CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things

The Industrial Internet of Things (IIoT) revolutionizes industrial production using smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit information from target fields for analysis and can be controlled remotely. In emergency situations, real-time access to specific SM...

Full description

Saved in:
Bibliographic Details
Published inInternet of things (Amsterdam. Online) Vol. 23; p. 100902
Main Authors Tanveer, Muhammad, Badshah, Akhtar, Khan, Abd Ullah, Alasmary, Hisham, Chaudhry, Shehzad Ashraf
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.10.2023
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The Industrial Internet of Things (IIoT) revolutionizes industrial production using smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit information from target fields for analysis and can be controlled remotely. In emergency situations, real-time access to specific SMD information is crucial for prompt actions. However, ensuring secure and reliable communication between users and SMDs in untrusted channels is a significant challenge. Privacy concerns and the limitations of existing authentication frameworks further exacerbate this challenge, necessitating a lightweight cryptography-based authentication framework. This framework is essential to enable secure and reliable communication in the diverse IIoT environment while addressing privacy leakage threats and the computational constraints of IoT devices. Recently, various lightweight cryptography-based authenticated encryption (AE) schemes have been proposed to enable encryption and decryption services for resource-constrained IIoT devices. ASCON, an efficient AE scheme, offers confidentiality, integrity, and authenticity in a single encryption and decryption operation, reducing the number of cryptographic operations required for authentication framework design. This paper presents CMAF-IIoT, a chaotic map and resource-efficient AE scheme (ASCON)-based authentication framework for IIoT, addressing the aforementioned challenges. CMAF-IIoT ensures reliable communication between SMDs and users. The framework begins with user-performed local authentication on their smart devices, followed by the establishment of a session key with the SMD after mutual authentication with the gateway. Using the session key, users securely access real-time information from SMDs deployed in the IIoT environment. The security of CMAF-IIoT is validated through formal and informal security analyses. Additionally, the efficiency of CMAF-IIoT is evaluated in terms of communication, computational, and storage costs. The results indicate that CMAF-IIoT requires [6.67% to 53.33%] low storage cost, [45.13% to 65.87%] low computational cost, and [16.46% to 83.29%] low communication cost compared to contrasted authentication frameworks. These findings highlight the viability of CMAF-IIoT for the IIoT environment, as it provides resource efficiency and enhanced security features.
AbstractList The Industrial Internet of Things (IIoT) revolutionizes industrial production using smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit information from target fields for analysis and can be controlled remotely. In emergency situations, real-time access to specific SMD information is crucial for prompt actions. However, ensuring secure and reliable communication between users and SMDs in untrusted channels is a significant challenge. Privacy concerns and the limitations of existing authentication frameworks further exacerbate this challenge, necessitating a lightweight cryptography-based authentication framework. This framework is essential to enable secure and reliable communication in the diverse IIoT environment while addressing privacy leakage threats and the computational constraints of IoT devices. Recently, various lightweight cryptography-based authenticated encryption (AE) schemes have been proposed to enable encryption and decryption services for resource-constrained IIoT devices. ASCON, an efficient AE scheme, offers confidentiality, integrity, and authenticity in a single encryption and decryption operation, reducing the number of cryptographic operations required for authentication framework design. This paper presents CMAF-IIoT, a chaotic map and resource-efficient AE scheme (ASCON)-based authentication framework for IIoT, addressing the aforementioned challenges. CMAF-IIoT ensures reliable communication between SMDs and users. The framework begins with user-performed local authentication on their smart devices, followed by the establishment of a session key with the SMD after mutual authentication with the gateway. Using the session key, users securely access real-time information from SMDs deployed in the IIoT environment. The security of CMAF-IIoT is validated through formal and informal security analyses. Additionally, the efficiency of CMAF-IIoT is evaluated in terms of communication, computational, and storage costs. The results indicate that CMAF-IIoT requires [6.67% to 53.33%] low storage cost, [45.13% to 65.87%] low computational cost, and [16.46% to 83.29%] low communication cost compared to contrasted authentication frameworks. These findings highlight the viability of CMAF-IIoT for the IIoT environment, as it provides resource efficiency and enhanced security features.
