CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things
The Industrial Internet of Things (IIoT) revolutionizes industrial production using smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit information from target fields for analysis and can be controlled remotely. In emergency situations, real-time access to specific SM...
Saved in:
Published in | Internet of things (Amsterdam. Online) Vol. 23; p. 100902 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.10.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The Industrial Internet of Things (IIoT) revolutionizes industrial production using smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit information from target fields for analysis and can be controlled remotely. In emergency situations, real-time access to specific SMD information is crucial for prompt actions. However, ensuring secure and reliable communication between users and SMDs in untrusted channels is a significant challenge. Privacy concerns and the limitations of existing authentication frameworks further exacerbate this challenge, necessitating a lightweight cryptography-based authentication framework. This framework is essential to enable secure and reliable communication in the diverse IIoT environment while addressing privacy leakage threats and the computational constraints of IoT devices. Recently, various lightweight cryptography-based authenticated encryption (AE) schemes have been proposed to enable encryption and decryption services for resource-constrained IIoT devices. ASCON, an efficient AE scheme, offers confidentiality, integrity, and authenticity in a single encryption and decryption operation, reducing the number of cryptographic operations required for authentication framework design. This paper presents CMAF-IIoT, a chaotic map and resource-efficient AE scheme (ASCON)-based authentication framework for IIoT, addressing the aforementioned challenges. CMAF-IIoT ensures reliable communication between SMDs and users. The framework begins with user-performed local authentication on their smart devices, followed by the establishment of a session key with the SMD after mutual authentication with the gateway. Using the session key, users securely access real-time information from SMDs deployed in the IIoT environment. The security of CMAF-IIoT is validated through formal and informal security analyses. Additionally, the efficiency of CMAF-IIoT is evaluated in terms of communication, computational, and storage costs. The results indicate that CMAF-IIoT requires [6.67% to 53.33%] low storage cost, [45.13% to 65.87%] low computational cost, and [16.46% to 83.29%] low communication cost compared to contrasted authentication frameworks. These findings highlight the viability of CMAF-IIoT for the IIoT environment, as it provides resource efficiency and enhanced security features. |
---|---|
AbstractList | The Industrial Internet of Things (IIoT) revolutionizes industrial production using smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit information from target fields for analysis and can be controlled remotely. In emergency situations, real-time access to specific SMD information is crucial for prompt actions. However, ensuring secure and reliable communication between users and SMDs in untrusted channels is a significant challenge. Privacy concerns and the limitations of existing authentication frameworks further exacerbate this challenge, necessitating a lightweight cryptography-based authentication framework. This framework is essential to enable secure and reliable communication in the diverse IIoT environment while addressing privacy leakage threats and the computational constraints of IoT devices. Recently, various lightweight cryptography-based authenticated encryption (AE) schemes have been proposed to enable encryption and decryption services for resource-constrained IIoT devices. ASCON, an efficient AE scheme, offers confidentiality, integrity, and authenticity in a single encryption and decryption operation, reducing the number of cryptographic operations required for authentication framework design. This paper presents CMAF-IIoT, a chaotic map and resource-efficient AE scheme (ASCON)-based authentication framework for IIoT, addressing the aforementioned challenges. CMAF-IIoT ensures reliable communication between SMDs and users. The framework begins with user-performed local authentication on their