G. S. Gaba, G. Kumar, H. Monga, T. Kim, M. Liyanage and P. Kumar, "Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0," in IEEE Access, vol. 8, pp. 132808-132824, 2020, doi: 10.1109/ACCESS.2020.3010302
Robust and lightweight key exchange (LKE) protocol for industry 4.0
|Author:||Gaba, Gurjot Singh1; Kumar, Gulshan2; Monga, Himanshu3;|
1Department of Electronics and Electrical Engineering, Lovely Professional University, Phagwara 144411, India
2Department of Computer Science and Engineering, Lovely Professional University, Phagwara 144411, India
3Department of Electronics and Communication Engineering, Jawaharlal Nehru Government Engineering College, Mandi 175018, India
4School of Economics and Management, Beijing Jiaotong University, Beijing 100044, China
5School of Computer Science, University College Dublin, Dublin 4, D04 V1W8 Ireland
6Centre for Wireless Communications, University of Oulu, 90570 Oulu, Finland
7Department of Computer Science, Swansea University, Swansea SA1 8EN, U.K.
|Online Access:||PDF Full Text (PDF, 2.9 MB)|
|Persistent link:|| http://urn.fi/urn:nbn:fi-fe2020092475668
Institute of Electrical and Electronics Engineers,
|Publish Date:|| 2020-09-24
Industry 4.0 has brought solutions for faster data accessibility, fault identification, performance analysis, and control of machines remotely by managers. Though beneficial but dangerous as the IoT (Internet of Things) nodes communicate over the unsecured wireless medium. The communication over unsecured wireless channel opened enormous ways for the illegitimate nodes to access the information and take control over the industrial machines despite being physically away. These threats can be overpowered with secure sessions; however, the exchange of keys to establish a secure session over a vulnerable channel becomes a challenge. Our approach (LKE) intend to solve this problem. LKE provides a lightweight key exchange platform to the legitimate IoT nodes and prohibit the unauthorized abuses. LKE uses lightweight Elliptic Curve Qu-Vanstone (ECQV) based implicit certificates for trust-building and generating keys among entities. All the messages exchanged are secured to prevent unauthorized access to information and preventing against forgery, replay, modification, impersonation and man-in-the-middle attacks, etc. The proposed scheme is tested on the AVISPA tool and results indicate its trustworthiness and strong resistivity against potential attacks. LKE has less computation and communication complexities due to the utilization of limited cryptographic operations which make it superior in comparison to other state-of-the-work.
|Pages:||132808 - 132824|
|Type of Publication:||
A1 Journal article – refereed
|Field of Science:||
213 Electronic, automation and communications engineering, electronics
© The Authors 2020. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.