ArticleNumber 100902
Author Alasmary, Hisham
Tanveer, Muhammad
Chaudhry, Shehzad Ashraf
Khan, Abd Ullah
Badshah, Akhtar
Author_xml – sequence: 1
  givenname: Muhammad
  orcidid: 0000-0001-9836-9970
  surname: Tanveer
  fullname: Tanveer, Muhammad
  email: muhammad_tanveer@umt.edu.pk
  organization: Department of Computer Science, University of Management and Technology, Lahore 54770, Pakistan
– sequence: 2
  givenname: Akhtar
  surname: Badshah
  fullname: Badshah, Akhtar
  email: akhtarbadshah@uom.edu.pk
  organization: Department of Software Engineering, University of Malakand, Dir Lower 18800, Pakistan
– sequence: 3
  givenname: Abd Ullah
  surname: Khan
  fullname: Khan, Abd Ullah
  email: abdullah.khan@ieee.org
  organization: Department of Computer Science, National University of Sciences and Technology, Pakistan
– sequence: 4
  givenname: Hisham
  surname: Alasmary
  fullname: Alasmary, Hisham
  email: alasmary@kku.edu.sa
  organization: Department of Computer Science, College of Computer Science, King Khalid University, Abha, 61421, Saudi Arabia
– sequence: 5
  givenname: Shehzad Ashraf
  surname: Chaudhry
  fullname: Chaudhry, Shehzad Ashraf
  email: ashraf.shehzad.ch@gmail.com
  organization: Department of Computer Science and Information Technology, College of Engineering, Abu Dhabi University, Abu Dhabi, United Arab Emirates
BookMark eNp9kM1KAzEURoNUsNY-gLu8wNQkM8lMdFWKPwMVNxWXIZO5saltUpJU8e2dUheuXN3vfnAul3OJRj54QOiakhklVNxsZi7kGSOsHHYiCTtDY8YrVghB-OhPvkDTlDaEECZFycp6jN4Wz_OHom3D6hYv1jpkZ_BO74tOJ-ixPuQ1-KHT2QWPbdQ7-ArxA9sQcev7Q8rR6e0QM0QPGQeLV2vn39MVOrd6m2D6Oyfo9eF-tXgqli-P7WK-LAyTdS6orYE2RjDOhSlp1VtZ6koK0wsmu4Zb0H3VSVYay0UjODW6to0humokb0hXThA93TUxpBTBqn10Ox2_FSXqKEdt1CBHHeWok5yBuTsxMDz26SCqZBx4A72LYLLqg_uH_gF6wW4C
CitedBy_id crossref_primary_10_1109_ACCESS_2024_3407353
crossref_primary_10_1109_ACCESS_2024_3380816
crossref_primary_10_1109_JIOT_2024_3379930
crossref_primary_10_3390_app131910871
crossref_primary_10_1007_s12083_024_01654_6
crossref_primary_10_1109_TVT_2023_3306813
crossref_primary_10_3390_s23177555
crossref_primary_10_3390_sym16020171
crossref_primary_10_1109_JIOT_2024_3360280
crossref_primary_10_3390_s24113575
crossref_primary_10_3390_sym15101886
crossref_primary_10_3390_app131810345
crossref_primary_10_1016_j_comnet_2024_110449
crossref_primary_10_1016_j_comnet_2024_110559
crossref_primary_10_1016_j_iot_2024_101159
Cites_doi 10.1109/COMST.2020.3011208
10.3390/s21113901
10.1109/ACCESS.2022.3153069
10.1007/s11277-020-07649-9
10.1109/ACCESS.2022.3149376
10.1016/j.jmsy.2020.11.017
10.1109/COMST.2022.3158270
10.1016/j.future.2017.08.029
10.1109/JIOT.2018.2877690
10.1109/ACCESS.2022.3149315
10.1109/TSC.2023.3257569
10.1016/j.jnca.2019.102481
10.1109/TITS.2021.3056704
10.1109/ACCESS.2021.3099299
10.1109/ACCESS.2020.2977817
10.1109/JIOT.2019.2902840
10.1016/j.ins.2019.03.002
10.1109/TII.2020.3020303
10.1016/j.future.2019.05.058
10.1109/JIOT.2021.3084946
10.1016/j.cosrev.2016.07.002
10.1109/JIOT.2022.3184293
10.1016/j.future.2017.08.042
10.1109/JIOT.2020.3040938
10.1109/TII.2019.2963328
10.1007/s11432-016-5535-7
10.1007/s42452-021-04156-9
10.1371/journal.pone.0258279
10.1109/ACCESS.2017.2676119
10.1109/JIOT.2020.3024703
10.1016/j.comcom.2020.06.012
10.1155/2018/7574238
10.1109/TDSC.2016.2616876
ContentType Journal Article
Copyright 2023 Elsevier B.V.