smart devices, followed by the establishment of a session key with the SMD after mutual authentication with the gateway. Using the session key, users securely access real-time information from SMDs deployed in the IIoT environment. The security of CMAF-IIoT is validated through formal and informal security analyses. Additionally, the efficiency of CMAF-IIoT is evaluated in terms of communication, computational, and storage costs. The results indicate that CMAF-IIoT requires [6.67% to 53.33%] low storage cost, [45.13% to 65.87%] low computational cost, and [16.46% to 83.29%] low communication cost compared to contrasted authentication frameworks. These findings highlight the viability of CMAF-IIoT for the IIoT environment, as it provides resource efficiency and enhanced security features. |
ArticleNumber | 100902 |
Author | Alasmary, Hisham Tanveer, Muhammad Chaudhry, Shehzad Ashraf Khan, Abd Ullah Badshah, Akhtar |
Author_xml | – sequence: 1 givenname: Muhammad orcidid: 0000-0001-9836-9970 surname: Tanveer fullname: Tanveer, Muhammad email: muhammad_tanveer@umt.edu.pk organization: Department of Computer Science, University of Management and Technology, Lahore 54770, Pakistan – sequence: 2 givenname: Akhtar surname: Badshah fullname: Badshah, Akhtar email: akhtarbadshah@uom.edu.pk organization: Department of Software Engineering, University of Malakand, Dir Lower 18800, Pakistan – sequence: 3 givenname: Abd Ullah surname: Khan fullname: Khan, Abd Ullah email: abdullah.khan@ieee.org organization: Department of Computer Science, National University of Sciences and Technology, Pakistan – sequence: 4 givenname: Hisham surname: Alasmary fullname: Alasmary, Hisham email: alasmary@kku.edu.sa organization: Department of Computer Science, College of Computer Science, King Khalid University, Abha, 61421, Saudi Arabia – sequence: 5 givenname: Shehzad Ashraf surname: Chaudhry fullname: Chaudhry, Shehzad Ashraf email: ashraf.shehzad.ch@gmail.com organization: Department of Computer Science and Information Technology, College of Engineering, Abu Dhabi University, Abu Dhabi, United Arab Emirates |
BookMark | eNp9kM1KAzEURoNUsNY-gLu8wNQkM8lMdFWKPwMVNxWXIZO5saltUpJU8e2dUheuXN3vfnAul3OJRj54QOiakhklVNxsZi7kGSOsHHYiCTtDY8YrVghB-OhPvkDTlDaEECZFycp6jN4Wz_OHom3D6hYv1jpkZ_BO74tOJ-ixPuQ1-KHT2QWPbdQ7-ArxA9sQcev7Q8rR6e0QM0QPGQeLV2vn39MVOrd6m2D6Oyfo9eF-tXgqli-P7WK-LAyTdS6orYE2RjDOhSlp1VtZ6koK0wsmu4Zb0H3VSVYay0UjODW6to0humokb0hXThA93TUxpBTBqn10Ox2_FSXqKEdt1CBHHeWok5yBuTsxMDz26SCqZBx4A72LYLLqg_uH_gF6wW4C |
CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3407353 crossref_primary_10_1109_ACCESS_2024_3380816 crossref_primary_10_1109_JIOT_2024_3379930 crossref_primary_10_3390_app131910871 crossref_primary_10_1007_s12083_024_01654_6 crossref_primary_10_1109_TVT_2023_3306813 crossref_primary_10_3390_s23177555 crossref_primary_10_3390_sym16020171 crossref_primary_10_1109_JIOT_2024_3360280 crossref_primary_10_3390_s24113575 crossref_primary_10_3390_sym15101886 crossref_primary_10_3390_app131810345 crossref_primary_10_1016_j_comnet_2024_110449 crossref_primary_10_1016_j_comnet_2024_110559 crossref_primary_10_1016_j_iot_2024_101159 |
Cites_doi | 10.1109/COMST.2020.3011208 10.3390/s21113901 10.1109/ACCESS.2022.3153069 10.1007/s11277-020-07649-9 10.1109/ACCESS.2022.3149376 10.1016/j.jmsy.2020.11.017 10.1109/COMST.2022.3158270 10.1016/j.future.2017.08.029 10.1109/JIOT.2018.2877690 10.1109/ACCESS.2022.3149315 10.1109/TSC.2023.3257569 10.1016/j.jnca.2019.102481 10.1109/TITS.2021.3056704 10.1109/ACCESS.2021.3099299 10.1109/ACCESS.2020.2977817 10.1109/JIOT.2019.2902840 10.1016/j.ins.2019.03.002 10.1109/TII.2020.3020303 10.1016/j.future.2019.05.058 10.1109/JIOT.2021.3084946 10.1016/j.cosrev.2016.07.002 10.1109/JIOT.2022.3184293 10.1016/j.future.2017.08.042 10.1109/JIOT.2020.3040938 10.1109/TII.2019.2963328 10.1007/s11432-016-5535-7 10.1007/s42452-021-04156-9 10.1371/journal.pone.0258279 10.1109/ACCESS.2017.2676119 10.1109/JIOT.2020.3024703 10.1016/j.comcom.2020.06.012 10.1155/2018/7574238 10.1109/TDSC.2016.2616876 |
ContentType | Journal Article |
Copyright | 2023 Elsevier B.V. |
Copyright_xml | – notice: 2023 Elsevier B.V. |
DBID | AAYXX CITATION |
DOI | 10.1016/j.iot.2023.100902 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2542-6605 |
ExternalDocumentID | 10_1016_j_iot_2023_100902 S2542660523002251 |
