networks to collect, share, and analyze data to increase productivity, reduce costs, and improve product quality. Due to the accessibility of wireless channels to everyone, the number of malicious exploits of these services is increasing. Thus, confirming the validity of smart devices and servers and guaranteeing communication security are essential. Mutual authentication has become an essential security concern in wireless communication to meet this tendency. However, available techniques rely on prime factorization and discrete logarithm problems that cannot effectively resist quantum attacks. This study presents an anonymous authentication system based on edge computing for the Industrial Internet of Things (IIoT). Specifically, we devised an RLWE-based authentication method to withstand diverse attacks while improving operating efficiency. The proposed scheme achieves mutual authentication in a single-message exchange round, while ensuring user anonymity and perfect forward security. Security analysis and verification with ProVerif demonstrate that our scheme enhances privacy and reliability. Furthermore, experimental results show that our scheme outperforming existing schemes in terms of communication and computing costs.\",\"PeriodicalId\":13255,\"journal\":{\"name\":\"IEEE Transactions on Services Computing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":5.5000,\"publicationDate\":\"2024-07-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Services Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10609505/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Services Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10609505/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
An Efficient RLWE-Based Privacy-Preserving Authentication Scheme Based on Edge Computing in Industrial Internet of Things
An industrial network connects devices, sensors, and other physical devices through wireless networks to collect, share, and analyze data to increase productivity, reduce costs, and improve product quality. Due to the accessibility of wireless channels to everyone, the number of malicious exploits of these services is increasing. Thus, confirming the validity of smart devices and servers and guaranteeing communication security are essential. Mutual authentication has become an essential security concern in wireless communication to meet this tendency. However, available techniques rely on prime factorization and discrete logarithm problems that cannot effectively resist quantum attacks. This study presents an anonymous authentication system based on edge computing for the Industrial Internet of Things (IIoT). Specifically, we devised an RLWE-based authentication method to withstand diverse attacks while improving operating efficiency. The proposed scheme achieves mutual authentication in a single-message exchange round, while ensuring user anonymity and perfect forward security. Security analysis and verification with ProVerif demonstrate that our scheme enhances privacy and reliability. Furthermore, experimental results show that our scheme outperforming existing schemes in terms of communication and computing costs.
期刊介绍:
IEEE Transactions on Services Computing encompasses the computing and software aspects of the science and technology of services innovation research and development. It places emphasis on algorithmic, mathematical, statistical, and computational methods central to services computing. Topics covered include Service Oriented Architecture, Web Services, Business Process Integration, Solution Performance Management, and Services Operations and Management. The transactions address mathematical foundations, security, privacy, agreement, contract, discovery, negotiation, collaboration, and quality of service for web services. It also covers areas like composite web service creation, business and scientific applications, standards, utility models, business process modeling, integration, collaboration, and more in the realm of Services Computing.