Copyright_xml – notice: 2023 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.iot.2023.100902
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2542-6605
ExternalDocumentID 10_1016_j_iot_2023_100902
S2542660523002251
GroupedDBID 0R~
AACTN
AAEDW
AAKOC
AALRI
AAQFI
AAXUO
AAYFN
ABMAC
ACDAQ
ACHRH
ACRLP
AEBSH
AFKWA
AFTJW
AGUBO
AGUMN
AIALX
AIEXJ
AIKHN
AITUG
AKRWK
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
AOUOD
AXJTR
BELTK
BJAXD
BKOJK
EBS
EFJIC
EJD
FDB
FYGXN
KOM
M41
ROL
SPC
SPCBC
SSB
SSL
SSR
SST
SSV
SSZ
T5K
~G-
AAYXX
AFJKZ
CITATION
ID FETCH-LOGICAL-c297t-1f7e18c62556c314df93a496cd629b85fead4b923cf568651ca7f8c0a489580b3
IEDL.DBID AIKHN
ISSN 2542-6605
IngestDate Thu Sep 26 20:53:31 EDT 2024
Sat Aug 03 15:31:43 EDT 2024
IsPeerReviewed true
IsScholarly true
Keywords Privacy
Authentication
ASCON
Encryption
Internet of Things
Scyther
Session key
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c297t-1f7e18c62556c314df93a496cd629b85fead4b923cf568651ca7f8c0a489580b3
ORCID 0000-0001-9836-9970
ParticipantIDs crossref_primary_10_1016_j_iot_2023_100902
elsevier_sciencedirect_doi_10_1016_j_iot_2023_100902
PublicationCentury 2000
PublicationDate October 2023
2023-10-00
PublicationDateYYYYMMDD 2023-10-01
PublicationDate_xml – month: 10
  year: 2023
  text: October 2023
PublicationDecade 2020
PublicationTitle Internet of things (Amsterdam. Online)
PublicationYear 2023
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Ali, Chaudhry, Ramzan, Al-Turjman (b33) 2020; 8
Abbas, Tanveer, Abbas, Waqas, Baker, Al-Jumeily OBE (b17) 2021; 16
Dharminder, Reddy, Das, Park, Jamal (b29) 2022
Tanveer, Khan, Ahmad, Nguyen, El-Latif (b34) 2022
Tange, De Donno, Fafoutis, Dragoni (b2) 2020; 22
Chen, Yin, Hu, Sun, Li, Xing, Chen, Guo (b37) 2022
Das, Wazid, Kumar, Vasilakos, Rodrigues (b26) 2018; 5
Chanal, Kakkasageri (b5) 2020; 115
Dhirani, Armstrong, Newe (b8) 2021; 21
Li, Wu, Khan, Xu, Shen, Jo (b21) 2018; 84
Sutrala, Obaidat, Saha, Das, Alazab, Park (b10) 2021; 23
Challa, Wazid, Das, Kumar, Goutham Reddy, Yoon, Yoo (b13) 2017; 5
Rachit, Bhatt, Ragiri (b4) 2021; 3
Wu, Dai, Wang, Xiong, Guo (b1) 2022; 24
Rostampour, Bagheri, Bendavid, Safkhani, Kumari, Rodrigues (b22) 2022; 9
Sureshkumar, Amin, Vijaykumar, Sekar (b16) 2019; 100
Wazid, Das, Kumar, Alazab (b11) 2021; 17
Tanveer, Bhutta, Alzahrani, Albeshri, Alsubhi, Chaudhry (b6) 2023
Ryu, Kang, Won (b23) 2022; 10
Shuai, Xiong, Wang, Yu (b28) 2020; 160
Xu, Hsu, Harn, Cui, Zhao, Zhang (b14) 2023
Vinoth, Deborah, Vijayakumar, Kumar (b25) 2020; 8
Sengupta, Ruj, Bit (b3) 2020; 149
Yuanbing, Wanrong, Bin (b36) 2021; 9
Wang, Weng, Ma, Yang (b39) 2019; 488
Wu, Li, Sangaiah, Xu, Kumari, Wu, Shen (b32) 2018; 82
Tanveer, Alkhayyat, Naushad, Kumar, Alharbi (b18) 2022; 10
Srinivas, Das, Wazid, Vasilakos (b12) 2021; 8
Tanveer, Khan, Kumar, Hassan (b20) 2022; 9
Chatterjee, Roy, Das, Chattopadhyay, Kumar, Vasilakos (b24) 2016; 15
Abed, Forler, Lucks (b40) 2016; 22
Hammad, Badshah, Abbas, Alasmary, Waqas, Khan (b9) 2023
Tanveer, Khan, Alkhayyat, Chaudhry, Zikria, Kim (b27) 2022; 10
Ming, Yang, Mahdikhani, Lu (b35) 2022
Yang, He, Tian, Zhou (b30) 2019; 16
Tanveer, Alkhayyat, Khan, Kumar, Alharbi (b19) 2022
Chen, López, Martínez, Castillejo (b31) 2018; 2018
Pivoto, de Almeida, da Rosa Righi, Rodrigues, Lugli, Alberti (b7) 2021; 58
Wei, Ma, Zhang, Ma, Wang (b38) 2017; 60
Ma, He, Wang, Kumar, Choo (b15) 2019; 6
Chanal (10.1016/j.iot.2023.100902_b5) 2020; 115
Wu (10.1016/j.iot.2023.100902_b32) 2018; 82
Rostampour (10.1016/j.iot.2023.100902_b22) 2022; 9
Tanveer (10.1016/j.iot.2023.100902_b18) 2022; 10
Shuai (10.1016/j.iot.2023.100902_b28) 2020; 160
Abed (10.1016/j.iot.2023.100902_b40) 2016; 22
Wu (10.1016/j.iot.2023.100902_b1) 2022; 24
Pivoto (10.1016/j.iot.2023.100902_b7) 2021; 58
Ryu (10.1016/j.iot.2023.100902_b23) 2022; 10
Tanveer (10.1016/j.iot.2023.100902_b34) 2022
Wang (10.1016/j.iot.2023.100902_b39) 2019; 488
