Hash-based conditional privacy preserving authentication and key exchange protocol suitable for industrial internet of things

43Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

Abstract

Wireless sensor networks (WSN) are integral part of Industrial Internet of Things (IIOT), the said networks comprise of elements possessing low power processors. WSNs are used for gathering data in the monitoring region, using which vital information about the sensor and the monitoring region can be attained (placement of the sensor node is critical). Moreover, due to open nature of communication channel and resource constrained environment of nodes the privacy, integrity and confidentiality of the data becomes a big issue as we need to ensure that the said data is only accessed by a valid user in the IIOT environment. Many schemes presented various means to overcome the above issue. However, the existing works do have certain vulnerabilities which make its application in the WSNs constrained. The proposed work presents a scheme for achieving above goals in IIOT environment. Moreover, the proposed scheme presents security vulnerabilities and weaknesses in existing schemes and attempts to overcome these issues; the proposed work provides cryptanalysis of Xiong et al. scheme which is based on ECC, the direct consequence of the cryptanalysis directs to design a solution which can overcome the issues. The proposed work provides a robust hash based conditional privacy preserving authentication and probabilistic key exchange protocol which is lightweight and as a result, puts less computation overheads on the entities involved in the region. The proposed work is secure against many known attacks due to difficulty in guessing the credentials. The main motivation is to develop a lightweight scheme which can help exchange information with efficacy. The security of the proposed work is provided using both formal and informal security analysis where formal analysis comprises of AVISPA and Real-or-Random oracle model simulations whereas informal analysis depicts proofs as of how the proposed work withstands many known attacks. Thus, the proposed work is secure against many malicious attacks directing and championing its application in IIOT environment.

References Powered by Scopus

A survey on sensor networks

11461Citations
N/AReaders
Get full text

A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms

5217Citations
N/AReaders
Get full text

Analysis of Key-Exchange protocols and their use for building secure channels

1312Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities

328Citations
N/AReaders
Get full text

A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care

184Citations
N/AReaders
Get full text

A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN

64Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Paliwal, S. (2019). Hash-based conditional privacy preserving authentication and key exchange protocol suitable for industrial internet of things. IEEE Access, 7, 136073–136093. https://doi.org/10.1109/ACCESS.2019.2941701

Readers over time

‘19‘20‘21‘22‘23‘24036912

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 13

81%

Professor / Associate Prof. 1

6%

Lecturer / Post doc 1

6%

Researcher 1

6%

Readers' Discipline

Tooltip

Computer Science 12

75%

Engineering 3

19%

Mathematics 1

6%

Save time finding and organizing research with Mendeley

Sign up for free
0