Abstract
A cyber physical system (CPS) integrates and combines physical, computational and communication functionalities to map physical processes to the cyber world. Indeed, a CPS can dynamically monitor, control and modify functional parameters of a physical system by implementing remote real-time sensing and actuation using machine-to-machine communication. Particularly, in a smart city CPS, a number of devices are deployed in hostile areas and time-varying environments to monitor environmental conditions, which rises the risk of security attacks trying to alter its normal operation. Consequently, security mechanisms should be implemented to protect the CPS and secure data exchange between its devices. This paper investigates the design of a security scheme, named zero knowledge proof chaotic authentication and key agreement, for an environmental monitoring CPS, that enables mutual authentication and key agreement between devices. The proposed scheme uses the chaotic Chebyshev polynomial map based public key encryption technique to build private and public keys while validating the devices identities using the zero knowledge proof protocol. Our designed security scheme allows scalable and dynamic distribution of different types of keys to provide authentication and confidentiality services for unicast and multicast traffics. The efficiency analysis of the designed security scheme demonstrates its resilience to many security attacks targeting the CPS. Moreover, the performance evaluation using simulation shows the achievement of devices authentication and keys distribution with an acceptable false rejection rate, a decreased communication overhead and a reduced energy consumption.
Similar content being viewed by others
References
Jin, J., Gubbi, J., Marusic, S., & Palaniswami, M. (2014). An information framework of creating a smart city through internet of things. IEEE Internet of Things Journal, 1(2), 112–121. https://doi.org/10.1109/JIOT.2013.2296516.
Park, J. H., Salim, M. M., Jo, J. H., Sicato, J. C. S., Rathore, S., & Park, J. H. (2019). CIoT-Net: A scalable cognitive IoT based smart city network architecture. Human-centric Computing and Information Sciences, 9(29), 1–20. https://doi.org/10.1186/s13673-019-0190-9.
Chen, M., Wan, J., & Li, F. (2012). Machine-to-machine communications: Architectures, standards and applications. KSII Transactions on Internet and Information Systems, 6(2), 480–497. https://doi.org/10.3837/tiis.2012.02.002.
Nguyen TD, Al-Saffar A, Huh EN (2010) A dynamic ID-based authentication scheme. In Proceedings of the sixth international networked computing and advanced information management (NCM) conference, Seoul, South Korea (pp. 248–253).
Agarwal S, Peylo C, Borgaonkar R, Seifert JP (2010) Operator-based over-the-air M2M wireless sensor network security. In Proceedings of the 14th international intelligence in next generation networks (ICIN), Berlin, Germany (pp 1–5). https://doi.org/10.1109/ICIN.2010.5640910
Roman, R., Alcaraz, C., Lopez, J., & Sklavos, N. (2011). Key management systems for sensor networks in the context of the internet of things. Computers & Electrical Engineering, 37(2), 147–159. https://doi.org/10.1016/j.compeleceng.2011.01.009.
Adiga BS, Balamuralidhar P, Rajan MA, Shastry R, Shivraj VL (2012) An identity based encryption using elliptic curve cryptography for secure M2M communication. In Proceedings of the Dgs (SecurIT ’12), Kollam, India, (pp. 68–74). https://doi.org/10.1145/2490428.2490438
Doh I, Lim J, Li S, Chae K (2013) Key establishment and management for secure cellular machine-to-machine communication. In Proceedings of seventh international innovative mobile and internet services in ubiquitous computing conference (IMIS), Taichung, Tiwan (pp. 579–584). https://doi.org/10.1109/IMIS.2013.102
Chen S, Ma M (2013) A dynamic-encryption authentication scheme for M2M security in cyber-physical systems. In Proceedings of IEEE global communications conf. (GLOBECOM), Atlanta, USA (pp. 2897–2901). https://doi.org/10.1109/GLOCOM.2013.6831514
Hussen HR, Tizazu GA, Ting M, Lee T, Choi Y, Kim KH (2013) SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN). In Proceedings of fifth international ubiquitous and future networks (ICUFN), Da Nang, Vietnam (pp. 246–251). https://doi.org/10.1109/ICUFN.2013.6614820
Saied YB, Olivereau A, Zeghlache D (2011) Energy efficiency in M2M networks: A cooperative key establishment system. In Proceedings of the 3rd international ultra modern telecommunications and control systems and workshops (ICUMT), Budapest, Hungary (pp. 1–8)
Xu Z, Liu X, Zhang G, He W (2008) A certificateless signature scheme for mobile wireless cyber-physical systems. In Proceedings of The 28th international conference on distributed computing systems workshops, Beijing, China (pp. 489–494). https://doi.org/10.1109/ICDCS.Workshops.2008.84
Zhang Y, Chen J, Li H, Zhang W, Cao J, Lai C (2012) Dynamic group based authentication protocol for machine type communications. In Proceedings of the 4th international intelligent networking and collaborative systems (INCoS) conference. https://doi.org/10.1109/iNCoS.2012.86
Anjum, F. (2010). Location dependent key management in sensor networks without using deployment knowledge. Journal of Wireless Networks, 16(6), 1587–1600. https://doi.org/10.1007/s11276-008-0145-y.