GroupedDBID | 0R~ AACTN AAEDW AAKOC AALRI AAQFI AAXUO AAYFN ABMAC ACDAQ ACHRH ACRLP AEBSH AFKWA AFTJW AGUBO AGUMN AIALX AIEXJ AIKHN AITUG AKRWK ALMA_UNASSIGNED_HOLDINGS AMRAJ AOUOD AXJTR BELTK BJAXD BKOJK EBS EFJIC EJD FDB FYGXN KOM M41 ROL SPC SPCBC SSB SSL SSR SST SSV SSZ T5K ~G- AAYXX AFJKZ CITATION |
ID | FETCH-LOGICAL-c297t-1f7e18c62556c314df93a496cd629b85fead4b923cf568651ca7f8c0a489580b3 |
IEDL.DBID | AIKHN |
ISSN | 2542-6605 |
IngestDate | Thu Sep 26 20:53:31 EDT 2024 Sat Aug 03 15:31:43 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Privacy Authentication ASCON Encryption Internet of Things Scyther Session key |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c297t-1f7e18c62556c314df93a496cd629b85fead4b923cf568651ca7f8c0a489580b3 |
ORCID | 0000-0001-9836-9970 |
ParticipantIDs | crossref_primary_10_1016_j_iot_2023_100902 elsevier_sciencedirect_doi_10_1016_j_iot_2023_100902 |
PublicationCentury | 2000 |
PublicationDate | October 2023 2023-10-00 |
PublicationDateYYYYMMDD | 2023-10-01 |
PublicationDate_xml | – month: 10 year: 2023 text: October 2023 |
PublicationDecade | 2020 |
PublicationTitle | Internet of things (Amsterdam. Online) |
PublicationYear | 2023 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | Ali, Chaudhry, Ramzan, Al-Turjman (b33) 2020; 8 Abbas, Tanveer, Abbas, Waqas, Baker, Al-Jumeily OBE (b17) 2021; 16 Dharminder, Reddy, Das, Park, Jamal (b29) 2022 Tanveer, Khan, Ahmad, Nguyen, El-Latif (b34) 2022 Tange, De Donno, Fafoutis, Dragoni (b2) 2020; 22 Chen, Yin, Hu, Sun, Li, Xing, Chen, Guo (b37) 2022 Das, Wazid, Kumar, Vasilakos, Rodrigues (b26) 2018; 5 Chanal, Kakkasageri (b5) 2020; 115 Dhirani, Armstrong, Newe (b8) 2021; 21 Li, Wu, Khan, Xu, Shen, Jo (b21) 2018; 84 Sutrala, Obaidat, Saha, Das, Alazab, Park (b10) 2021; 23 Challa, Wazid, Das, Kumar, Goutham Reddy, Yoon, Yoo (b13) 2017; 5 Rachit, Bhatt, Ragiri (b4) 2021; 3 Wu, Dai, Wang, Xiong, Guo (b1) 2022; 24 Rostampour, Bagheri, Bendavid, Safkhani, Kumari, Rodrigues (b22) 2022; 9 Sureshkumar, Amin, Vijaykumar, Sekar (b16) 2019; 100 Wazid, Das, Kumar, Alazab (b11) 2021; 17 Tanveer, Bhutta, Alzahrani, Albeshri, Alsubhi, Chaudhry (b6) 2023 Ryu, Kang, Won (b23) 2022; 10 Shuai, Xiong, Wang, Yu (b28) 2020; 160 Xu, Hsu, Harn, Cui, Zhao, Zhang (b14) 2023 Vinoth, Deborah, Vijayakumar, Kumar (b25) 2020; 8 Sengupta, Ruj, Bit (b3) 2020; 149 Yuanbing, Wanrong, Bin (b36) 2021; 9 Wang, Weng, Ma, Yang (b39) 2019; 488 Wu, Li, Sangaiah, Xu, Kumari, Wu, Shen (b32) 2018; 82 Tanveer, Alkhayyat, Naushad, Kumar, Alharbi (b18) 2022; 10 Srinivas, Das, Wazid, Vasilakos (b12) 2021; 8 Tanveer, Khan, Kumar, Hassan (b20) 2022; 9 Chatterjee, Roy, Das, Chattopadhyay, Kumar, Vasilakos (b24) 2016; 15 Abed, Forler, Lucks (b40) 2016; 22 Hammad, Badshah, Abbas, Alasmary, Waqas, Khan (b9) 2023 Tanveer, Khan, Alkhayyat, Chaudhry, Zikria, Kim (b27) 2022; 10 Ming, Yang, Mahdikhani, Lu (b35) 2022 Yang, He, Tian, Zhou (b30) 2019; 16 Tanveer, Alkhayyat, Khan, Kumar, Alharbi (b19) 2022 Chen, López, Martínez, Castillejo (b31) 2018; 2018 Pivoto, de Almeida, da Rosa Righi, Rodrigues, Lugli, Alberti (b7) 2021; 58 Wei, Ma, Zhang, Ma, Wang (b38) 2017; 60 Ma, He, Wang, Kumar, Choo (b15) 2019; 6 Chanal (10.1016/j.iot.2023.100902_b5) 2020; 115 Wu (10.1016/j.iot.2023.100902_b32) 2018; 82 Rostampour (10.1016/j.iot.2023.100902_b22) 2022; 9 Tanveer (10.1016/j.iot.2023.100902_b18) 2022; 10 Shuai (10.1016/j.iot.2023.100902_b28) 2020; 160 Abed (10.1016/j.iot.2023.100902_b40) 2016; 22 Wu (10.1016/j.iot.2023.100902_b1) 2022; 24 Pivoto (10.1016/j.iot.2023.100902_b7) 2021; 58 Ryu (10.1016/j.iot.2023.100902_b23) 2022; 10 Tanveer (10.1016/j.iot.2023.100902_b34) 2022 Wang (10.1016/j.iot.2023.100902_b39) 2019; 488 Yang (10.1016/j.iot.2023.100902_b30) 2019; 16 Tanveer (10.1016/j.iot.2023.100902_b19) 2022 Yuanbing (10.1016/j.iot.2023.100902_b36) 2021; 9 Ali (10.1016/j.iot.2023.100902_b33) 2020; 8 Tanveer (10.1016/j.iot.2023.100902_b20) 2022; 9 Li (10.1016/j.iot.2023.100902_b21) 2018; 84 Vinoth (10.1016/j.iot.2023.100902_b25) 2020; 8 Chen (10.1016/j.iot.2023.100902_b31) 2018; 2018 Tange (10.1016/j.iot.2023.100902_b2) 2020; 22 Chen (10.1016/j.iot.2023.100902_b37) 2022 Sutrala (10.1016/j.iot.2023.100902_b10) 2021; 23 Srinivas (10.1016/j.iot.2023.100902_b12) 2021; 8 Tanveer (10.1016/j.iot.2023.100902_b6) 2023 Abbas (10.1016/j.iot.2023.100902_b17) 2021; 16 Dhirani (10.1016/j.iot.2023.100902_b8) 2021; 21 Dharminder (10.1016/j.iot.2023.100902_b29) 2022 Ming (10.1016/j.iot.2023.100902_b35) 2022 Chatterjee (10.1016/j.iot.2023.100902_b24) 2016; 15 Das (10.1016/j.iot.2023.100902_b26) 2018; 5 Tanveer (10.1016/j.iot.2023.100902_b27) 2022; 10 Sureshkumar (10.1016/j.iot.2023.100902_b16) 2019; 100 Sengupta (10.1016/j.iot.2023.100902_b3) 2020; 149 Ma (10.1016/j.iot.2023.100902_b15) 2019; 6 Rachit (10.1016/j.iot.2023.100902_b4) 2021; 3 Challa (10.1016/j.iot.2023.100902_b13) 2017; 5 Wei (10.1016/j.iot.2023.100902_b38) 2017; 60 Hammad (10.1016/j.iot.2023.100902_b9) 2023 Wazid (10.1016/j.iot.2023.100902_b11) 2021; 17 Xu (10.1016/j.iot.2023.100902_b14) 2023 |
