Skip to main content
Log in

ZAO-AKA : a zero knowledge proof chaotic authentication and key agreement scheme for securing smart city cyber physical system

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

A cyber physical system (CPS) integrates and combines physical, computational and communication functionalities to map physical processes to the cyber world. Indeed, a CPS can dynamically monitor, control and modify functional parameters of a physical system by implementing remote real-time sensing and actuation using machine-to-machine communication. Particularly, in a smart city CPS, a number of devices are deployed in hostile areas and time-varying environments to monitor environmental conditions, which rises the risk of security attacks trying to alter its normal operation. Consequently, security mechanisms should be implemented to protect the CPS and secure data exchange between its devices. This paper investigates the design of a security scheme, named zero knowledge proof chaotic authentication and key agreement, for an environmental monitoring CPS, that enables mutual authentication and key agreement between devices. The proposed scheme uses the chaotic Chebyshev polynomial map based public key encryption technique to build private and public keys while validating the devices identities using the zero knowledge proof protocol. Our designed security scheme allows scalable and dynamic distribution of different types of keys to provide authentication and confidentiality services for unicast and multicast traffics. The efficiency analysis of the designed security scheme demonstrates its resilience to many security attacks targeting the CPS. Moreover, the performance evaluation using simulation shows the achievement of devices authentication and keys distribution with an acceptable false rejection rate, a decreased communication overhead and a reduced energy consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Jin, J., Gubbi, J., Marusic, S., & Palaniswami, M. (2014). An information framework of creating a smart city through internet of things. IEEE Internet of Things Journal, 1(2), 112–121. https://doi.org/10.1109/JIOT.2013.2296516.

    Article  Google Scholar 

  2. Park, J. H., Salim, M. M., Jo, J. H., Sicato, J. C. S., Rathore, S., & Park, J. H. (2019). CIoT-Net: A scalable cognitive IoT based smart city network architecture. Human-centric Computing and Information Sciences, 9(29), 1–20. https://doi.org/10.1186/s13673-019-0190-9.

    Article  Google Scholar 

  3. Chen, M., Wan, J., & Li, F. (2012). Machine-to-machine communications: Architectures, standards and applications. KSII Transactions on Internet and Information Systems, 6(2), 480–497. https://doi.org/10.3837/tiis.2012.02.002.

    Article  Google Scholar 

  4. Nguyen TD, Al-Saffar A, Huh EN (2010) A dynamic ID-based authentication scheme. In Proceedings of the sixth international networked computing and advanced information management (NCM) conference, Seoul, South Korea (pp. 248–253).

  5. Agarwal S, Peylo C, Borgaonkar R, Seifert JP (2010) Operator-based over-the-air M2M wireless sensor network security. In Proceedings of the 14th international intelligence in next generation networks (ICIN), Berlin, Germany (pp 1–5). https://doi.org/10.1109/ICIN.2010.5640910

  6. Roman, R., Alcaraz, C., Lopez, J., & Sklavos, N. (2011). Key management systems for sensor networks in the context of the internet of things. Computers & Electrical Engineering, 37(2), 147–159. https://doi.org/10.1016/j.compeleceng.2011.01.009.

    Article  Google Scholar 

  7. Adiga BS, Balamuralidhar P, Rajan MA, Shastry R, Shivraj VL (2012) An identity based encryption using elliptic curve cryptography for secure M2M communication. In Proceedings of the Dgs (SecurIT ’12), Kollam, India, (pp. 68–74). https://doi.org/10.1145/2490428.2490438

  8. Doh I, Lim J, Li S, Chae K (2013) Key establishment and management for secure cellular machine-to-machine communication. In Proceedings of seventh international innovative mobile and internet services in ubiquitous computing conference (IMIS), Taichung, Tiwan (pp. 579–584). https://doi.org/10.1109/IMIS.2013.102

  9. Chen S, Ma M (2013) A dynamic-encryption authentication scheme for M2M security in cyber-physical systems. In Proceedings of IEEE global communications conf. (GLOBECOM), Atlanta, USA (pp. 2897–2901). https://doi.org/10.1109/GLOCOM.2013.6831514

  10. Hussen HR, Tizazu GA, Ting M, Lee T, Choi Y, Kim KH (2013) SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN). In Proceedings of fifth international ubiquitous and future networks (ICUFN), Da Nang, Vietnam (pp. 246–251). https://doi.org/10.1109/ICUFN.2013.6614820

  11. Saied YB, Olivereau A, Zeghlache D (2011) Energy efficiency in M2M networks: A cooperative key establishment system. In Proceedings of the 3rd international ultra modern telecommunications and control systems and workshops (ICUMT), Budapest, Hungary (pp. 1–8)

  12. Xu Z, Liu X, Zhang G, He W (2008) A certificateless signature scheme for mobile wireless cyber-physical systems. In Proceedings of The 28th international conference on distributed computing systems workshops, Beijing, China (pp. 489–494). https://doi.org/10.1109/ICDCS.Workshops.2008.84

  13. Zhang Y, Chen J, Li H, Zhang W, Cao J, Lai C (2012) Dynamic group based authentication protocol for machine type communications. In Proceedings of the 4th international intelligent networking and collaborative systems (INCoS) conference. https://doi.org/10.1109/iNCoS.2012.86

  14. Anjum, F. (2010). Location dependent key management in sensor networks without using deployment knowledge. Journal of Wireless Networks, 16(6), 1587–1600. https://doi.org/10.1007/s11276-008-0145-y.