Abdallah W, Boudriga N (2016) A location-aware authentication and key management scheme for wireless sensor networks. In Proceedings of the 22nd Asia-pacific conference on communications (APCC), Yogyakarta, Indonesia. https://doi.org/10.1109/APCC.2016.7581460.
Boubakri W, Abdallah W, Boudriga N (2017) Chaotic ZKP based authentication and key distribution scheme in environmental monitoring CPS. In Proceedings of the 3rd international Symposium on Ubiquitous Networking (UNet 2017), Casablanca, Morocco (pp. 472–483). https://doi.org/10.1007/978-3-319-68179-5_41
Boubakri W, walid Abdllah, Boudriga N (December 2014) A chaos-based authentication and key management scheme for M2M communication. In Proceedings of the The 9th international conference for internet technology and secured transactions (ICITST), London, UK. https://doi.org/10.1109/ICITST.2014.7038839.
Amine A, Mohamed OA, Benattallah B (2014) Identity-based encryption protocol for privacy and authentication in wireless networks, IGI global, chap network security technologies: Design and applications (pp. 129–155). https://doi.org/10.4018/978-1-4666-4789-3.ch009.
Chen, Y. W., Wang, J. T., Chi, K. H., & Tseng, C. C. (2012). Group-based authentication and key agreement. Wireless Personal Communications, 62(4), 965–979. https://doi.org/10.1007/s11277-010-0104-7.
Murthy BS, Sumalatha L (2017) A distributed authentication and key exchange approach for secure M2M communications. In Proceedings of the 3rd international conference on applied and theoretical computing and communication technology (iCATccT), Tumkur, India. https://doi.org/10.1109/ICATCCT.2017.8389148.
Parne, B. L., Parne, B. L., & Gupta, S. (2018). SEGB: security enhanced group based AKA Protocol for M2M communication in an IoT enabled LTE/LTE-a network. IEEE Access, 6, 3668–3684. https://doi.org/10.1109/ACCESS.2017.2788919.
Li, K., Ni, W., Emami, Y., Shen, Y., Severino, R., Pereira, D., & Tovar, E. (2019). Design and implementation of secret key agreement for platoon-based vehicular cyber-physical systems. ACM Transactions on Cyber-Physical Systems. https://doi.org/10.1145/3365996.
Wu, F., Xu, L., Li, X., Kumari, S., Karuppiah, M., & Obaidat, M. S. (2019). A lightweight and provably secure key agreement system for a smart grid with elliptic curve cryptography. IEEE Systems Journal, 13(3), 2830–2838. https://doi.org/10.1109/JSYST.2018.2876226.
Khan, A. A., Kumar, V., Ahmad, M., & Rana, S. (2021). LAKAF: Lightweight authentication and key agreement framework for smart grid network. Journal of Systems Architecture, 116, 102053. https://doi.org/10.1016/j.sysarc.2021.102053.
Jadoon, A. K., Li, J., & Wang, L. (2021). Physical layer authentication for automotive cyber physical systems based on modified HB protocol. Frontiers of Computer Science, 15(3), 153809. https://doi.org/10.1007/s11704-020-0010-4.
Algehawi, M. B., & Samsudin, A. (2010). A new identity based encryption IBE scheme using extended Chebyshev map over finite fields Zp. Physics Letters A, 374(46), 4670–4674. https://doi.org/10.1016/j.physleta.2010.09.041.
Kong B, Chen H, Tang X, Sezaki K (2010) Key pre-distribution schemes for large-scale wireless sensor networks using hexagon partition. In Proceedings of the IEEE wireless communication and networking conference (WCVC), Sydney, NSW, Australia. https://doi.org/10.1109/WCNC.2010.5506481
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Boubakri, W., Abdallah, W. & Boudriga, N. ZAO-AKA : a zero knowledge proof chaotic authentication and key agreement scheme for securing smart city cyber physical system. Wireless Netw 27, 4199–4215 (2021). https://doi.org/10.1007/s11276-021-02720-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-021-02720-0