Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0

被引:69
|
作者
Wang, Chenyu [1 ,2 ]
Wang, Ding [2 ,3 ,4 ]
Xu, Guoai [1 ]
He, Debiao [5 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyber Secur, Beijing 100876, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Nankai Univ, Coll Cyber Sci, Tianjin 300350, Peoples R China
[4] Nankai Univ, Tianjin Key Lab Network & Data Secur Technol, Tianjin 300350, Peoples R China
[5] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
industry; 4; 0; wireless sensor networks; password authentication; forward secrecy; offline dictionary attack; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; WIRELESS; SECURE; LIGHTWEIGHT; NETWORKS; PROTOCOL; INTERNET;
D O I
10.1007/s11432-020-2975-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industry 4.0, which combines information technology, network and industrial production, is expected to have a tremendous impact on our daily lives. In such a complex and security-critical system with resource-constrained sensor nodes, the design of a secure user authentication scheme for preventing real-time data from unauthorized access is full of challenges, and the main crux lies in how to realize the important property of forward secrecy. Existing schemes either fail to achieve forward secrecy or achieve forward secrecy with high computation cost on sensor nodes. Besides, they often fail to conform to the development trend of industry 4.0 systems where a cloud center is necessary to help intelligent decision-making and alleviate computation and storage pressure. Therefore, in this paper, we propose an efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0, and formally prove its security in the random oracle model. Compared with previous schemes, it has three advantages: (1) all eleven state-of-the-art criteria are achieved; (2) its computation cost on sensor nodes is comparable to those insecure schemes that employ only symmetric cryptographic algorithms, and is superior to those that also use asymmetric cryptographic algorithms; (3) it takes the advantage of the computation and storage capabilities of the cloud center to achieve user anonymity and the resistance to offline dictionary attack without performing any asymmetric cryptographic algorithms on gateways. Our computation cost on gateways is the smallest among all state-of-the-art relevant schemes for comparison.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] A novel privacy-preserving biometric authentication scheme
    Mao, Xuechun
    Chen, Ying
    Deng, Cong
    Zhou, Xiaqing
    PLOS ONE, 2023, 18 (05):
  • [32] An Efficient Privacy-preserving Authentication Protocol in VANETs
    Zhang, Jianhong
    Zhen, Weina
    Xu, Min
    2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 272 - 277
  • [33] Novel and Efficient Privacy-Preserving Continuous Authentication
    Baig, Ahmed Fraz
    Eskeland, Sigurd
    Yang, Bian
    CRYPTOGRAPHY, 2024, 8 (01)
  • [34] An Efficient Privacy-Preserving Authentication Scheme Based on Shamir Secret Sharing for VANETs
    Qi, Jiayu
    Gao, Tianhan
    Zhao, Cong
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2023, 2023, 177 : 138 - 148
  • [35] Efficient privacy-preserving authentication scheme for roaming consumer in global mobility networks
    Ostad-Sharif, Arezou
    Babamohammadi, Abolfazl
    Abbasinezhad-Mood, Dariush
    Nikooghadam, Morteza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (05)
  • [36] Information-theoretic privacy-preserving user authentication
    Kazempour, Narges
    Mirmohseni, Mahtab
    Aref, Mohammad Reza
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [37] CPAS: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks
    Shim, Kyung-Ah
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (04) : 1874 - 1883
  • [38] Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET
    Zhong, Hong
    Huang, Bo
    Cui, Jie
    Li, Jiang
    Sha, Kewei
    2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
  • [39] Efficient Conditional Privacy-Preserving and Authentication Scheme for Secure Service Provision in VANET
    Zhong, Hong
    Wen, Jingyu
    Cui, Jie
    Zhang, Shun
    TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (06) : 620 - 629
  • [40] Efficient Conditional Privacy-Preserving and Authentication Scheme for Secure Service Provision in VANET
    Hong Zhong
    Jingyu Wen
    Jie Cui
    Shun Zhang
    TsinghuaScienceandTechnology, 2016, 21 (06) : 620 - 629