TY - JOUR
T1 - 3P-SAKE
T2 - Privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks
AU - Masud, Mehedi
AU - Alazab, Mamoun
AU - Choudhary, Karanjeet
AU - Gaba, Gurjot Singh
N1 - Funding Information:
All authors approved the version of the manuscript to be published.
Publisher Copyright:
© 2021 Elsevier B.V.
Copyright:
Copyright 2021 Elsevier B.V., All rights reserved.
PY - 2021/7/1
Y1 - 2021/7/1
N2 - A new industrial revolution is emerging with the Internet of Things (IoT) growing use in enabling the machine to machine communication between the devices, sensors, actuators, and gateways. IoT lets the communication across devices and the network happen in real-time and helps make technologically smart homes, smart hospitals, and smart industrial applications. The authentication schemes in IoT have to be robust and lightweight to be useful for resource-constrained real-time applications where user privacy and physical security are the priority concerns. The IoT devices are prone to physical attacks due to their installation in hostile environments. The intruders want to physically capture the IoT nodes for cloning and accessing the stored confidential information, thus necessitating IoT nodes’ physical protection. This article proposes a less expensive and physically secured user authentication and secure key exchange protocol for industry 4.0 applications. Physically unclonable functions (PUF), hash, and XOR operations are used in the proposed method to attain robustness and efficiency. The scheme's other benefits include low computational cost, retaining the device's confidentiality, safety from major security threats, low communication, and storage overhead.
AB - A new industrial revolution is emerging with the Internet of Things (IoT) growing use in enabling the machine to machine communication between the devices, sensors, actuators, and gateways. IoT lets the communication across devices and the network happen in real-time and helps make technologically smart homes, smart hospitals, and smart industrial applications. The authentication schemes in IoT have to be robust and lightweight to be useful for resource-constrained real-time applications where user privacy and physical security are the priority concerns. The IoT devices are prone to physical attacks due to their installation in hostile environments. The intruders want to physically capture the IoT nodes for cloning and accessing the stored confidential information, thus necessitating IoT nodes’ physical protection. This article proposes a less expensive and physically secured user authentication and secure key exchange protocol for industry 4.0 applications. Physically unclonable functions (PUF), hash, and XOR operations are used in the proposed method to attain robustness and efficiency. The scheme's other benefits include low computational cost, retaining the device's confidentiality, safety from major security threats, low communication, and storage overhead.
KW - Hardware security
KW - Industrial IoT
KW - Industry 4.0
KW - Internet of Things
KW - Key agreement
KW - Lightweight authentication
UR - http://www.scopus.com/inward/record.url?scp=85105520478&partnerID=8YFLogxK
U2 - 10.1016/j.comcom.2021.04.021
DO - 10.1016/j.comcom.2021.04.021
M3 - Article
AN - SCOPUS:85105520478
SN - 0140-3664
VL - 175
SP - 82
EP - 90
JO - Computer Communications
JF - Computer Communications
ER -