Yang (10.1016/j.iot.2023.100902_b30) 2019; 16
Tanveer (10.1016/j.iot.2023.100902_b19) 2022
Yuanbing (10.1016/j.iot.2023.100902_b36) 2021; 9
Ali (10.1016/j.iot.2023.100902_b33) 2020; 8
Tanveer (10.1016/j.iot.2023.100902_b20) 2022; 9
Li (10.1016/j.iot.2023.100902_b21) 2018; 84
Vinoth (10.1016/j.iot.2023.100902_b25) 2020; 8
Chen (10.1016/j.iot.2023.100902_b31) 2018; 2018
Tange (10.1016/j.iot.2023.100902_b2) 2020; 22
Chen (10.1016/j.iot.2023.100902_b37) 2022
Sutrala (10.1016/j.iot.2023.100902_b10) 2021; 23
Srinivas (10.1016/j.iot.2023.100902_b12) 2021; 8
Tanveer (10.1016/j.iot.2023.100902_b6) 2023
Abbas (10.1016/j.iot.2023.100902_b17) 2021; 16
Dhirani (10.1016/j.iot.2023.100902_b8) 2021; 21
Dharminder (10.1016/j.iot.2023.100902_b29) 2022
Ming (10.1016/j.iot.2023.100902_b35) 2022
Chatterjee (10.1016/j.iot.2023.100902_b24) 2016; 15
Das (10.1016/j.iot.2023.100902_b26) 2018; 5
Tanveer (10.1016/j.iot.2023.100902_b27) 2022; 10
Sureshkumar (10.1016/j.iot.2023.100902_b16) 2019; 100
Sengupta (10.1016/j.iot.2023.100902_b3) 2020; 149
Ma (10.1016/j.iot.2023.100902_b15) 2019; 6
Rachit (10.1016/j.iot.2023.100902_b4) 2021; 3
Challa (10.1016/j.iot.2023.100902_b13) 2017; 5
Wei (10.1016/j.iot.2023.100902_b38) 2017; 60
Hammad (10.1016/j.iot.2023.100902_b9) 2023
Wazid (10.1016/j.iot.2023.100902_b11) 2021; 17
Xu (10.1016/j.iot.2023.100902_b14) 2023
References_xml – volume: 3
  start-page: 1
  year: 2021
  end-page: 14
  ident: b4
  article-title: Security trends in Internet of Things: A survey
  publication-title: SN Appl. Sci.
  contributor:
    fullname: Ragiri
– volume: 8
  start-page: 43711
  year: 2020
  end-page: 43724
  ident: b33
  article-title: Securing smart city surveillance: A lightweight authentication mechanism for unmanned vehicles
  publication-title: IEEE Access
  contributor:
    fullname: Al-Turjman
– volume: 115
  start-page: 1667
  year: 2020
  end-page: 1693
  ident: b5
  article-title: Security and privacy in IoT: A survey
  publication-title: Wirel. Pers. Commun.
  contributor:
    fullname: Kakkasageri
– year: 2023
  ident: b14
  article-title: Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for Industrial Internet of Things
  publication-title: IEEE Trans. Serv. Comput.
  contributor:
    fullname: Zhang
– start-page: 1
  year: 2022
  ident: b19
  article-title: REAP-IIoT: Resource-efficient authentication protocol for the industrial Internet of Things
  publication-title: IEEE Internet Things J.
  contributor:
    fullname: Alharbi
– volume: 10
  start-page: 15891
  year: 2022
  end-page: 15910
  ident: b23
  article-title: Improved secure and efficient Chebyshev chaotic map-based user authentication scheme
  publication-title: IEEE Access
  contributor:
    fullname: Won
– volume: 8
  start-page: 7727
  year: 2021
  end-page: 7744
  ident: b12
  article-title: Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system
  publication-title: IEEE Internet Things J.
  contributor:
    fullname: Vasilakos
– volume: 10
  start-page: 19836
  year: 2022
  end-page: 19851
  ident: b18
  article-title: RUAM-IoD: A robust user authentication mechanism for the Internet of Drones
  publication-title: IEEE Access
  contributor:
    fullname: Alharbi
– start-page: 1
  year: 2023
  end-page: 14
  ident: b6
  article-title: CMAP-IoT: Chaotic map-based authentication protocol for crowdsourcing internet of things
  publication-title: Arab. J. Sci. Eng.
  contributor:
    fullname: Chaudhry
– volume: 10
  start-page: 23008
  year: 2022
  end-page: 23021
  ident: b27
  article-title: REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system
  publication-title: IEEE Access
  contributor:
    fullname: Kim
– start-page: 1
  year: 2022
  end-page: 12
  ident: b35
  article-title: A secure one-to-many authentication and key agreement scheme for industrial IoT
  publication-title: IEEE Syst. J.
