{"title":"基于边缘服务器的工业物联网高安全批量消息认证协议","authors":"Han Yu , Jianhong Zhou , Maode Ma","doi":"10.1016/j.jisa.2025.104075","DOIUrl":null,"url":null,"abstract":"<div><div>As the number of smart devices increases dramatically in industrial IoT (IIoT) systems, a large amount of privacy-sensitive data could be generated in manufacturing operations, and more message authentication operations need to be performed. Meanwhile, the processing of such data has to meet stringent requirements on communication latency, reliability, and security. However, the resource constraint in the IIoT systems prevents legacy resource-intensive security measures from being used directly in the systems. To address the massive data security issue with the consideration of the limitations of resource-constrained devices, we propose a new batch message authentication protocol supported by edge computing. Specifically, we propose to offload message authentication operations to the edge servers to reduce the authentication burden on the devices. Meanwhile, the protocol uses certificateless aggregate signatures to verify the legitimacy of messages in large batches, significantly reducing signaling overhead and avoiding key escrow. The proposed protocol has been formally verified by using Scyther tool, which demonstrates its capacity against major typical malicious attacks. Furthermore, the performance evaluation results show that the proposed protocol is efficient in terms of computational and communication costs.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"92 ","pages":"Article 104075"},"PeriodicalIF":3.8000,"publicationDate":"2025-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A high-security batch message authentication protocol assisted by edge servers in industrial Internet of Things\",\"authors\":\"Han Yu , Jianhong Zhou , Maode Ma\",\"doi\":\"10.1016/j.jisa.2025.104075\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>As the number of smart devices increases dramatically in industrial IoT (IIoT) systems, a large amount of privacy-sensitive data could be generated in manufacturing operations, and more message authentication operations need to be performed. Meanwhile, the processing of such data has to meet stringent requirements on communication latency, reliability, and security. However, the resource constraint in the IIoT systems prevents legacy resource-intensive security measures from being used directly in the systems. To address the massive data security issue with the consideration of the limitations of resource-constrained devices, we propose a new batch message authentication protocol supported by edge computing. Specifically, we propose to offload message authentication operations to the edge servers to reduce the authentication burden on the devices. Meanwhile, the protocol uses certificateless aggregate signatures to verify the legitimacy of messages in large batches, significantly reducing signaling overhead and avoiding key escrow. The proposed protocol has been formally verified by using Scyther tool, which demonstrates its capacity against major typical malicious attacks. Furthermore, the performance evaluation results show that the proposed protocol is efficient in terms of computational and communication costs.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"92 \",\"pages\":\"Article 104075\"},\"PeriodicalIF\":3.8000,\"publicationDate\":\"2025-05-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625001127\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625001127","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
A high-security batch message authentication protocol assisted by edge servers in industrial Internet of Things
As the number of smart devices increases dramatically in industrial IoT (IIoT) systems, a large amount of privacy-sensitive data could be generated in manufacturing operations, and more message authentication operations need to be performed. Meanwhile, the processing of such data has to meet stringent requirements on communication latency, reliability, and security. However, the resource constraint in the IIoT systems prevents legacy resource-intensive security measures from being used directly in the systems. To address the massive data security issue with the consideration of the limitations of resource-constrained devices, we propose a new batch message authentication protocol supported by edge computing. Specifically, we propose to offload message authentication operations to the edge servers to reduce the authentication burden on the devices. Meanwhile, the protocol uses certificateless aggregate signatures to verify the legitimacy of messages in large batches, significantly reducing signaling overhead and avoiding key escrow. The proposed protocol has been formally verified by using Scyther tool, which demonstrates its capacity against major typical malicious attacks. Furthermore, the performance evaluation results show that the proposed protocol is efficient in terms of computational and communication costs.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.