Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications

Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Mamoun Alazab

    Research output: Contribution to journalArticlepeer-review

    33 Citations (Scopus)

    Abstract

    6G-enabled network in a box (NIB) is a multigenerational, rapidly deployable hardware, and software technology for the communication. 6G-enabled NIB provides high level of flexibility which makes it capable to provide connectivity services for different types of applications as it is effective for the communications of after disaster scenario, battlefields scenario, and industrial scenario. In 6G-enabled NIB deployed industrial applications, various passive and active attacks are possible because the involved entities communicate over insecure channel. In this article, a new remote user authentication and key management scheme is proposed for securing 6G-enabled NIB deployed for industrial applications, which we call in short as UAKMS-NIB. The security analysis shows the resilience of UAKMS-NIB against various types of possible attacks. The practical demonstration of UAKMS-NIB is also provided to measure its impact on the network performance parameters. Finally, a comparative analysis with other closely related existing schemes shows that UAKMS-NIB performs better than the existing schemes.

    Original languageEnglish
    Article number9181484
    Pages (from-to)7174-7184
    Number of pages11
    JournalIEEE Transactions on Industrial Informatics
    Volume17
    Issue number10
    Early online date31 Aug 2020
    DOIs
    Publication statusPublished - Oct 2021

    Bibliographical note

    Funding Information:
    Manuscript received May 29, 2020; revised July 13, 2020; accepted August 25, 2020. Date of publication August 31, 2020; date of current version June 30, 2021. This work was supported in part by the Ripple Centre of Excellence Scheme, CoE in Blockchain under Sanction IIIT/R&D Office/Internal Projects/001/2019, IIIT Hyderabad, India, and in part by the Mathematical Research Impact Centric Support (MATRICS) project funded by the Science and Engineering Research Board (SERB), India under Reference MTR/2019/000699. Paper no. TII-20-2664. (Corresponding authors: Ashok Kumar Das; Neeraj Kumar.) Mohammad Wazid is with the Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun 248002, India (e-mail: [email protected]).

    Publisher Copyright:
    © 2005-2012 IEEE.

    Copyright:
    Copyright 2021 Elsevier B.V., All rights reserved.

    Fingerprint

    Dive into the research topics of 'Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications'. Together they form a unique fingerprint.

    Cite this