  contributor:
    fullname: Lu
– volume: 6
  start-page: 8065
  year: 2019
  end-page: 8075
  ident: b15
  article-title: An efficient and provably secure authenticated key agreement protocol for fog-based vehicular Ad-Hoc networks
  publication-title: IEEE Internet Things J.
  contributor:
    fullname: Choo
– volume: 160
  start-page: 215
  year: 2020
  end-page: 227
  ident: b28
  article-title: A secure authentication scheme with forward secrecy for industrial Internet of Things using rabin cryptosystem
  publication-title: Comput. Commun.
  contributor:
    fullname: Yu
– volume: 17
  start-page: 7174
  year: 2021
  end-page: 7184
  ident: b11
  article-title: Designing authenticated key management scheme in 6G-enabled network in a box deployed for industrial applications
  publication-title: IEEE Trans. Ind. Inform.
  contributor:
    fullname: Alazab
– volume: 149
  year: 2020
  ident: b3
  article-title: A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT
  publication-title: J. Netw. Comput. Appl.
  contributor:
    fullname: Bit
– volume: 9
  start-page: 21493
  year: 2022
  end-page: 21504
  ident: b22
  article-title: An authentication protocol for next generation of constrained IoT systems
  publication-title: IEEE Internet Things J.
  contributor:
    fullname: Rodrigues
– volume: 16
  year: 2021
  ident: b17
  article-title: A secure remote user authentication scheme for 6LoWPAN-based Internet of Things
  publication-title: PLoS One
  contributor:
    fullname: Al-Jumeily OBE
– volume: 82
  start-page: 727
  year: 2018
  end-page: 737
  ident: b32
  article-title: A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Shen
– volume: 2018
  year: 2018
  ident: b31
  article-title: A lightweight privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: Lightpriauth
  publication-title: J. Sens.
  contributor:
    fullname: Castillejo
– volume: 15
  start-page: 824
  year: 2016
  end-page: 839
  ident: b24
  article-title: Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment
  publication-title: IEEE Trans. Dependable Secure Comput.
  contributor:
    fullname: Vasilakos
– volume: 24
  start-page: 1175
  year: 2022
  end-page: 1211
  ident: b1
  article-title: A survey of intelligent network slicing management for industrial IoT: Integrated approaches for smart transportation, smart energy, and smart factory
  publication-title: IEEE Commun. Surv. Tutor.
  contributor:
    fullname: Guo
– volume: 5
  start-page: 3028
  year: 2017
  end-page: 3043
  ident: b13
  article-title: Secure signature-based authenticated key establishment scheme for future IoT applications
  publication-title: IEEE Access
  contributor:
    fullname: Yoo
– volume: 9
  start-page: 105101
  year: 2021
  end-page: 105117
  ident: b36
  article-title: An improved authentication protocol for smart healthcare system using wireless medical sensor network
  publication-title: IEEE Access
  contributor:
    fullname: Bin
– volume: 60
  start-page: 72103
  year: 2017
  ident: b38
  article-title: An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model
  publication-title: Sci. China Inf. Sci.
  contributor:
    fullname: Wang
– volume: 58
  start-page: 176
  year: 2021
  end-page: 192
  ident: b7
  article-title: Cyber-physical systems architectures for industrial Internet of Things applications in industry 4.0: A literature review
  publication-title: J. Manuf. Syst.
  contributor:
    fullname: Alberti
– volume: 16
  start-page: 6584
  year: 2019
  end-page: 6596
  ident: b30
  article-title: Faster authenticated key agreement with perfect forward secrecy for industrial Internet of Things
  publication-title: IEEE Trans. Ind. Inform.
  contributor:
    fullname: Zhou
– volume: 100
  start-page: 938
  year: 2019
  end-page: 951
  ident: b16
  article-title: Robust secure communication protocol for smart healthcare system with FPGA implementation
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Sekar
– volume: 23
  start-page: 2316
  year: 2021
  end-page: 2330
  ident: b10
  article-title: Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems
  publication-title: IEEE Trans. Intell. Transp. Syst.
  contributor:
    fullname: Park
– volume: 488
  start-page: 13
  year: 2019
  end-page: 18
  ident: b39
  article-title: Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification
  publication-title: Inform. Sci.
  contributor:
    fullname: Yang
– volume: 22
  start-page: 2489
  year: 2020
  end-page: 2520
  ident: b2
  article-title: A systematic survey of industrial internet of things security: Requirements and fog computing opportunities
  publication-title: IEEE Commun. Surv. Tutor.
  contributor:
    fullname: Dragoni
– volume: 5
  start-page: 4900
  year: 2018
  end-page: 4913
  ident: b26
  article-title: Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment
  publication-title: IEEE Internet Things J.
  contributor:
    fullname: Rodrigues
– start-page: 1
  year: 2022
  ident: b29
  article-title: Post-quantum lattice based secure reconciliation enabled key agreement protocol for IoT
  publication-title: IEEE Internet Things J.
