Abstract
In edge control systems (ECSs), edge computing demands more local data processing power, while traditional industrial programmable logic controllers (PLCs) cannot meet this demand. Thus, edge intelligent controllers (EICs) have been developed, making their secure and reliable operation crucial. However, as EICs communicate sensitive information with resource-limited terminal devices (TDs), a low-cost, efficient authentication solution is urgently needed since it is challenging to implement traditional asymmetric cryptography on TDs. In this paper, we design a lightweight authentication scheme for ECSs using low-computational-cost hash functions and exclusive OR (XOR) operations; this scheme can achieve bidirectional anonymous authentication and key agreement between the EIC and TDs to protect the privacy of the devices. Through security analysis, we demonstrate that the authentication scheme can provide the necessary security features and resist major known attacks. Performance analysis and comparisons indicate that the proposed authentication scheme is effective and feasible for deployment in ECSs.
摘要
在边缘控制系统中, 边缘计算需要更强的本地数据处理能力, 而传统的工业可编程逻辑控制器无法满足这一需求. 因此, 边缘智能控制器得到发展, 其安全可靠的运行至关重要. 然而, 由于边缘智能控制器需与资源有限的终端设备进行敏感信息通信, 且在终端设备上实现传统的非对称加密具有挑战性, 因此迫切需要一种低成本、高效的身份验证解决方案. 本文使用低计算成本的哈希函数和异或运算为边缘控制系统设计了一种轻量级身份验证方案; 该方案可在边缘智能控制器与终端设备之间实现双向匿名身份验证和密钥协议, 以保护设备隐私. 安全性分析证明该认证方案可提供必要的安全特性并抵御主要的已知攻击. 性能分析和比较表明, 所提方案在边缘控制系统中的部署可行、有效.
Similar content being viewed by others
Data availability
The data that support the findings of this study are available from the corresponding author upon reasonable request.
References
Aman MN, Taneja S, Sikdar B, et al., 2019. Token-based security for the Internet of Things with dynamic energy-quality tradeoff. IEEE Int Things J, 6(2):2843–2859. https://doi.org/10.1109/JIOT.2018.2875472
Cao Z, Chen Z, Shang WL, et al., 2023. Efficient revocable anonymous authentication mechanism for edge intelligent controllers. IEEE Int Things J, 10(12):10357–10367. https://doi.org/10.1109/JIOT.2023.3237609
Cui J, Wang FQ, Zhang QY, et al., 2021. Anonymous message authentication scheme for semitrusted edge-enabled IIoT. IEEE Trans Ind Electron, 68(12):12921–12929. https://doi.org/10.1109/TIE.2020.3039227
Cui J, Bian FY, Zhong H, et al., 2022. An anonymous and outsourcing-supported multiauthority access control scheme with revocation for edge-enabled IIoT system. IEEE Syst J, 16(4):6569–6580. https://doi.org/10.1109/JSYST.2022.3189219
Cui J, Wang FQ, Zhang QY, et al., 2023. Efficient batch authentication scheme based on edge computing in IIoT. IEEE Trans Netw Serv Manag, 20(1):357–368. https://doi.org/10.1109/TNSM.2022.3206378
Dolev D, Yao A, 1983. On the security of public key protocols. IEEE Trans Inform Theory, 29(2):198–208. https://doi.org/10.1109/TIT.1983.1056650
Ehui BB, Han YR, Guo H, et al., 2022. A lightweight mutual authentication protocol for IoT. J Commun Inform Netw, 7(2):181–191. https://doi.org/10.23919/JCIN.2022.9815201
Esfahani A, Mantas G, Matischek R, et al., 2019. A lightweight authentication mechanism for M2M communications in Industrial IoT environment. IEEE Int Things J, 6(1):288–296. https://doi.org/10.1109/JIOT.2017.2737630
Esposito C, Castiglione A, Palmieri F, et al., 2018. Integrity for an event notification within the Industrial Internet of Things by using group signatures. IEEE Trans Ind Inform, 14(8):3669–3678. https://doi.org/10.1109/TII.2018.2791956
Gadekallu TR, Pham QV, Nguyen DC, et al., 2022. Blockchain for Edge of Things: applications, opportunities, and challenges. IEEE Int Things J, 9(2):964–988. https://doi.org/10.1109/JIOT.2021.3119639
Jan MA, Khan F, Mastorakis S, et al., 2021. Light-IoT: lightweight and secure communication for energy-efficient IoT in health informatics. IEEE Trans Green Commun Netw, 5(3):1202–1211. https://doi.org/10.1109/TGCN.2021.3077318
Khan R, Teo J, Jan MA, et al., 2023. A trustworthy, reliable, and lightweight privacy and data integrity approach for the Internet of Things. IEEE Trans Ind Inform, 19(1):511–518. https://doi.org/10.1109/TII.2022.3179728
Li JL, Su Z, Guo DK, et al., 2021. PSL-MAAKA: provably secure and lightweight mutual authentication and key agreement protocol for fully public channels in Internet of Medical Things. IEEE Int Things J, 8(17):13183–13195. https://doi.org/10.1109/JIOT.2021.3055827
Liu Y, Chi C, Zhang YW, et al., 2022. Identification and resolution for Industrial Internet: architecture and key technology. IEEE Int Things J, 9(18):16780–16794. https://doi.org/10.1109/JIOT.2022.3160737
