Skip to main content
Log in

A dynamic multiple-keys game-based industrial wireless sensor-cloud authentication scheme

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Industrial wireless sensor clouds (IWSCs) are indispensable in industrial applications and can operate in tough industrial environments by using industrial wireless sensor nodes to perceive and control devices. Because wireless sensor nodes are often deployed in unattended, remote-controlled environments, attackers may impersonate legal nodes to change device parameters. Such unexpected events could lead to disastrous consequences. It is difficult for an intrusion detection system to detect such attacks. Therefore, an authentication scheme becomes one of an effective approaches to ensuring security. However, authentication schemes for industrial wireless sensor clouds have not yet been adequately studied. The current approach is only applicable to an authentication scheme based on the shared secret key of the wireless sensor cloud and cannot be applied to a dynamic multiple-keys authentication scheme. Based on this scheme, this paper studies a game-based dynamic multiple-keys authentication scheme. Based on the probability of interception of the key and the leak probability of devices’s operating authorization, the paper sets up an authentication framework for a dynamic multiple-keys game. It also derives the optimal strategy which game players can use to maximize security utility and analyze the evolution process of the trust in the dynamic multiple-keys game. The experimental results show that this approach can successfully improve the security of IWSC.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Raju HS, Shenoy S (2016) Real-time remote monitoring and operation of industrial devices using IoT and cloud. In: 2016 2nd International Conference on Contemporary Computing and Informatics, pp 324–329

  2. Yu Y, Li K, Zhou W et al (2012) Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J Netw Comput Appl 35(3):867–880

    Article  Google Scholar 

  3. Duan J, Yang D, Zhang S, et al (2013) A trust management scheme for industrial wireless sensor networks. In: 39th Annual Conference of the IEEE Industrial Electronics Society, pp 5576–5581

  4. Adidoleslamy H, Aref MR, Bahramgiri H (2016) A fuzzy fully distributed trust management system in wireless sensor networks. Int J Electron Commun 70(1):40–49

    Article  Google Scholar 

  5. Jiang J, Han G, Shu L et al (2017) A trust model based on cloud theory in underwater acoustic sensor networks. IEEE Trans Ind Inform 13(1):342–350

    Article  Google Scholar 

  6. Mali G, Misra S (2016) TRAST: trust-based distributed topology management for wireless multimedia sensor networks. IEEE Trans Comput 65(6):1978–1991

    Article  MathSciNet  Google Scholar 

  7. Wang W, Li Z, Owens R, Bhargava B (2007) Secure and efficient access to outsourced data. In: ACM cloud computing security workshop (CCSW), pp 63–69

  8. Zou Y, Wang G (2016) Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack. IEEE Trans Ind Inform 12(2):780–787

    Article  Google Scholar 

  9. Shin S, Kwon T, Jo GY (2010) An experimental study of hierarchical intrusion detection for wireless industrial sensor networks. IEEE Trans Ind Inf 6(4):744–757

    Article  Google Scholar 

  10. Liu J, Yu J, Shen S (2018) Energy-efficient two-layer cooperative defense scheme to secure sensor-clouds. IEEE Trans Inf Forensics Secur 13(2):408–420

    Article  Google Scholar 

  11. Li D, Li M, Liu J (2017) Evolutionary trust scheme of certificate game in mobile cloud computing. Soft Comput. https://doi.org/10.1007/s00500-017-2486-x

    Article  MATH  Google Scholar 

  12. Anita X, Bhagyaveni MA, Manickam JML (2015) Collaborative lightweight trust management scheme for wireless sensor networks. Wirel Pers Commun 80(1):117–140

    Article  Google Scholar 

  13. Vorugunti CS (2016) PPMUAS: a privacy preserving mobile user authentication system for cloud environment utilizing big data. In: 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, pp 1–6

  14. Win TY, Tianfield H, MairBig Q (2017) Data based security analytics for protecting virtualized infrastructures in cloud computing. IEEE Trans Big Data 99:1–15

    Google Scholar 

  15. Bakshi A, Dujodwala YB (2010) Securing cloud from ddos attacks using intrusion detection system in virtual machine. In: Proceedings of the 2010 Second International Conference on Communication Software and Networks, ICCSN10, pp 260–264

  16. Al-Attab BS, Fadewar HS (2016) Authentication scheme for insecure networks in cloud computing. In: 2016 international Conference on Global Trends in Signal Processing, Information Computing and Communication, pp 158–163

  17. Odelu V, Das AK, Kumari S et al (2017) Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener Comput Syst 68:74–88

    Article  Google Scholar 

  18. Gandino F, Montrucchio B, Rebaudengo M (2014) Key management for static wireless sensor networks with node adding. IEEE Trans Ind Inform 10(2):1133–1143

    Article  Google Scholar 

  19. Yan Z, Shi W (2017) CloudFile: a cloud data access control system based on mobile social trust. J Netw Comput Appl 86:46–58

    Article  Google Scholar 

  20. Sharma MR, Joshi B (2016) H-IBE: hybrid-identity based encryption approach for cloud security with outsourced revocation. In: International Conference on Signal Processing, Communication, Power and Embedded System, pp 1192–1196

  21. Mon EE, Naing TT (2011) The privacy-aware access control system using attribute-and role-based access control in private cloud. In: 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), pp 447–451

  22. Odelu V, Das AK, Rao Y et al (2017) Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput Stand Interf 54:3–9

    Article  Google Scholar 

  23. Premarathne US (2015) Reliable context-aware multi-attribute continuous authentication framework for secure energy utilization management in smart homes. Energy 93(1):1210–1221

    Article  Google Scholar 

Download references

Acknowledgements

This work was partly supported by the National Natural Science Foundation of China under Grant No. 61572014, Zhejiang Provincial Natural Science Foundation of China under Grants No. LY16F020028.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianhua Liu.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Human and animal rights

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, D., Li, M. & Liu, J. A dynamic multiple-keys game-based industrial wireless sensor-cloud authentication scheme. J Supercomput 74, 6794–6814 (2018). https://doi.org/10.1007/s11227-018-2441-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-018-2441-3

Keywords