  contributor:
    fullname: Jamal
– volume: 8
  start-page: 3801
  year: 2020
  end-page: 3811
  ident: b25
  article-title: Secure multifactor authenticated key agreement scheme for industrial IoT
  publication-title: IEEE Internet Things J.
  contributor:
    fullname: Kumar
– volume: 21
  start-page: 3901
  year: 2021
  ident: b8
  article-title: Industrial IoT, cyber threats, and standards landscape: Evaluation and roadmap
  publication-title: Sensors
  contributor:
    fullname: Newe
– volume: 84
  start-page: 149
  year: 2018
  end-page: 159
  ident: b21
  article-title: A secure chaotic map-based remote authentication scheme for telecare medicine information systems
  publication-title: Future Gener. Comput. Syst.
  contributor:
    fullname: Jo
– start-page: 1
  year: 2022
  end-page: 12
  ident: b34
  article-title: Resource-efficient authenticated data sharing mechanism for smart wearable systems
  publication-title: IEEE Trans. Netw. Sci. Eng.
  contributor:
    fullname: El-Latif
– start-page: 1
  year: 2023
  ident: b9
  article-title: A provable secure and efficient authentication framework for smart manufacturing industry
  publication-title: IEEE Access
  contributor:
    fullname: Khan
– volume: 9
  start-page: 1339
  year: 2022
  end-page: 1353
  ident: b20
  article-title: RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones
  publication-title: IEEE Internet Things J.
  contributor:
    fullname: Hassan
– volume: 22
  start-page: 13
  year: 2016
  end-page: 26
  ident: b40
  article-title: General classification of the authenticated encryption schemes for the CAESAR competition
  publication-title: Comp. Sci. Rev.
  contributor:
    fullname: Lucks
– year: 2022
  ident: b37
  article-title: ECC-based authenticated key agreement protocol for industrial control system
  publication-title: IEEE Internet Things J.
  contributor:
    fullname: Guo
– volume: 22
  start-page: 2489
  issue: 4
  year: 2020
  ident: 10.1016/j.iot.2023.100902_b2
  article-title: A systematic survey of industrial internet of things security: Requirements and fog computing opportunities
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2020.3011208
  contributor:
    fullname: Tange
– volume: 21
  start-page: 3901
  issue: 11
  year: 2021
  ident: 10.1016/j.iot.2023.100902_b8
  article-title: Industrial IoT, cyber threats, and standards landscape: Evaluation and roadmap
  publication-title: Sensors
  doi: 10.3390/s21113901
  contributor:
    fullname: Dhirani
– volume: 10
  start-page: 23008
  year: 2022
  ident: 10.1016/j.iot.2023.100902_b27
  article-title: REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3153069
  contributor:
    fullname: Tanveer
– volume: 115
  start-page: 1667
  issue: 2
  year: 2020
  ident: 10.1016/j.iot.2023.100902_b5
  article-title: Security and privacy in IoT: A survey
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-020-07649-9
  contributor:
    fullname: Chanal
– volume: 10
  start-page: 19836
  year: 2022
  ident: 10.1016/j.iot.2023.100902_b18
  article-title: RUAM-IoD: A robust user authentication mechanism for the Internet of Drones
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3149376
  contributor:
    fullname: Tanveer
– volume: 58
  start-page: 176
  year: 2021
  ident: 10.1016/j.iot.2023.100902_b7
  article-title: Cyber-physical systems architectures for industrial Internet of Things applications in industry 4.0: A literature review
  publication-title: J. Manuf. Syst.
  doi: 10.1016/j.jmsy.2020.11.017
  contributor:
    fullname: Pivoto
– volume: 24
  start-page: 1175
  issue: 2
  year: 2022
  ident: 10.1016/j.iot.2023.100902_b1
  article-title: A survey of intelligent network slicing management for industrial IoT: Integrated approaches for smart transportation, smart energy, and smart factory
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2022.3158270
  contributor:
    fullname: Wu
– start-page: 1
  year: 2022
  ident: 10.1016/j.iot.2023.100902_b34
  article-title: Resource-efficient authenticated data sharing mechanism for smart wearable systems
  publication-title: IEEE Trans. Netw. Sci. Eng.
  contributor:
    fullname: Tanveer
– volume: 84
  start-page: 149
  year: 2018
  ident: 10.1016/j.iot.2023.100902_b21
  article-title: A secure chaotic map-based remote authentication scheme for telecare medicine information systems
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.08.029
  contributor:
    fullname: Li
– volume: 5
  start-page: 4900
  issue: 6
  year: 2018
  ident: 10.1016/j.iot.2023.100902_b26
  article-title: Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2018.2877690
  contributor:
    fullname: Das
– volume: 10
  start-page: 15891
  year: 2022
  ident: 10.1016/j.iot.2023.100902_b23
  article-title: Improved secure and efficient Chebyshev chaotic map-based user authentication scheme
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3149315
  contributor:
    fullname: Ryu
– year: 2023
  ident: 10.1016/j.iot.2023.100902_b14
  article-title: Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for Industrial Internet of Things
  publication-title: IEEE Trans. Serv. Comput.
