Abstract
The Internet of Things is a well-known and emerging technology that allows authorised users to monitor and access sensors deployed in various industrial units. A robust key management protocol for industrial sensor network system is used to provide for such access and monitoring. The difficulty emerges when it comes to establishing a secure mutual authentication framework that allows users to safely communicate with sensors installed in Industrial Internet of Things (IIoT) systems. In the literature, only a few fundamental agreement protocols have been shown to be effective. Such protocols, however, have higher processing and communication costs. So, the objective would be to develop an effective mutual authentication approach that outperforms existing protocols. Therefore, we propose a secure key management framework that is both computationally and communicatively efficient. Additionally, the proposed mutual authentication framework allows users to securely communicate with sensors. The objective of this research is to provide a robust, secure, and anonymity preserving three-factor mutual authentication framework for the IIoT in order to eliminate any security vulnerabilities. We used widely known random oracle models and Scyther tool stimulation’s to perform both informal and formal security analysis on the proposed scheme, ensuring that it is secure against all known security risks. The performance study demonstrates that the suggested framework is more efficient and lightweight than other existing frameworks. In addition, in a resource-constrained IIoT context, the suggested framework is relatively easy to implement.
Similar content being viewed by others
Availability of data and materials
Not applicable.
References
Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener Comput Syst 78:1005–1019
Kumar V, Mahmoud MS, Alkhayyat A, Srinivas J, Ahmad M, Kumari A (2022) RAPCHI: robust authentication protocol for IoMT-based cloud-healthcare infrastructure. J Supercomput 78:16167–16196
Kumar V, Kumar R, Khan AA, Kumar V, Chen Y-C, Chang C-C (2022) RAFI: robust authentication framework for IoT-based RFID infrastructure. Sensors 22(9):3110
Ahmed MR, Huang X, Sharma D, Cui H (2012) Wireless sensor network: characteristics and architectures. Int J Inf Commun Eng 6(12):1398–1401
Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443
Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun. 8(3):1086–1090
Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors 10(3):2450–2459
He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10(4):361–371
Lee C-C, Li C-T, Chen S-D (2011) Two attacks on a two-factor user authentication in wireless sensor networks. Parallel Process Lett 21(01):21–26
Vaidya B, Makrakis D, Mouftah H (2016) Two-factor mutual authentication with key agreement in wireless sensor networks. Secur Commun Netw 9(2):171–183
Kim J, Lee D, Jeon W, Lee Y, Won D (2014) Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4):6443–6462
Chang I-P, Lee T-F, Lin T-H, Liu C-M (2015) Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks. Sensors 15(12):29841–29854
Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sens Netw 9(4):730831
Yeh H-L, Chen T-H, Liu P-C, Kim T-H, Wei H-W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779
Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10081–10106
Nam J, Kim M, Paik J, Lee Y, Won D (2014) A provably-secure ECC-based authentication scheme for wireless sensor networks. Sensors 14(11):21023–21044
Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376–3392
Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2017) A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans Ind Inform 14(8):3599–3609
Sadhukhan D, Ray S, Biswas G, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J Supercomput 77(2):1114–1151
Amin R, Islam SH, Biswas G, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener Comput Syst 80:483–495
Ali R, Pal AK, Kumari S, Sangaiah AK, Li X, Wu F (2018) An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-1015-9
Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132–146
Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154
Ray S, Biswas G, Dasgupta M (2016) Secure multi-purpose mobile-banking using elliptic curve cryptography. Wirel Pers Commun 90(3):1331–1354
Ali R, Pal AK, Kumari S, Karuppiah M, Conti M (2018) A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Future Gener Comput Syst 84:200–215
Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJ (2018) Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment. IEEE Internet Things J 5(6):4900–4913
Shuai M, Xiong L, Wang C, Yu N (2020) A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem. Comput Commun 160:215–227
Rangwani D, Sadhukhan D, Ray S, Khan MK, Dasgupta M (2021) A robust provable-secure privacy-preserving authentication protocol for industrial internet of things. Peer-to-Peer Netw Appl 14(3):1548–1571
Vinoth R, Deborah LJ (2021) An efficient key agreement and authentication protocol for secure communication in industrial IoT applications. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-021-03167-z
Wang C, Xu G, Sun J (2017) An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors 17(12):2946
Li N, Guo F, Mu Y, Susilo W, Nepal S (2017) Fuzzy extractors for biometric identification. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp 667–677
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208
Canetti R, Krawczyk H (2002) Universally composable notions of key exchange and secure channels. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 337–351
Khan AA, Kumar V, Ahmad M, Rana S (2021) LAKAF: lightweight authentication and key agreement framework for smart grid network. J Syst Archit 116:102053
Abdalla M, Chevassut O, Fouque P-A, Pointcheval D (2005) A simple threshold authenticated key exchange from short secrets. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 566–584
Cremers CJ (2008) The Scyther tool: verification, falsification, and analysis of security protocols. In: International conference on computer aided verification. Springer, pp 414–418
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
SI and VK helped in conceptualization, methodology, visualization ; SI, VK, and MA contributed to software, validation, formal analysis, investigation, data curation, writing—original draft preparation; SI, VK, MA, and AA were involved in resources, writing-review and editing, supervision.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no competing interests.
Ethical approval
The manuscript is not currently being considered for publication elsewhere.
Consent for publication
All authors are agreed for publication.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Itoo, S., Ahmad, M., Kumar, V. et al. RKMIS: robust key management protocol for industrial sensor network system. J Supercomput 79, 9837–9865 (2023). https://doi.org/10.1007/s11227-022-05041-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-05041-x