Abstract
Internet of Things is one of the prevalent and inevitable trends of the current era where data is found to be scattered among sensing devices. This paper addresses about preserving the privacy and security of the data that is distributed among the sensors collected by the users in Industrial Internet of Things infrastructure domain. This work adopts a dynamic authentication key agreement strategy which permits authenticated users to access the data which is distributed among various IoT sensing devices. In the proposed work an efficient Key Agreement and Authentication Scheme is designed to ensure the establishment of secure data communication. The model called Real-or-Random and tool named Automated Validation of Internet Security Protocols are deployed to ensure the secured transmission of data collected by innumerous sensors deployed across the network. Scaling of the network is done by addition of new nodes followed by pre-deployment phase and restoration of the transmission route is done effectively if any intrusion is found. The performance of the scheme is validated by measuring the parameters such as throughput, residual energy, packet dropping rate and delay analysis and it is found that the proposed scheme is superior compared with existing schemes.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Geetha S (2020) Umarani : cloud integrated IoT enabled sensor network security: research issues and solutions. Wireless Pers Commun 113:747–771
Xiangwang H, Zhiyuan R, Kun Y, Chen C, Hailin Z, Yao X (2019) IIoT-MEC: a novel mobile edge computing framework for 5G-enabled IIoT
Tessema M, Abdulrahman A, Abdullah A, Yousef A, Dunren C (2017) A no data center solution to cloud computing. In: IEEE 10th International Conference on Cloud Computing. pp. 714–717
Kai F, Qiang P, Junxiong W, Tingting L, Hui L, Yintang Y (2018) Cross-domain based data sharing scheme in cooperative edge computing. In: IEEE International Conference on Edge Computing. pp. 87–92
Alka L, Rao P (2017) Platforms for big data analytics: trend towards hybrid era. In: International Conference on Energy, Communication, Data Analytics and Soft Computing. pp. 3235–3238
Ahmad AS, Sumari AD (2017) Cognitive artificial intelligence: brain-inspired intelligent computation in artificial intelligence. In: Computing Conference, 135–141
Geetha M (2019) Padmavathy, lallithasree: a light weight secure communication scheme for wireless sensor networks. Wireless Pers Commun 108:1957–1976
Geetha P (2020) Thilagam, lallithasree : tamilian cryptography: an efficient hybrid symmetric key encryption algorithm. Wireless Pers Commun 112:21–36
Gope P, Sikdar B (2018) An efficient data aggregation scheme for privacy-friendly dynamic pricing-based billing and demand-response management in smart grids. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2018.2833863
Mishra N, Shahid HM, Tripathi JP (2015) A compendium over cloud computing cryptographic algorithms and security issues. BIJIT—BVICAM’s International Journal of Information Technology. Vol. 7 Ndrseco. 1; ISSN 0973–5658
Yeh H-L, Chen T-H, Liu P-C, Kim T-H, Wei H-W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779
Gope P, Hwang T (2016) BSN-care: a secure IoT-based modern healthcare system using body sensor network. IEEE Sensors J 16(5):1368–1376
Chang C-C, Le H-D (2016) A provably secure, efficient and flexible authentication scheme for Ad hoc wireless sensor networks. IEEE Trans Wirel Commun 15(1):357–366
Pandey A, Saini JR (2017) Comprehensive security mechanism for defending cyber attacks based upon spoofing and poisoning. BIJIT—BVICAM’s Int J Inf Technol. 8(2). ISSN 0973–5658
Sriharsha B, Zabiullah, Vishnu S B, Sanju V (2016) Password protected locking system using arduino. BVICAM’s Int J Inf Technol. 8(1). ISSN 0973–5658 959
Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sensor Netw. 2013:1–7
Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2018) Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet Things J 5(1):269–282
Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo K-KR (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194–204
Gope P, Sikdar B (2018) Privacy-aware authenticated key agreement scheme for secure smart grid communication. IEEE Trans Smart Grid. https://doi.org/10.1109/TSG.2018.2844403
Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772
Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2017.2714179
Wazid M, Das AK, Khan MK, Al-Ghaiheb AAD, Kumar N, Vasilakos AV (2017) Secure authentication scheme for medicine anti-counterfeiting system in IoT environment. IEEE Internet Things J 4(5):1634–1646
Hameed K, Khan A, Ahmed M, Reddy AG, Rathore MM (2018) Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks. Future Gener Comput Syst. 82:274–289
Gope P, Lee J, Quek TQS (2018) Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Trans Inf Forensics Secur 13(11):2831–2843
Jiang Q, Ma J, Wei F, Tian Y, Shen J, Yang Y (2016) An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J Netw Comput Appl 76:37–48
Beigh BM (2015) Framework for choosing best intrusion detection system. BIJIT—BVICAM’s Int J Inf Technol. 7(1); ISSN 0973–5658 821
Funding
No funding.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
No Competing interest.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Srikanth, G.U., Geetha, R. & Prabhu, S. An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems. Int. j. inf. tecnol. 15, 1221–1230 (2023). https://doi.org/10.1007/s41870-023-01173-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-023-01173-2