  doi: 10.1109/TSC.2023.3257569
  contributor:
    fullname: Xu
– start-page: 1
  year: 2022
  ident: 10.1016/j.iot.2023.100902_b19
  article-title: REAP-IIoT: Resource-efficient authentication protocol for the industrial Internet of Things
  publication-title: IEEE Internet Things J.
  contributor:
    fullname: Tanveer
– start-page: 1
  year: 2022
  ident: 10.1016/j.iot.2023.100902_b35
  article-title: A secure one-to-many authentication and key agreement scheme for industrial IoT
  publication-title: IEEE Syst. J.
  contributor:
    fullname: Ming
– volume: 149
  year: 2020
  ident: 10.1016/j.iot.2023.100902_b3
  article-title: A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2019.102481
  contributor:
    fullname: Sengupta
– volume: 23
  start-page: 2316
  issue: 3
  year: 2021
  ident: 10.1016/j.iot.2023.100902_b10
  article-title: Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems
  publication-title: IEEE Trans. Intell. Transp. Syst.
  doi: 10.1109/TITS.2021.3056704
  contributor:
    fullname: Sutrala
– volume: 9
  start-page: 105101
  year: 2021
  ident: 10.1016/j.iot.2023.100902_b36
  article-title: An improved authentication protocol for smart healthcare system using wireless medical sensor network
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3099299
  contributor:
    fullname: Yuanbing
– volume: 8
  start-page: 43711
  year: 2020
  ident: 10.1016/j.iot.2023.100902_b33
  article-title: Securing smart city surveillance: A lightweight authentication mechanism for unmanned vehicles
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2977817
  contributor:
    fullname: Ali
– volume: 6
  start-page: 8065
  issue: 5
  year: 2019
  ident: 10.1016/j.iot.2023.100902_b15
  article-title: An efficient and provably secure authenticated key agreement protocol for fog-based vehicular Ad-Hoc networks
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2019.2902840
  contributor:
    fullname: Ma
– volume: 488
  start-page: 13
  year: 2019
  ident: 10.1016/j.iot.2023.100902_b39
  article-title: Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification
  publication-title: Inform. Sci.
  doi: 10.1016/j.ins.2019.03.002
  contributor:
    fullname: Wang
– volume: 17
  start-page: 7174
  issue: 10
  year: 2021
  ident: 10.1016/j.iot.2023.100902_b11
  article-title: Designing authenticated key management scheme in 6G-enabled network in a box deployed for industrial applications
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2020.3020303
  contributor:
    fullname: Wazid
– volume: 100
  start-page: 938
  year: 2019
  ident: 10.1016/j.iot.2023.100902_b16
  article-title: Robust secure communication protocol for smart healthcare system with FPGA implementation
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.05.058
  contributor:
    fullname: Sureshkumar
– volume: 9
  start-page: 1339
  issue: 2
  year: 2022
  ident: 10.1016/j.iot.2023.100902_b20
  article-title: RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2021.3084946
  contributor:
    fullname: Tanveer
– volume: 22
  start-page: 13
  year: 2016
  ident: 10.1016/j.iot.2023.100902_b40
  article-title: General classification of the authenticated encryption schemes for the CAESAR competition
  publication-title: Comp. Sci. Rev.
  doi: 10.1016/j.cosrev.2016.07.002
  contributor:
    fullname: Abed
– volume: 9
  start-page: 21493
  issue: 21
  year: 2022
  ident: 10.1016/j.iot.2023.100902_b22
  article-title: An authentication protocol for next generation of constrained IoT systems
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2022.3184293
  contributor:
    fullname: Rostampour
– year: 2022
  ident: 10.1016/j.iot.2023.100902_b37
  article-title: ECC-based authenticated key agreement protocol for industrial control system
  publication-title: IEEE Internet Things J.
  contributor:
    fullname: Chen
– start-page: 1
  year: 2022
  ident: 10.1016/j.iot.2023.100902_b29
  article-title: Post-quantum lattice based secure reconciliation enabled key agreement protocol for IoT
  publication-title: IEEE Internet Things J.
  contributor:
    fullname: Dharminder
– volume: 82
  start-page: 727
  year: 2018
  ident: 10.1016/j.iot.2023.100902_b32
  article-title: A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.08.042
  contributor:
    fullname: Wu
– volume: 8
  start-page: 7727
  issue: 9
  year: 2021
  ident: 10.1016/j.iot.2023.100902_b12
  article-title: Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.3040938
  contributor:
    fullname: Srinivas
– volume: 16
  start-page: 6584
  issue: 10
  year: 2019
  ident: 10.1016/j.iot.2023.100902_b30
  article-title: Faster authenticated key agreement with perfect forward secrecy for industrial Internet of Things
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2019.2963328
  contributor:
    fullname: Yang
– volume: 60
  start-page: 72103
  year: 2017
  ident: 10.1016/j.iot.2023.100902_b38
  article-title: An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model
  publication-title: Sci. China Inf. Sci.