References_xml | – volume: 3 start-page: 1 year: 2021 end-page: 14 ident: b4 article-title: Security trends in Internet of Things: A survey publication-title: SN Appl. Sci. contributor: fullname: Ragiri – volume: 8 start-page: 43711 year: 2020 end-page: 43724 ident: b33 article-title: Securing smart city surveillance: A lightweight authentication mechanism for unmanned vehicles publication-title: IEEE Access contributor: fullname: Al-Turjman – volume: 115 start-page: 1667 year: 2020 end-page: 1693 ident: b5 article-title: Security and privacy in IoT: A survey publication-title: Wirel. Pers. Commun. contributor: fullname: Kakkasageri – year: 2023 ident: b14 article-title: Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for Industrial Internet of Things publication-title: IEEE Trans. Serv. Comput. contributor: fullname: Zhang – start-page: 1 year: 2022 ident: b19 article-title: REAP-IIoT: Resource-efficient authentication protocol for the industrial Internet of Things publication-title: IEEE Internet Things J. contributor: fullname: Alharbi – volume: 10 start-page: 15891 year: 2022 end-page: 15910 ident: b23 article-title: Improved secure and efficient Chebyshev chaotic map-based user authentication scheme publication-title: IEEE Access contributor: fullname: Won – volume: 8 start-page: 7727 year: 2021 end-page: 7744 ident: b12 article-title: Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system publication-title: IEEE Internet Things J. contributor: fullname: Vasilakos – volume: 10 start-page: 19836 year: 2022 end-page: 19851 ident: b18 article-title: RUAM-IoD: A robust user authentication mechanism for the Internet of Drones publication-title: IEEE Access contributor: fullname: Alharbi – start-page: 1 year: 2023 end-page: 14 ident: b6 article-title: CMAP-IoT: Chaotic map-based authentication protocol for crowdsourcing internet of things publication-title: Arab. J. Sci. Eng. contributor: fullname: Chaudhry – volume: 10 start-page: 23008 year: 2022 end-page: 23021 ident: b27 article-title: REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system publication-title: IEEE Access contributor: fullname: Kim – start-page: 1 year: 2022 end-page: 12 ident: b35 article-title: A secure one-to-many authentication and key agreement scheme for industrial IoT publication-title: IEEE Syst. J. contributor: fullname: Lu – volume: 6 start-page: 8065 year: 2019 end-page: 8075 ident: b15 article-title: An efficient and provably secure authenticated key agreement protocol for fog-based vehicular Ad-Hoc networks publication-title: IEEE Internet Things J. contributor: fullname: Choo – volume: 160 start-page: 215 year: 2020 end-page: 227 ident: b28 article-title: A secure authentication scheme with forward secrecy for industrial Internet of Things using rabin cryptosystem publication-title: Comput. Commun. contributor: fullname: Yu – volume: 17 start-page: 7174 year: 2021 end-page: 7184 ident: b11 article-title: Designing authenticated key management scheme in 6G-enabled network in a box deployed for industrial applications publication-title: IEEE Trans. Ind. Inform. contributor: fullname: Alazab – volume: 149 year: 2020 ident: b3 article-title: A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT publication-title: J. Netw. Comput. Appl. contributor: fullname: Bit – volume: 9 start-page: 21493 year: 2022 end-page: 21504 ident: b22 article-title: An authentication protocol for next generation of constrained IoT systems publication-title: IEEE Internet Things J. contributor: fullname: Rodrigues – volume: 16 year: 2021 ident: b17 article-title: A secure remote user authentication scheme for 6LoWPAN-based Internet of Things publication-title: PLoS One contributor: fullname: Al-Jumeily OBE – volume: 82 start-page: 727 year: 2018 end-page: 737 ident: b32 article-title: A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks publication-title: Future Gener. Comput. Syst. contributor: fullname: Shen – volume: 2018 year: 2018 ident: b31 article-title: A lightweight privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: Lightpriauth publication-title: J. Sens. contributor: fullname: Castillejo – volume: 15 start-page: 824 year: 2016 end-page: 839 ident: b24 article-title: Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment publication-title: IEEE Trans. Dependable Secure Comput. contributor: fullname: Vasilakos – volume: 24 start-page: 1175 year: 2022 end-page: 1211 ident: b1 article-title: A survey of intelligent network slicing management for industrial IoT: Integrated approaches for smart transportation, smart energy, and smart factory publication-title: IEEE Commun. Surv. Tutor. contributor: fullname: Guo – volume: 5 start-page: 3028 year: 2017 end-page: 3043 ident: b13 article-title: Secure signature-based authenticated key establishment scheme for future IoT applications publication-title: IEEE Access contributor: fullname: Yoo – volume: 9 start-page: 105101 year: 2021 end-page: 105117 ident: b36 article-title: An improved authentication protocol for smart healthcare system using wireless medical sensor network publication-title: IEEE Access contributor: fullname: Bin – volume: 60 start-page: 72103 year: 2017 ident: b38 article-title: An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model publication-title: Sci. China Inf. Sci. contributor: fullname: Wang – volume: 58 start-page: 176 year: 2021 end-page: 192 ident: b7 article-title: Cyber-physical systems architectures for industrial Internet of Things applications in industry 4.0: A literature review publication-title: J. Manuf. Syst. contributor: fullname: Alberti – volume: 16 start-page: 6584 year: 2019 end-page: 6596 ident: b30 article-title: Faster authenticated key agreement with perfect forward secrecy for industrial Internet of Things publication-title: IEEE Trans. Ind. Inform. contributor: fullname: Zhou – volume: 100 start-page: 938 year: 2019 end-page: 951 ident: b16 article-title: Robust secure communication protocol for smart healthcare system with FPGA implementation publication-title: Future Gener. Comput. Syst. contributor: fullname: Sekar – volume: 23 start-page: 2316 year: 2021 end-page: 2330 ident: b10 article-title: Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems publication-title: IEEE Trans. Intell. Transp. Syst. contributor: fullname: Park – volume: 488 start-page: 13 year: 2019 end-page: 18 ident: b39 article-title: Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification publication-title: Inform. Sci. contributor: fullname: Yang – volume: 22 start-page: 2489 year: 2020 end-page: 2520 ident: b2 article-title: A systematic survey of industrial internet of things security: Requirements and fog computing opportunities publication-title: IEEE Commun. Surv. Tutor. contributor: fullname: Dragoni – volume: 5 start-page: 4900 year: 2018 end-page: 4913 ident: b26 article-title: Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment publication-title: IEEE Internet Things J. contributor: fullname: Rodrigues – start-page: 1 year: 2022 ident: b29 article-title: Post-quantum lattice based secure reconciliation enabled key agreement protocol for IoT publication-title: IEEE Internet Things J. contributor: fullname: Jamal – volume: 8 start-page: 3801 year: 2020 end-page: 3811 ident: b25 article-title: Secure multifactor authenticated key agreement scheme for industrial IoT publication-title: IEEE Internet Things J. contributor: fullname: Kumar – volume: 21 start-page: 3901 year: 2021 ident: b8 article-title: Industrial IoT, cyber threats, and standards landscape: Evaluation and roadmap publication-title: Sensors contributor: fullname: Newe – volume: 84 start-page: 149 year: 2018 end-page: 159 ident: b21 article-title: A secure chaotic map-based remote authentication scheme for telecare medicine information systems publication-title: Future Gener. Comput. Syst. contributor: fullname: Jo – start-page: 1 year: 2022 end-page: 12 ident: b34 article-title: Resource-efficient authenticated data sharing mechanism for smart wearable systems publication-title: IEEE Trans. Netw. Sci. Eng. contributor: fullname: El-Latif – start-page: 1 year: 2023 ident: b9 article-title: A provable secure and efficient authentication framework for smart manufacturing industry publication-title: IEEE Access contributor: fullname: Khan – volume: 9 start-page: 1339 year: 2022 end-page: 