Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

RKMIS: robust key management protocol for industrial sensor network system

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The Internet of Things is a well-known and emerging technology that allows authorised users to monitor and access sensors deployed in various industrial units. A robust key management protocol for industrial sensor network system is used to provide for such access and monitoring. The difficulty emerges when it comes to establishing a secure mutual authentication framework that allows users to safely communicate with sensors installed in Industrial Internet of Things (IIoT) systems. In the literature, only a few fundamental agreement protocols have been shown to be effective. Such protocols, however, have higher processing and communication costs. So, the objective would be to develop an effective mutual authentication approach that outperforms existing protocols. Therefore, we propose a secure key management framework that is both computationally and communicatively efficient. Additionally, the proposed mutual authentication framework allows users to securely communicate with sensors. The objective of this research is to provide a robust, secure, and anonymity preserving three-factor mutual authentication framework for the IIoT in order to eliminate any security vulnerabilities. We used widely known random oracle models and Scyther tool stimulation’s to perform both informal and formal security analysis on the proposed scheme, ensuring that it is secure against all known security risks. The performance study demonstrates that the suggested framework is more efficient and lightweight than other existing frameworks. In addition, in a resource-constrained IIoT context, the suggested framework is relatively easy to implement.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Availability of data and materials

Not applicable.

References

  1. Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener Comput Syst 78:1005–1019

    Article  Google Scholar 

  2. Kumar V, Mahmoud MS, Alkhayyat A, Srinivas J, Ahmad M, Kumari A (2022) RAPCHI: robust authentication protocol for IoMT-based cloud-healthcare infrastructure. J Supercomput 78:16167–16196

    Article  Google Scholar 

  3. Kumar V, Kumar R, Khan AA, Kumar V, Chen Y-C, Chang C-C (2022) RAFI: robust authentication framework for IoT-based RFID infrastructure. Sensors 22(9):3110

    Article  Google Scholar 

  4. Ahmed MR, Huang X, Sharma D, Cui H (2012) Wireless sensor network: characteristics and architectures. Int J Inf Commun Eng 6(12):1398–1401

    Google Scholar 

  5. Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo K-KR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443

    Article  Google Scholar 

  6. Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun. 8(3):1086–1090

    Article  Google Scholar 

  7. Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors 10(3):2450–2459

    Article  Google Scholar 

  8. He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10(4):361–371

    Google Scholar 

  9. Lee C-C, Li C-T, Chen S-D (2011) Two attacks on a two-factor user authentication in wireless sensor networks. Parallel Process Lett 21(01):21–26

    Article  MATH  MathSciNet  Google Scholar 

  10. Vaidya B, Makrakis D, Mouftah H (2016) Two-factor mutual authentication with key agreement in wireless sensor networks. Secur Commun Netw 9(2):171–183

    Article  Google Scholar 

  11. Kim J, Lee D, Jeon W, Lee Y, Won D (2014) Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4):6443–6462

    Article  Google Scholar 

  12. Chang I-P, Lee T-F, Lin T-H, Liu C-M (2015) Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks. Sensors 15(12):29841–29854

    Article  Google Scholar 

  13. Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sens Netw 9(4):730831

    Article  Google Scholar 

  14. Yeh H-L, Chen T-H, Liu P-C, Kim T-H, Wei H-W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779

    Article  Google Scholar 

  15. Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10081–10106

    Article  Google Scholar 

  16. Nam J, Kim M, Paik J, Lee Y, Won D (2014) A provably-secure ECC-based authentication scheme for wireless sensor networks. Sensors 14(11):21023–21044

    Article  Google Scholar 

  17. Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376–3392

    Article  Google Scholar 

  18. Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2017) A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans Ind Inform 14(8):3599–3609

    Article  Google Scholar 

  19. Sadhukhan D, Ray S, Biswas G, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J Supercomput 77(2):1114–1151

    Article  Google Scholar 

  20. Amin R, Islam SH, Biswas G, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Gener Comput Syst 80:483–495

    Article  Google Scholar 

  21. Ali R, Pal AK, Kumari S, Sangaiah AK, Li X, Wu F (2018) An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-1015-9

    Article  Google Scholar 

  22. Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132–146

    Article  Google Scholar 

  23. Kumari S, Om H (2016) Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. Comput Netw 104:137–154

    Article  Google Scholar 

  24. Ray S, Biswas G, Dasgupta M (2016) Secure multi-purpose mobile-banking using elliptic curve cryptography. Wirel Pers Commun 90(3):1331–1354

    Article  Google Scholar 

  25. Ali R, Pal AK, Kumari S, Karuppiah M, Conti M (2018) A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Future Gener Comput Syst 84:200–215

    Article  Google Scholar 

  26. Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJ (2018) Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment. IEEE Internet Things J 5(6):4900–4913

    Article  Google Scholar 

  27. Shuai M, Xiong L, Wang C, Yu N (2020) A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem. Comput Commun 160:215–227

    Article  Google Scholar 

  28. Rangwani D, Sadhukhan D, Ray S, Khan MK, Dasgupta M (2021) A robust provable-secure privacy-preserving authentication protocol for industrial internet of things. Peer-to-Peer Netw Appl 14(3):1548–1571

    Article  Google Scholar 

  29. Vinoth R, Deborah LJ (2021) An efficient key agreement and authentication protocol for secure communication in industrial IoT applications. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-021-03167-z

    Article  Google Scholar 

  30. Wang C, Xu G, Sun J (2017) An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors 17(12):2946

    Article  Google Scholar 

  31. Li N, Guo F, Mu Y, Susilo W, Nepal S (2017) Fuzzy extractors for biometric identification. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp 667–677

  32. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208

    Article  MATH  MathSciNet  Google Scholar 

  33. Canetti R, Krawczyk H (2002) Universally composable notions of key exchange and secure channels. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 337–351

  34. Khan AA, Kumar V, Ahmad M, Rana S (2021) LAKAF: lightweight authentication and key agreement framework for smart grid network. J Syst Archit 116:102053

    Article  Google Scholar 

  35. Abdalla M, Chevassut O, Fouque P-A, Pointcheval D (2005) A simple threshold authenticated key exchange from short secrets. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 566–584

  36. Cremers CJ (2008) The Scyther tool: verification, falsification, and analysis of security protocols. In: International conference on computer aided verification. Springer, pp 414–418

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

SI and VK helped in conceptualization, methodology, visualization ; SI, VK, and MA contributed to software, validation, formal analysis, investigation, data curation, writing—original draft preparation; SI, VK, MA, and AA were involved in resources, writing-review and editing, supervision.

Corresponding author

Correspondence to Vinod Kumar.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests.

Ethical approval

The manuscript is not currently being considered for publication elsewhere.

Consent for publication

All authors are agreed for publication.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Itoo, S., Ahmad, M., Kumar, V. et al. RKMIS: robust key management protocol for industrial sensor network system. J Supercomput 79, 9837–9865 (2023). https://doi.org/10.1007/s11227-022-05041-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-05041-x

Keywords