    Article  Google Scholar 

  15. Abdallah W, Boudriga N (2016) A location-aware authentication and key management scheme for wireless sensor networks. In Proceedings of the 22nd Asia-pacific conference on communications (APCC), Yogyakarta, Indonesia. https://doi.org/10.1109/APCC.2016.7581460.

  16. Boubakri W, Abdallah W, Boudriga N (2017) Chaotic ZKP based authentication and key distribution scheme in environmental monitoring CPS. In Proceedings of the 3rd international Symposium on Ubiquitous Networking (UNet 2017), Casablanca, Morocco (pp. 472–483). https://doi.org/10.1007/978-3-319-68179-5_41

  17. Boubakri W, walid Abdllah, Boudriga N (December 2014) A chaos-based authentication and key management scheme for M2M communication. In Proceedings of the The 9th international conference for internet technology and secured transactions (ICITST), London, UK. https://doi.org/10.1109/ICITST.2014.7038839.

  18. Amine A, Mohamed OA, Benattallah B (2014) Identity-based encryption protocol for privacy and authentication in wireless networks, IGI global, chap network security technologies: Design and applications (pp. 129–155). https://doi.org/10.4018/978-1-4666-4789-3.ch009.

  19. Chen, Y. W., Wang, J. T., Chi, K. H., & Tseng, C. C. (2012). Group-based authentication and key agreement. Wireless Personal Communications, 62(4), 965–979. https://doi.org/10.1007/s11277-010-0104-7.

    Article  Google Scholar 

  20. Murthy BS, Sumalatha L (2017) A distributed authentication and key exchange approach for secure M2M communications. In Proceedings of the 3rd international conference on applied and theoretical computing and communication technology (iCATccT), Tumkur, India. https://doi.org/10.1109/ICATCCT.2017.8389148.

  21. Parne, B. L., Parne, B. L., & Gupta, S. (2018). SEGB: security enhanced group based AKA Protocol for M2M communication in an IoT enabled LTE/LTE-a network. IEEE Access, 6, 3668–3684. https://doi.org/10.1109/ACCESS.2017.2788919.

    Article  Google Scholar 

  22. Li, K., Ni, W., Emami, Y., Shen, Y., Severino, R., Pereira, D., & Tovar, E. (2019). Design and implementation of secret key agreement for platoon-based vehicular cyber-physical systems. ACM Transactions on Cyber-Physical Systems. https://doi.org/10.1145/3365996.

    Article  Google Scholar 

  23. Wu, F., Xu, L., Li, X., Kumari, S., Karuppiah, M., & Obaidat, M. S. (2019). A lightweight and provably secure key agreement system for a smart grid with elliptic curve cryptography. IEEE Systems Journal, 13(3), 2830–2838. https://doi.org/10.1109/JSYST.2018.2876226.

    Article  Google Scholar 

  24. Khan, A. A., Kumar, V., Ahmad, M., & Rana, S. (2021). LAKAF: Lightweight authentication and key agreement framework for smart grid network. Journal of Systems Architecture, 116, 102053. https://doi.org/10.1016/j.sysarc.2021.102053.

    Article  Google Scholar 

  25. Jadoon, A. K., Li, J., & Wang, L. (2021). Physical layer authentication for automotive cyber physical systems based on modified HB protocol. Frontiers of Computer Science, 15(3), 153809. https://doi.org/10.1007/s11704-020-0010-4.

    Article  Google Scholar 

  26. Algehawi, M. B., & Samsudin, A. (2010). A new identity based encryption IBE scheme using extended Chebyshev map over finite fields Zp. Physics Letters A, 374(46), 4670–4674. https://doi.org/10.1016/j.physleta.2010.09.041.

    Article  MathSciNet  MATH  Google Scholar 

  27. Kong B, Chen H, Tang X, Sezaki K (2010) Key pre-distribution schemes for large-scale wireless sensor networks using hexagon partition. In Proceedings of the IEEE wireless communication and networking conference (WCVC), Sydney, NSW, Australia. https://doi.org/10.1109/WCNC.2010.5506481

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walid Abdallah.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Boubakri, W., Abdallah, W. & Boudriga, N. ZAO-AKA : a zero knowledge proof chaotic authentication and key agreement scheme for securing smart city cyber physical system. Wireless Netw 27, 4199–4215 (2021). https://doi.org/10.1007/s11276-021-02720-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-021-02720-0

Keywords

Navigation