1353 ident: b20 article-title: RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones publication-title: IEEE Internet Things J. contributor: fullname: Hassan – volume: 22 start-page: 13 year: 2016 end-page: 26 ident: b40 article-title: General classification of the authenticated encryption schemes for the CAESAR competition publication-title: Comp. Sci. Rev. contributor: fullname: Lucks – year: 2022 ident: b37 article-title: ECC-based authenticated key agreement protocol for industrial control system publication-title: IEEE Internet Things J. contributor: fullname: Guo – volume: 22 start-page: 2489 issue: 4 year: 2020 ident: 10.1016/j.iot.2023.100902_b2 article-title: A systematic survey of industrial internet of things security: Requirements and fog computing opportunities publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2020.3011208 contributor: fullname: Tange – volume: 21 start-page: 3901 issue: 11 year: 2021 ident: 10.1016/j.iot.2023.100902_b8 article-title: Industrial IoT, cyber threats, and standards landscape: Evaluation and roadmap publication-title: Sensors doi: 10.3390/s21113901 contributor: fullname: Dhirani – volume: 10 start-page: 23008 year: 2022 ident: 10.1016/j.iot.2023.100902_b27 article-title: REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3153069 contributor: fullname: Tanveer – volume: 115 start-page: 1667 issue: 2 year: 2020 ident: 10.1016/j.iot.2023.100902_b5 article-title: Security and privacy in IoT: A survey publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-020-07649-9 contributor: fullname: Chanal – volume: 10 start-page: 19836 year: 2022 ident: 10.1016/j.iot.2023.100902_b18 article-title: RUAM-IoD: A robust user authentication mechanism for the Internet of Drones publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3149376 contributor: fullname: Tanveer – volume: 58 start-page: 176 year: 2021 ident: 10.1016/j.iot.2023.100902_b7 article-title: Cyber-physical systems architectures for industrial Internet of Things applications in industry 4.0: A literature review publication-title: J. Manuf. Syst. doi: 10.1016/j.jmsy.2020.11.017 contributor: fullname: Pivoto – volume: 24 start-page: 1175 issue: 2 year: 2022 ident: 10.1016/j.iot.2023.100902_b1 article-title: A survey of intelligent network slicing management for industrial IoT: Integrated approaches for smart transportation, smart energy, and smart factory publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2022.3158270 contributor: fullname: Wu – start-page: 1 year: 2022 ident: 10.1016/j.iot.2023.100902_b34 article-title: Resource-efficient authenticated data sharing mechanism for smart wearable systems publication-title: IEEE Trans. Netw. Sci. Eng. contributor: fullname: Tanveer – volume: 84 start-page: 149 year: 2018 ident: 10.1016/j.iot.2023.100902_b21 article-title: A secure chaotic map-based remote authentication scheme for telecare medicine information systems publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.08.029 contributor: fullname: Li – volume: 5 start-page: 4900 issue: 6 year: 2018 ident: 10.1016/j.iot.2023.100902_b26 article-title: Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2018.2877690 contributor: fullname: Das – volume: 10 start-page: 15891 year: 2022 ident: 10.1016/j.iot.2023.100902_b23 article-title: Improved secure and efficient Chebyshev chaotic map-based user authentication scheme publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3149315 contributor: fullname: Ryu – year: 2023 ident: 10.1016/j.iot.2023.100902_b14 article-title: Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for Industrial Internet of Things publication-title: IEEE Trans. Serv. Comput. doi: 10.1109/TSC.2023.3257569 contributor: fullname: Xu – start-page: 1 year: 2022 ident: 10.1016/j.iot.2023.100902_b19 article-title: REAP-IIoT: Resource-efficient authentication protocol for the industrial Internet of Things publication-title: IEEE Internet Things J. contributor: fullname: Tanveer – start-page: 1 year: 2022 ident: 10.1016/j.iot.2023.100902_b35 article-title: A secure one-to-many authentication and key agreement scheme for industrial IoT publication-title: IEEE Syst. J. contributor: fullname: Ming – volume: 149 year: 2020 ident: 10.1016/j.iot.2023.100902_b3 article-title: A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2019.102481 contributor: fullname: Sengupta – volume: 23 start-page: 2316 issue: 3 year: 2021 ident: 