Font Size: a A A

Research On Lightweight Session Key Agreement Scheme For Industrial Internet Of Things

Posted on:2023-11-29Degree:MasterType:Thesis
Country:ChinaCandidate:F Z ChengFull Text:PDF
GTID:2568307043488664Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the widespread application of the Internet of Things(IoT)and the wave of Industry 4.0,Industrial Internet of Things(IIoT)technology promotes the development and reform of the traditional manufacturing industry in the direction of intelligence.At the same time,the high degree of network autonomy and resource constraints of the IIoT pose challenges to its security,and the communication security is the key to its security research.Authentication and session key agreement are important methods to ensure the security of communication in public channels.Both parties of the communication use identity authentication and key agreement to realize the "one-time-one-key" encryption requirement for data transmission.Due to the particularity of IoT devices,the feasibility and applicability of traditional schemes are reduced.Encryption schemes designed for primary power,high processing,and large memory devices are not suitable for resource-constrained IoT nodes.Lightweight authentication and session key agreement schemes can be applied in IoT environments or wireless sensor networks.This thesis mainly aims at the security and efficiency of the authentication and key agreement scheme of remote users and devices in the current IIoT environment,and builds a system model and a corresponding secure and efficient authentication and key agreement scheme based on specific application scenarios.The main contributions are summarized as follows:1)Aiming at the anonymous authentication and untraceability of remote users,as well as the problem of excessive overhead in existing schemes,a multi-factor-based session key agreement scheme for the IIoT is proposed in this thesis.The scheme uses a multi-factor authentication method and simplified communication with proxy re-encryption to reduce the computational and communication overhead of the system.Security analysis shows that this scheme can not only meet security requirements such as anonymity,untraceability,and forward security,but also resist security threats such as replay attacks and man-in-the-middle attacks.2)Aiming at the problems of overloaded servers,limited storage resources of sensor nodes,and physical attacks on devices in the IIoT environment,an anonymous authentication and key agreement scheme based on physical unclonable functions(PUF)is proposed in this thesis.This scheme uses the cloud-fog IoT architecture and uses the PUF to realize the certificateless authentication of the device node,reduce the storage requirement of the device node,and improve the physical security of the device node.The performance analysis shows that the scheme has better performance in computing and communication.Security analysis shows that the scheme can meet the security requirements of the system.
Keywords/Search Tags:IIoT, Lightweight, Authentication, Key Agreement, Security
PDF Full Text Request
Related items