Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0

被引:69
|
作者
Wang, Chenyu [1 ,2 ]
Wang, Ding [2 ,3 ,4 ]
Xu, Guoai [1 ]
He, Debiao [5 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyber Secur, Beijing 100876, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[4] Nankai Univ, Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
[5] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
industry; 4; 0; wireless sensor networks; password authentication; forward secrecy; offline dictionary attack; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; WIRELESS; SECURE; LIGHTWEIGHT; NETWORKS; PROTOCOL; INTERNET;
D O I
10.1007/s11432-020-2975-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industry 4.0, which combines information technology, network and industrial production, is expected to have a tremendous impact on our daily lives. In such a complex and security-critical system with resource-constrained sensor nodes, the design of a secure user authentication scheme for preventing real-time data from unauthorized access is full of challenges, and the main crux lies in how to realize the important property of forward secrecy. Existing schemes either fail to achieve forward secrecy or achieve forward secrecy with high computation cost on sensor nodes. Besides, they often fail to conform to the development trend of industry 4.0 systems where a cloud center is necessary to help intelligent decision-making and alleviate computation and storage pressure. Therefore, in this paper, we propose an efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0, and formally prove its security in the random oracle model. Compared with previous schemes, it has three advantages: (1) all eleven state-of-the-art criteria are achieved; (2) its computation cost on sensor nodes is comparable to those insecure schemes that employ only symmetric cryptographic algorithms, and is superior to those that also use asymmetric cryptographic algorithms; (3) it takes the advantage of the computation and storage capabilities of the cloud center to achieve user anonymity and the resistance to offline dictionary attack without performing any asymmetric cryptographic algorithms on gateways. Our computation cost on gateways is the smallest among all state-of-the-art relevant schemes for comparison.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] An Efficient Blockchain-based Privacy-Preserving Authentication Scheme in VANET
    Xu, Shiyuan
    Chen, Xue
    Kong, Weimin
    Cao, Yibo
    He, Yunhua
    Xiao, Ke
    2023 IEEE 97TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-SPRING, 2023,
  • [22] An Efficient Location Privacy-Preserving Authentication Scheme for Cooperative Spectrum Sensing
    Lai, Huibin
    Xu, Li
    Zeng, Yali
    IEEE ACCESS, 2020, 8 : 163472 - 163482
  • [23] NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET
    Pournaghi, Seyed Morteza
    Zahednejad, Behnam
    Bayat, Majid
    Farjami, Yaghoub
    COMPUTER NETWORKS, 2018, 134 : 78 - 92
  • [24] An efficient conditional privacy-preserving authentication scheme with scalable revocation for VANETs
    Shen, Leyan
    Wang, Liangliang
    Zhang, Kai
    Li, Jinguo
    Chen, Kefei
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 133
  • [25] An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs
    Cahyadi, Eko Fajar
    Hwang, Min-Shiang
    PLOS ONE, 2021, 16 (09):
  • [26] Efficient and privacy-preserving authentication scheme for wireless body area networks
    Shuai, Mengxia
    Liu, Bin
    Yu, Nenghai
    Xiong, Ling
    Wang, Changhui
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52
  • [27] An Efficient Privacy-Preserving Handover Authentication Scheme for Mobile Wireless Network
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 490 - 505
  • [28] A Privacy-Preserving Authentication Scheme for VANETs with Exculpability
    Li S.
    Yang R.
    Chen J.
    Security and Communication Networks, 2023, 2023
  • [29] Privacy-Preserving Authentication Scheme for Wireless Networks
    Hazazi, Manal
    Tian, Yuan
    Al-Rodhaan, Mznah
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [30] User-empowered secure privacy-preserving authentication scheme for Digital Twin
    Patel, Chintan
    Pasikhani, Aryan
    Gope, Prosanta
    Clark, John
    COMPUTERS & SECURITY, 2024, 140