10.1016/j.iot.2023.100902_b10 article-title: Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems publication-title: IEEE Trans. Intell. Transp. Syst. doi: 10.1109/TITS.2021.3056704 contributor: fullname: Sutrala – volume: 9 start-page: 105101 year: 2021 ident: 10.1016/j.iot.2023.100902_b36 article-title: An improved authentication protocol for smart healthcare system using wireless medical sensor network publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3099299 contributor: fullname: Yuanbing – volume: 8 start-page: 43711 year: 2020 ident: 10.1016/j.iot.2023.100902_b33 article-title: Securing smart city surveillance: A lightweight authentication mechanism for unmanned vehicles publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2977817 contributor: fullname: Ali – volume: 6 start-page: 8065 issue: 5 year: 2019 ident: 10.1016/j.iot.2023.100902_b15 article-title: An efficient and provably secure authenticated key agreement protocol for fog-based vehicular Ad-Hoc networks publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2019.2902840 contributor: fullname: Ma – volume: 488 start-page: 13 year: 2019 ident: 10.1016/j.iot.2023.100902_b39 article-title: Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification publication-title: Inform. Sci. doi: 10.1016/j.ins.2019.03.002 contributor: fullname: Wang – volume: 17 start-page: 7174 issue: 10 year: 2021 ident: 10.1016/j.iot.2023.100902_b11 article-title: Designing authenticated key management scheme in 6G-enabled network in a box deployed for industrial applications publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2020.3020303 contributor: fullname: Wazid – volume: 100 start-page: 938 year: 2019 ident: 10.1016/j.iot.2023.100902_b16 article-title: Robust secure communication protocol for smart healthcare system with FPGA implementation publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.05.058 contributor: fullname: Sureshkumar – volume: 9 start-page: 1339 issue: 2 year: 2022 ident: 10.1016/j.iot.2023.100902_b20 article-title: RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2021.3084946 contributor: fullname: Tanveer – volume: 22 start-page: 13 year: 2016 ident: 10.1016/j.iot.2023.100902_b40 article-title: General classification of the authenticated encryption schemes for the CAESAR competition publication-title: Comp. Sci. Rev. doi: 10.1016/j.cosrev.2016.07.002 contributor: fullname: Abed – volume: 9 start-page: 21493 issue: 21 year: 2022 ident: 10.1016/j.iot.2023.100902_b22 article-title: An authentication protocol for next generation of constrained IoT systems publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2022.3184293 contributor: fullname: Rostampour – year: 2022 ident: 10.1016/j.iot.2023.100902_b37 article-title: ECC-based authenticated key agreement protocol for industrial control system publication-title: IEEE Internet Things J. contributor: fullname: Chen – start-page: 1 year: 2022 ident: 10.1016/j.iot.2023.100902_b29 article-title: Post-quantum lattice based secure reconciliation enabled key agreement protocol for IoT publication-title: IEEE Internet Things J. contributor: fullname: Dharminder – volume: 82 start-page: 727 year: 2018 ident: 10.1016/j.iot.2023.100902_b32 article-title: A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.08.042 contributor: fullname: Wu – volume: 8 start-page: 7727 issue: 9 year: 2021 ident: 10.1016/j.iot.2023.100902_b12 article-title: Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.3040938 contributor: fullname: Srinivas – volume: 16 start-page: 6584 issue: 10 year: 2019 ident: 10.1016/j.iot.2023.100902_b30 article-title: Faster authenticated key agreement with perfect forward secrecy for industrial Internet of Things publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2019.2963328 contributor: fullname: Yang – volume: 60 start-page: 72103 year: 2017 ident: 10.1016/j.iot.2023.100902_b38 article-title: An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model publication-title: Sci. China Inf. Sci. doi: 10.1007/s11432-016-5535-7 contributor: fullname: Wei – volume: 3 start-page: 1 year: 2021 ident: 10.1016/j.iot.2023.100902_b4 article-title: Security trends in Internet of Things: A survey publication-title: SN Appl. Sci. doi: 10.1007/s42452-021-04156-9 contributor: fullname: Rachit – volume: 16 issue: 11 year: 2021 ident: 10.1016/j.iot.2023.100902_b17 article-title: A secure remote user authentication scheme for 6LoWPAN-based