利用边缘节点的基于ecc的资源受限设备轻量级认证

IF 5.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Mitrup Kabi;Neelam Dayal;Pushpa Raikwal
{"title":"利用边缘节点的基于ecc的资源受限设备轻量级认证","authors":"Mitrup Kabi;Neelam Dayal;Pushpa Raikwal","doi":"10.1109/TR.2025.3562300","DOIUrl":null,"url":null,"abstract":"CPS have undergone significant evolution, integrating computational elements with physical processes to create intelligent, interconnected systems. However, their interconnected nature exposes them to diverse security threats. Authentication emerges as a critical aspect of CPS security, yet traditional methods face limitations, particularly for resource-constrained devices. In this article, we address these challenges by proposing a secure and efficient authentication mechanism based on elliptic curve cryptography. We provide a formal proof of its security using the Mao–Boyd logic and Proverif, ensuring resilience against known attacks. In addition, we compare the performance of the proposed scheme with other established schemes, demonstrating its effectiveness in enhancing CPS security without compromising operational efficiency. Proposed research contributes to the ongoing effort to fortify CPS against evolving cyber threats, fostering safer and more resilient systems for various applications.","PeriodicalId":56305,"journal":{"name":"IEEE Transactions on Reliability","volume":"74 2","pages":"2605-2612"},"PeriodicalIF":5.7000,"publicationDate":"2025-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ECC-Based Lightweight Authentication for Resource-Constrained Devices Leveraging the Edge Node\",\"authors\":\"Mitrup Kabi;Neelam Dayal;Pushpa Raikwal\",\"doi\":\"10.1109/TR.2025.3562300\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"CPS have undergone significant evolution, integrating computational elements with physical processes to create intelligent, interconnected systems. However, their interconnected nature exposes them to diverse security threats. Authentication emerges as a critical aspect of CPS security, yet traditional methods face limitations, particularly for resource-constrained devices. In this article, we address these challenges by proposing a secure and efficient authentication mechanism based on elliptic curve cryptography. We provide a formal proof of its security using the Mao–Boyd logic and Proverif, ensuring resilience against known attacks. In addition, we compare the performance of the proposed scheme with other established schemes, demonstrating its effectiveness in enhancing CPS security without compromising operational efficiency. Proposed research contributes to the ongoing effort to fortify CPS against evolving cyber threats, fostering safer and more resilient systems for various applications.\",\"PeriodicalId\":56305,\"journal\":{\"name\":\"IEEE Transactions on Reliability\",\"volume\":\"74 2\",\"pages\":\"2605-2612\"},\"PeriodicalIF\":5.7000,\"publicationDate\":\"2025-03-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Reliability\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10982236/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Reliability","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10982236/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

CPS经历了重大的发展,将计算元素与物理过程相结合,创造出智能、互联的系统。然而,它们相互关联的特性使它们面临各种安全威胁。身份验证成为CPS安全的一个关键方面,但传统方法面临局限性,特别是对于资源受限的设备。在本文中,我们通过提出一种基于椭圆曲线加密的安全高效的身份验证机制来解决这些挑战。我们使用Mao-Boyd逻辑和Proverif提供了其安全性的正式证明,确保了对已知攻击的弹性。此外,我们将建议方案的表现与其他现有方案进行比较,证明其在不影响运作效率的情况下,有效地提高了CPS的安全性。拟议的研究有助于加强CPS应对不断变化的网络威胁的持续努力,为各种应用培养更安全、更有弹性的系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
ECC-Based Lightweight Authentication for Resource-Constrained Devices Leveraging the Edge Node
CPS have undergone significant evolution, integrating computational elements with physical processes to create intelligent, interconnected systems. However, their interconnected nature exposes them to diverse security threats. Authentication emerges as a critical aspect of CPS security, yet traditional methods face limitations, particularly for resource-constrained devices. In this article, we address these challenges by proposing a secure and efficient authentication mechanism based on elliptic curve cryptography. We provide a formal proof of its security using the Mao–Boyd logic and Proverif, ensuring resilience against known attacks. In addition, we compare the performance of the proposed scheme with other established schemes, demonstrating its effectiveness in enhancing CPS security without compromising operational efficiency. Proposed research contributes to the ongoing effort to fortify CPS against evolving cyber threats, fostering safer and more resilient systems for various applications.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Reliability
IEEE Transactions on Reliability 工程技术-工程:电子与电气
CiteScore
12.20
自引率
8.50%
发文量
153
审稿时长
7.5 months
期刊介绍: IEEE Transactions on Reliability is a refereed journal for the reliability and allied disciplines including, but not limited to, maintainability, physics of failure, life testing, prognostics, design and manufacture for reliability, reliability for systems of systems, network availability, mission success, warranty, safety, and various measures of effectiveness. Topics eligible for publication range from hardware to software, from materials to systems, from consumer and industrial devices to manufacturing plants, from individual items to networks, from techniques for making things better to ways of predicting and measuring behavior in the field. As an engineering subject that supports new and existing technologies, we constantly expand into new areas of the assurance sciences.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信