RKMIS: robust key management protocol for industrial sensor network system
The Internet of Things is a well-known and emerging technology that allows authorised users to monitor and access sensors deployed in various industrial units. A robust key management protocol for industrial sensor network system is used to provide for such access and monitoring. The difficulty emer...
Gespeichert in:
Veröffentlicht in: | The Journal of supercomputing 2023-06, Vol.79 (9), p.9837-9865 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The Internet of Things is a well-known and emerging technology that allows authorised users to monitor and access sensors deployed in various industrial units. A robust key management protocol for industrial sensor network system is used to provide for such access and monitoring. The difficulty emerges when it comes to establishing a secure mutual authentication framework that allows users to safely communicate with sensors installed in Industrial Internet of Things (IIoT) systems. In the literature, only a few fundamental agreement protocols have been shown to be effective. Such protocols, however, have higher processing and communication costs. So, the objective would be to develop an effective mutual authentication approach that outperforms existing protocols. Therefore, we propose a secure key management framework that is both computationally and communicatively efficient. Additionally, the proposed mutual authentication framework allows users to securely communicate with sensors. The objective of this research is to provide a robust, secure, and anonymity preserving three-factor mutual authentication framework for the IIoT in order to eliminate any security vulnerabilities. We used widely known random oracle models and Scyther tool stimulation’s to perform both informal and formal security analysis on the proposed scheme, ensuring that it is secure against all known security risks. The performance study demonstrates that the suggested framework is more efficient and lightweight than other existing frameworks. In addition, in a resource-constrained IIoT context, the suggested framework is relatively easy to implement. |
---|---|
ISSN: | 0920-8542 1573-0484 |
DOI: | 10.1007/s11227-022-05041-x |