Internet of Things publication-title: PLoS One doi: 10.1371/journal.pone.0258279 contributor: fullname: Abbas – volume: 5 start-page: 3028 year: 2017 ident: 10.1016/j.iot.2023.100902_b13 article-title: Secure signature-based authenticated key establishment scheme for future IoT applications publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2676119 contributor: fullname: Challa – volume: 8 start-page: 3801 issue: 5 year: 2020 ident: 10.1016/j.iot.2023.100902_b25 article-title: Secure multifactor authenticated key agreement scheme for industrial IoT publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.3024703 contributor: fullname: Vinoth – volume: 160 start-page: 215 year: 2020 ident: 10.1016/j.iot.2023.100902_b28 article-title: A secure authentication scheme with forward secrecy for industrial Internet of Things using rabin cryptosystem publication-title: Comput. Commun. doi: 10.1016/j.comcom.2020.06.012 contributor: fullname: Shuai – volume: 2018 year: 2018 ident: 10.1016/j.iot.2023.100902_b31 article-title: A lightweight privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: Lightpriauth publication-title: J. Sens. doi: 10.1155/2018/7574238 contributor: fullname: Chen – start-page: 1 year: 2023 ident: 10.1016/j.iot.2023.100902_b9 article-title: A provable secure and efficient authentication framework for smart manufacturing industry publication-title: IEEE Access contributor: fullname: Hammad – start-page: 1 year: 2023 ident: 10.1016/j.iot.2023.100902_b6 article-title: CMAP-IoT: Chaotic map-based authentication protocol for crowdsourcing internet of things publication-title: Arab. J. Sci. Eng. contributor: fullname: Tanveer – volume: 15 start-page: 824 issue: 5 year: 2016 ident: 10.1016/j.iot.2023.100902_b24 article-title: Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment publication-title: IEEE Trans. Dependable Secure Comput. doi: 10.1109/TDSC.2016.2616876 contributor: fullname: Chatterjee |
SSID | ssj0002963237 |
Score | 2.4168003 |
Snippet | The Industrial Internet of Things (IIoT) revolutionizes industrial production using smart devices (SMDs) deployed in IIoT environments. These SMDs collect and... |
SourceID | crossref elsevier |
SourceType | Aggregation Database Publisher |
StartPage | 100902 |
SubjectTerms | ASCON Authentication Encryption Internet of Things Privacy Scyther Session key |
Title | CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things |
URI | https://dx.doi.org/10.1016/j.iot.2023.100902 |
Volume | 23 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFA5ju-hB_InzFzl4EsKaNk0bb6M4Nsd20I3tVtI0wQm2Q-r_b16b6kS8eCotfVBeH-_78vK9F4RuQ4t5cR5kxLJlQ5ivKBGWmBMVaCoVBJkPDc6zOR8v2eM6XHdQ0vbCgKzS5f4mp9fZ2j0ZOG8OtpvN4NkubSy61GVNC0TQRt2zcAR7tb3hZDqef5VafBtkfj09E0wI2LT7m7XSa1OCqNIPQDEgXH3lF0LtoM7oEB04uoiHzRcdoY4ujtH-zhDBE7RKZsMRmUzKxT1OXmRp38RvcksAn3IsQcFeVK4yh02rxcKWrOLvcztwUxnUFS4Nbs7yPEXL0cMiGRN3XAJRvogqQk2kaaw4DBVTAWW5EYFkgquc-yKLQ2ODhmWW0CkT8piHVMnIxMqTLBZh7GXBGeoWZaHPEfYUjI1hwB4Ei7gnPak1pwoW04pR3Ud3rYvSbTMVI23lYq-p9WcK_kwbf_YRa52Y_vi1qc3af5td_M_sEu3BXaO3u0Ld6v1DX1veUGU3Li7gOn1aTT8Bzxi_aA |
link.rule.ids | 314,780,784,24116,27924,27925,45679 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqdgAGxFOUpwcmJKtx4jgxWxVRJfSx0IpuluPaokgkFQr_HztxoAixsCY5Kfpyuvt8-e4OgNvQ5Lx4FeTIsGWNiC8xYoaYIxkoLKR1Mt82OE9nNF2Qx2W47ICk7YWxskoX-5uYXkdrd2Xg0Bxs1uvBkznamOxSlzVNIrJt1D3DBiLj2r1hNk5nX6UW3ziZX0_PtCbI2rT_N2ul17q0oko_sIoB5uorvzLUVtYZHYB9RxfhsHmjQ9BRxRHY2xoieAyek-lwhLKsnN_D5EWU5kn4JjbI5qcVFFbBXlSuMgd1q8WChqzC770dsKkMqgqWGja7PE_AYvQwT1Lk1iUg6bOoQlhHCseS2qFiMsBkpVkgCKNyRX2Wx6E2TkNyQ-ikDmlMQyxFpGPpCRKzMPby4BR0i7JQZwB60o6NIZY9MBJRT3hCKYqlPUxLglUf3LUQ8U0zFYO3crFXbvDkFk_e4NkHpAWR__i03ETtv83O_2d2A3bS-XTCJ9lsfAF27Z1Ge3cJutX7h7oyHKLKr52PfAIGQMDA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=CMAF-IIoT%3A+Chaotic+map-based+authentication+framework+for+Industrial+Internet+of+Things&rft.jtitle=Internet+of+things+%28Amsterdam.+Online%29&rft.au=Tanveer%2C+Muhammad&rft.au=Badshah%2C+Akhtar&rft.au=Khan%2C+Abd+Ullah&rft.au=Alasmary%2C+Hisham&rft.date=2023-10-01&rft.issn=2542-6605&rft.eissn=2542-6605&rft.volume=23&rft.spage=100902&rft_id=info:doi/10.1016%2Fj.iot.2023.100902&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_iot_2023_100902 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2542-6605&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2542-6605&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2542-6605&client=summon |