Abstract
Industrial wireless sensor clouds (IWSCs) are indispensable in industrial applications and can operate in tough industrial environments by using industrial wireless sensor nodes to perceive and control devices. Because wireless sensor nodes are often deployed in unattended, remote-controlled environments, attackers may impersonate legal nodes to change device parameters. Such unexpected events could lead to disastrous consequences. It is difficult for an intrusion detection system to detect such attacks. Therefore, an authentication scheme becomes one of an effective approaches to ensuring security. However, authentication schemes for industrial wireless sensor clouds have not yet been adequately studied. The current approach is only applicable to an authentication scheme based on the shared secret key of the wireless sensor cloud and cannot be applied to a dynamic multiple-keys authentication scheme. Based on this scheme, this paper studies a game-based dynamic multiple-keys authentication scheme. Based on the probability of interception of the key and the leak probability of devices’s operating authorization, the paper sets up an authentication framework for a dynamic multiple-keys game. It also derives the optimal strategy which game players can use to maximize security utility and analyze the evolution process of the trust in the dynamic multiple-keys game. The experimental results show that this approach can successfully improve the security of IWSC.










Similar content being viewed by others
References
Raju HS, Shenoy S (2016) Real-time remote monitoring and operation of industrial devices using IoT and cloud. In: 2016 2nd International Conference on Contemporary Computing and Informatics, pp 324–329
Yu Y, Li K, Zhou W et al (2012) Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J Netw Comput Appl 35(3):867–880
Duan J, Yang D, Zhang S, et al (2013) A trust management scheme for industrial wireless sensor networks. In: 39th Annual Conference of the IEEE Industrial Electronics Society, pp 5576–5581
Adidoleslamy H, Aref MR, Bahramgiri H (2016) A fuzzy fully distributed trust management system in wireless sensor networks. Int J Electron Commun 70(1):40–49
Jiang J, Han G, Shu L et al (2017) A trust model based on cloud theory in underwater acoustic sensor networks. IEEE Trans Ind Inform 13(1):342–350
Mali G, Misra S (2016) TRAST: trust-based distributed topology management for wireless multimedia sensor networks. IEEE Trans Comput 65(6):1978–1991
Wang W, Li Z, Owens R, Bhargava B (2007) Secure and efficient access to outsourced data. In: ACM cloud computing security workshop (CCSW), pp 63–69
Zou Y, Wang G (2016) Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack. IEEE Trans Ind Inform 12(2):780–787
Shin S, Kwon T, Jo GY (2010) An experimental study of hierarchical intrusion detection for wireless industrial sensor networks. IEEE Trans Ind Inf 6(4):744–757
Liu J, Yu J, Shen S (2018) Energy-efficient two-layer cooperative defense scheme to secure sensor-clouds. IEEE Trans Inf Forensics Secur 13(2):408–420
Li D, Li M, Liu J (2017) Evolutionary trust scheme of certificate game in mobile cloud computing. Soft Comput. https://doi.org/10.1007/s00500-017-2486-x
Anita X, Bhagyaveni MA, Manickam JML (2015) Collaborative lightweight trust management scheme for wireless sensor networks. Wirel Pers Commun 80(1):117–140
Vorugunti CS (2016) PPMUAS: a privacy preserving mobile user authentication system for cloud environment utilizing big data. In: 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, pp 1–6
Win TY, Tianfield H, MairBig Q (2017) Data based security analytics for protecting virtualized infrastructures in cloud computing. IEEE Trans Big Data 99:1–15
Bakshi A, Dujodwala YB (2010) Securing cloud from ddos attacks using intrusion detection system in virtual machine. In: Proceedings of the 2010 Second International Conference on Communication Software and Networks, ICCSN10, pp 260–264
Al-Attab BS, Fadewar HS (2016) Authentication scheme for insecure networks in cloud computing. In: 2016 international Conference on Global Trends in Signal Processing, Information Computing and Communication, pp 158–163
Odelu V, Das AK, Kumari S et al (2017) Provably secure authenticated key agreement scheme for distributed mobile cloud computing services. Future Gener Comput Syst 68:74–88
Gandino F, Montrucchio B, Rebaudengo M (2014) Key management for static wireless sensor networks with node adding. IEEE Trans Ind Inform 10(2):1133–1143
Yan Z, Shi W (2017) CloudFile: a cloud data access control system based on mobile social trust. J Netw Comput Appl 86:46–58
Sharma MR, Joshi B (2016) H-IBE: hybrid-identity based encryption approach for cloud security with outsourced revocation. In: International Conference on Signal Processing, Communication, Power and Embedded System, pp 1192–1196
Mon EE, Naing TT (2011) The privacy-aware access control system using attribute-and role-based access control in private cloud. In: 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), pp 447–451
Odelu V, Das AK, Rao Y et al (2017) Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput Stand Interf 54:3–9
Premarathne US (2015) Reliable context-aware multi-attribute continuous authentication framework for secure energy utilization management in smart homes. Energy 93(1):1210–1221
Acknowledgements
This work was partly supported by the National Natural Science Foundation of China under Grant No. 61572014, Zhejiang Provincial Natural Science Foundation of China under Grants No. LY16F020028.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Human and animal rights
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Rights and permissions
About this article
Cite this article
Li, D., Li, M. & Liu, J. A dynamic multiple-keys game-based industrial wireless sensor-cloud authentication scheme. J Supercomput 74, 6794–6814 (2018). https://doi.org/10.1007/s11227-018-2441-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-018-2441-3