Robust and lightweight key exchange (LKE) protocol for industry 4.0 |
|
Author: | Gaba, Gurjot Singh1; Kumar, Gulshan2; Monga, Himanshu3; |
Organizations: |
1Department of Electronics and Electrical Engineering, Lovely Professional University, Phagwara 144411, India 2Department of Computer Science and Engineering, Lovely Professional University, Phagwara 144411, India 3Department of Electronics and Communication Engineering, Jawaharlal Nehru Government Engineering College, Mandi 175018, India
4School of Economics and Management, Beijing Jiaotong University, Beijing 100044, China
5School of Computer Science, University College Dublin, Dublin 4, D04 V1W8 Ireland 6Centre for Wireless Communications, University of Oulu, 90570 Oulu, Finland 7Department of Computer Science, Swansea University, Swansea SA1 8EN, U.K. |
Format: | article |
Version: | published version |
Access: | open |
Online Access: | PDF Full Text (PDF, 2.9 MB) |
Persistent link: | http://urn.fi/urn:nbn:fi-fe2020092475668 |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers,
2020
|
Publish Date: | 2020-09-24 |
Description: |
AbstractIndustry 4.0 has brought solutions for faster data accessibility, fault identification, performance analysis, and control of machines remotely by managers. Though beneficial but dangerous as the IoT (Internet of Things) nodes communicate over the unsecured wireless medium. The communication over unsecured wireless channel opened enormous ways for the illegitimate nodes to access the information and take control over the industrial machines despite being physically away. These threats can be overpowered with secure sessions; however, the exchange of keys to establish a secure session over a vulnerable channel becomes a challenge. Our approach (LKE) intend to solve this problem. LKE provides a lightweight key exchange platform to the legitimate IoT nodes and prohibit the unauthorized abuses. LKE uses lightweight Elliptic Curve Qu-Vanstone (ECQV) based implicit certificates for trust-building and generating keys among entities. All the messages exchanged are secured to prevent unauthorized access to information and preventing against forgery, replay, modification, impersonation and man-in-the-middle attacks, etc. The proposed scheme is tested on the AVISPA tool and results indicate its trustworthiness and strong resistivity against potential attacks. LKE has less computation and communication complexities due to the utilization of limited cryptographic operations which make it superior in comparison to other state-of-the-work. see all
|
Series: |
IEEE access |
ISSN: | 2169-3536 |
ISSN-E: | 2169-3536 |
ISSN-L: | 2169-3536 |
Volume: | 8 |
Pages: | 132808 - 132824 |
DOI: | 10.1109/ACCESS.2020.3010302 |
OADOI: | https://oadoi.org/10.1109/ACCESS.2020.3010302 |
Type of Publication: |
A1 Journal article – refereed |
Field of Science: |
213 Electronic, automation and communications engineering, electronics |
Subjects: | |
Copyright information: |
© The Authors 2020. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. |
https://creativecommons.org/licenses/by/4.0/ |