RKMIS: robust key management protocol for industrial sensor network system

The Internet of Things is a well-known and emerging technology that allows authorised users to monitor and access sensors deployed in various industrial units. A robust key management protocol for industrial sensor network system is used to provide for such access and monitoring. The difficulty emer...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:The Journal of supercomputing 2023-06, Vol.79 (9), p.9837-9865
Hauptverfasser: Itoo, Samiulla, Ahmad, Musheer, Kumar, Vinod, Alkhayyat, Ahmed
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The Internet of Things is a well-known and emerging technology that allows authorised users to monitor and access sensors deployed in various industrial units. A robust key management protocol for industrial sensor network system is used to provide for such access and monitoring. The difficulty emerges when it comes to establishing a secure mutual authentication framework that allows users to safely communicate with sensors installed in Industrial Internet of Things (IIoT) systems. In the literature, only a few fundamental agreement protocols have been shown to be effective. Such protocols, however, have higher processing and communication costs. So, the objective would be to develop an effective mutual authentication approach that outperforms existing protocols. Therefore, we propose a secure key management framework that is both computationally and communicatively efficient. Additionally, the proposed mutual authentication framework allows users to securely communicate with sensors. The objective of this research is to provide a robust, secure, and anonymity preserving three-factor mutual authentication framework for the IIoT in order to eliminate any security vulnerabilities. We used widely known random oracle models and Scyther tool stimulation’s to perform both informal and formal security analysis on the proposed scheme, ensuring that it is secure against all known security risks. The performance study demonstrates that the suggested framework is more efficient and lightweight than other existing frameworks. In addition, in a resource-constrained IIoT context, the suggested framework is relatively easy to implement.
ISSN:0920-8542
1573-0484
DOI:10.1007/s11227-022-05041-x