4.4 Article

An efficient lightweight authentication scheme for human-centered industrial Internet of Things

Journal

Publisher

WILEY
DOI: 10.1002/dac.4189

Keywords

authentication; human-centered; industrial Internet of Things; Internet of Things; security

Ask authors/readers for more resources

The Internet of Things (IoT) allows for the integration of diverse nodes, bringing advancements in technology for industrial and government services. In this paper, a lightweight and secure authentication protocol for human-centered industrial IoT (IIoT) is proposed, aiming to enhance the development and manufacturing of industrial processes. The protocol includes authentication, secure key exchange, and communication processes, reducing computational overhead and addressing potential attacks.
Internet of Things (IoT) specifies a transparent and coherent integration of assorted and composite nodes. Unification of these nodes with large resources and servers has brought advancement in technology for industrial and government services. The industrial IoT (IIoT), with smart nodes, enhance the development and manufacturing of industrial process, which is on demand now. However, the security concern is substantial, and it is required to control to perform prosperous assimilation of IIoT. Authentication of these smart nodes and establishing mutual trust among them is essential to keep vulnerabilities and potential risks out. Hence, this paper presents an efficient lightweight secure authentication protocol from the perspective of human-centered IIoT. This proposed scheme assumes a registration center which simply generates public and secret information for a node when it initially joins the network. Once registration is done, the registration center is not needed anymore, and advanced processes like mutual authentication, secure key exchange, and communications are independently done by nodes involved. Furthermore, we show that this scheme can reduce exponential computations and computational overhead and resolves various possible attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available