Skip to main content

Advertisement

Log in

An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems

  • Original Article
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

Internet of Things is one of the prevalent and inevitable trends of the current era where data is found to be scattered among sensing devices. This paper addresses about preserving the privacy and security of the data that is distributed among the sensors collected by the users in Industrial Internet of Things infrastructure domain. This work adopts a dynamic authentication key agreement strategy which permits authenticated users to access the data which is distributed among various IoT sensing devices. In the proposed work an efficient Key Agreement and Authentication Scheme is designed to ensure the establishment of secure data communication. The model called Real-or-Random and tool named Automated Validation of Internet Security Protocols are deployed to ensure the secured transmission of data collected by innumerous sensors deployed across the network. Scaling of the network is done by addition of new nodes followed by pre-deployment phase and restoration of the transmission route is done effectively if any intrusion is found. The performance of the scheme is validated by measuring the parameters such as throughput, residual energy, packet dropping rate and delay analysis and it is found that the proposed scheme is superior compared with existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Geetha S (2020) Umarani : cloud integrated IoT enabled sensor network security: research issues and solutions. Wireless Pers Commun 113:747–771

    Article  Google Scholar 

  2. Xiangwang H, Zhiyuan R, Kun Y, Chen C, Hailin Z, Yao X (2019) IIoT-MEC: a novel mobile edge computing framework for 5G-enabled IIoT

  3. Tessema M, Abdulrahman A, Abdullah A, Yousef A, Dunren C (2017) A no data center solution to cloud computing. In: IEEE 10th International Conference on Cloud Computing. pp. 714–717

  4. Kai F, Qiang P, Junxiong W, Tingting L, Hui L, Yintang Y (2018) Cross-domain based data sharing scheme in cooperative edge computing. In: IEEE International Conference on Edge Computing. pp. 87–92

  5. Alka L, Rao P (2017) Platforms for big data analytics: trend towards hybrid era. In: International Conference on Energy, Communication, Data Analytics and Soft Computing. pp. 3235–3238

  6. Ahmad AS, Sumari AD (2017) Cognitive artificial intelligence: brain-inspired intelligent computation in artificial intelligence. In: Computing Conference, 135–141

  7. Geetha M (2019) Padmavathy, lallithasree: a light weight secure communication scheme for wireless sensor networks. Wireless Pers Commun 108:1957–1976

    Article  Google Scholar 

  8. Geetha P (2020) Thilagam, lallithasree : tamilian cryptography: an efficient hybrid symmetric key encryption algorithm. Wireless Pers Commun 112:21–36

    Article  Google Scholar 

  9. Gope P, Sikdar B (2018) An efficient data aggregation scheme for privacy-friendly dynamic pricing-based billing and demand-response management in smart grids. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2018.2833863

    Article  Google Scholar 

  10. Mishra N, Shahid HM, Tripathi JP (2015) A compendium over cloud computing cryptographic algorithms and security issues. BIJIT—BVICAM’s International Journal of Information Technology. Vol. 7 Ndrseco. 1; ISSN 0973–5658

  11. Yeh H-L, Chen T-H, Liu P-C, Kim T-H, Wei H-W (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779

    Article  Google Scholar 

  12. Gope P, Hwang T (2016) BSN-care: a secure IoT-based modern healthcare system using body sensor network. IEEE Sensors J 16(5):1368–1376

    Article  Google Scholar 

  13. Chang C-C, Le H-D (2016) A provably secure, efficient and flexible authentication scheme for Ad hoc wireless sensor networks. IEEE Trans Wirel Commun 15(1):357–366

    Article  MathSciNet  Google Scholar 

  14. Pandey A, Saini JR (2017) Comprehensive security mechanism for defending cyber attacks based upon spoofing and poisoning. BIJIT—BVICAM’s Int J Inf Technol. 8(2). ISSN 0973–5658

  15. Sriharsha B, Zabiullah, Vishnu S B, Sanju V (2016) Password protected locking system using arduino. BVICAM’s Int J Inf Technol. 8(1). ISSN 0973–5658 959

  16. Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sensor Netw. 2013:1–7

    Google Scholar 

  17. Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2018) Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet Things J 5(1):269–282

    Article  Google Scholar 

  18. Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo K-KR (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194–204

    Article  Google Scholar 

  19. Gope P, Sikdar B (2018) Privacy-aware authenticated key agreement scheme for secure smart grid communication. IEEE Trans Smart Grid. https://doi.org/10.1109/TSG.2018.2844403

    Article  Google Scholar 

  20. Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772

    Article  Google Scholar 

  21. Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2017.2714179

    Article  Google Scholar 

  22. Wazid M, Das AK, Khan MK, Al-Ghaiheb AAD, Kumar N, Vasilakos AV (2017) Secure authentication scheme for medicine anti-counterfeiting system in IoT environment. IEEE Internet Things J 4(5):1634–1646

    Article  Google Scholar 

  23. Hameed K, Khan A, Ahmed M, Reddy AG, Rathore MM (2018) Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks. Future Gener Comput Syst. 82:274–289

    Article  Google Scholar 

  24. Gope P, Lee J, Quek TQS (2018) Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Trans Inf Forensics Secur 13(11):2831–2843

    Article  Google Scholar 

  25. Jiang Q, Ma J, Wei F, Tian Y, Shen J, Yang Y (2016) An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J Netw Comput Appl 76:37–48

    Article  Google Scholar 

  26. Beigh BM (2015) Framework for choosing best intrusion detection system. BIJIT—BVICAM’s Int J Inf Technol. 7(1); ISSN 0973–5658 821

Download references

Funding

No funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Geetha.

Ethics declarations

Conflict of interest

No Competing interest.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Srikanth, G.U., Geetha, R. & Prabhu, S. An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems. Int. j. inf. tecnol. 15, 1221–1230 (2023). https://doi.org/10.1007/s41870-023-01173-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-023-01173-2

Keywords

Navigation