Mahmood K, Chaudhry SA, Naqvi H, et al., 2018. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Fut Gener Comput Syst, 81:557–565. https://doi.org/10.1016/j.future.2017.05.002
Nkenyereye L, Hwang J, Pham QV, et al., 2021. Virtual IoT service slice functions for multiaccess edge computing platform. IEEE Int Things J, 8(14):11233–11248. https://doi.org/10.1109/JIOT.2021.3051652
Rose SGH, Jayasree T, 2019. Detection of jamming attack using timestamp for WSN. Ad Hoc Netw, 91:101874. https://doi.org/10.1016/j.adhoc.2019.101874
Sharp M, Ak R, Hedberg TJr, 2018. A survey of the advancing use and development of machine learning in smart manufacturing. J Manuf Syst, 48:170–179. https://doi.org/10.1016/j.jmsy.2018.02.004
Sisinni E, Saifullah A, Han S, et al., 2018. Industrial Internet of Things: challenges, opportunities, and directions. IEEE Trans Ind Inform, 14(11):4724–4734. https://doi.org/10.1109/TII.2018.2852491
Sodhro AH, Pirbhulal S, de Albuquerque VHC, 2019. Artificial intelligence-driven mechanism for edge computing-based industrial applications. IEEE Trans Ind Inform, 15(7):4235–4243. https://doi.org/10.1109/TII.2019.2902878
Sun XB, Men S, Zhao CL, et al., 2015. A security authentication scheme in machine-to-machine home network service. Secure Commun Netw, 8(16):2678–2686. https://doi.org/10.1002/sec.551
Tan CC, Sheng B, Li Q, 2008. Secure and serverless RFID authentication and search protocols. IEEE Trans Wirel Commun, 7(4):1400–1407. https://doi.org/10.1109/TWC.2008.061012
Wang JJ, Ma YL, Zhang LB, et al., 2018. Deep learning for smart manufacturing: methods and applications. J Manuf Syst, 48:144–156. https://doi.org/10.1016/j.jmsy.2018.01.003
Wazid M, Das AK, Odelu V, et al., 2020. Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Depend Secure Comput, 17(2):391–406. https://doi.org/10.1109/TDSC.2017.2764083
Xiao SY, Ge XH, Han QL, et al., 2022. Secure distributed adaptive platooning control of automated vehicles over vehicular ad-hoc networks under denial-of-service attacks. IEEE Trans Cybern, 52(11):12003–12015. https://doi.org/10.1109/TCYB.2021.3074318
Xiao SY, Ge XH, Ding L, et al., 2024a. A bandwidth-conscious event-based control approach to secondary frequency regulation under vehicle-to-grid service. IEEE Trans Smart Grid, 15(4):3739–3750. https://doi.org/10.1109/TSG.2024.3365473
Xiao SY, Ge XH, Wu Q, et al., 2024b. Co-design of bandwidth-aware communication scheduler and cruise controller for multiple high-speed trains. IEEE Trans Veh Technol, 73(4):4993–5004. https://doi.org/10.1109/TVT.2023.3332609
Zhang LP, Zhao LC, Yin SJ, et al., 2019. A lightweight authentication scheme with privacy protection for smart grid communications. Fut Gener Comput Syst, 100:770–778. https://doi.org/10.1016/j.future.2019.05.069
Zhang QY, Wu J, Zhong H, et al., 2023. Efficient anonymous authentication based on physically unclonable function in Industrial Internet of Things. IEEE Trans Inform Forens Secur, 18:233–247. https://doi.org/10.1109/TIFS.2022.3218432
Zhang Y, Wei HY, 2021. Risk-aware cloud-edge computing framework for delay-sensitive industrial IoTs. IEEE Trans Netw Serv Manag, 18(3):2659–2671. https://doi.org/10.1109/TNSM.2021.3092790
Zhou W, Jia Y, Peng AN, et al., 2019. The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Int Things J, 6(2):1606–1616. https://doi.org/10.1109/JIOT.2018.2847733
Author information
Authors and Affiliations
Contributions
Xudong WEN and Zhuo CHEN performed numerical simulations. Wenze XIONG accomplished experimental verification. Wenli SHANG drafted the paper. Zhiwei CHANG revised the paper. Zhong CAO supervised the project and finalized the paper.
Corresponding author
Ethics declarations
All the authors declare that they have no conflict of interest.
Additional information
Project supported by the National Key R&D Program of China (No. 2021YFB2012400), the National Natural Science Foundation of China (No. 62173101), the Basic and Applied Basic Research Funding of Guangdong Province, China (Nos. 2022A1515011558 and 2022A1515010865), and the Key Laboratory of On-Chip Communication and Sensor Chip of Guangdong Higher Education Institutes, China (No. 2023KSYS002)
Rights and permissions
About this article
Cite this article
Shang, W., Wen, X., Chen, Z. et al. Lightweight authentication scheme for edge control systems in Industrial Internet of Things. Front Inform Technol Electron Eng 25, 1466–1478 (2024). https://doi.org/10.1631/FITEE.2400497
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1631/FITEE.2400497
Key words
- Edge intelligent controller (EIC)
- Edge control systems (ECSs)
- Terminal devices (TDs)
- Anonymous authentication
- Lightweight authentication