  doi: 10.1007/s11432-016-5535-7
  contributor:
    fullname: Wei
– volume: 3
  start-page: 1
  year: 2021
  ident: 10.1016/j.iot.2023.100902_b4
  article-title: Security trends in Internet of Things: A survey
  publication-title: SN Appl. Sci.
  doi: 10.1007/s42452-021-04156-9
  contributor:
    fullname: Rachit
– volume: 16
  issue: 11
  year: 2021
  ident: 10.1016/j.iot.2023.100902_b17
  article-title: A secure remote user authentication scheme for 6LoWPAN-based Internet of Things
  publication-title: PLoS One
  doi: 10.1371/journal.pone.0258279
  contributor:
    fullname: Abbas
– volume: 5
  start-page: 3028
  year: 2017
  ident: 10.1016/j.iot.2023.100902_b13
  article-title: Secure signature-based authenticated key establishment scheme for future IoT applications
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2676119
  contributor:
    fullname: Challa
– volume: 8
  start-page: 3801
  issue: 5
  year: 2020
  ident: 10.1016/j.iot.2023.100902_b25
  article-title: Secure multifactor authenticated key agreement scheme for industrial IoT
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.3024703
  contributor:
    fullname: Vinoth
– volume: 160
  start-page: 215
  year: 2020
  ident: 10.1016/j.iot.2023.100902_b28
  article-title: A secure authentication scheme with forward secrecy for industrial Internet of Things using rabin cryptosystem
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2020.06.012
  contributor:
    fullname: Shuai
– volume: 2018
  year: 2018
  ident: 10.1016/j.iot.2023.100902_b31
  article-title: A lightweight privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: Lightpriauth
  publication-title: J. Sens.
  doi: 10.1155/2018/7574238
  contributor:
    fullname: Chen
– start-page: 1
  year: 2023
  ident: 10.1016/j.iot.2023.100902_b9
  article-title: A provable secure and efficient authentication framework for smart manufacturing industry
  publication-title: IEEE Access
  contributor:
    fullname: Hammad
– start-page: 1
  year: 2023
  ident: 10.1016/j.iot.2023.100902_b6
  article-title: CMAP-IoT: Chaotic map-based authentication protocol for crowdsourcing internet of things
  publication-title: Arab. J. Sci. Eng.
  contributor:
    fullname: Tanveer
– volume: 15
  start-page: 824
  issue: 5
  year: 2016
  ident: 10.1016/j.iot.2023.100902_b24
  article-title: Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment
  publication-title: IEEE Trans. Dependable Secure Comput.
  doi: 10.1109/TDSC.2016.2616876
  contributor:
    fullname: Chatterjee
SSID ssj0002963237
Score 2.4168003
Snippet The Industrial Internet of Things (IIoT) revolutionizes industrial production using smart devices (SMDs) deployed in IIoT environments. These SMDs collect and...
SourceID crossref
elsevier
SourceType Aggregation Database
Publisher
StartPage 100902
SubjectTerms ASCON
Authentication
Encryption
Internet of Things
Privacy
Scyther
Session key
Title CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things
URI https://dx.doi.org/10.1016/j.iot.2023.100902
Volume 23
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFA5ju-hB_InzFzl4EsKaNk0bb6M4Nsd20I3tVtI0wQm2Q-r_b16b6kS8eCotfVBeH-_78vK9F4RuQ4t5cR5kxLJlQ5ivKBGWmBMVaCoVBJkPDc6zOR8v2eM6XHdQ0vbCgKzS5f4mp9fZ2j0ZOG8OtpvN4NkubSy61GVNC0TQRt2zcAR7tb3hZDqef5VafBtkfj09E0wI2LT7m7XSa1OCqNIPQDEgXH3lF0LtoM7oEB04uoiHzRcdoY4ujtH-zhDBE7RKZsMRmUzKxT1OXmRp38RvcksAn3IsQcFeVK4yh02rxcKWrOLvcztwUxnUFS4Nbs7yPEXL0cMiGRN3XAJRvogqQk2kaaw4DBVTAWW5EYFkgquc-yKLQ2ODhmWW0CkT8piHVMnIxMqTLBZh7GXBGeoWZaHPEfYUjI1hwB4Ei7gnPak1pwoW04pR3Ud3rYvSbTMVI23lYq-p9WcK_kwbf_YRa52Y_vi1qc3af5td_M_sEu3BXaO3u0Ld6v1DX1veUGU3Li7gOn1aTT8Bzxi_aA
link.rule.ids 314,780,784,24116,27924,27925,45679
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqdgAGxFOUpwcmJKtx4jgxWxVRJfSx0IpuluPaokgkFQr_HztxoAixsCY5Kfpyuvt8-e4OgNvQ5Lx4FeTIsGWNiC8xYoaYIxkoLKR1Mt82OE9nNF2Qx2W47ICk7YWxskoX-5uYXkdrd2Xg0Bxs1uvBkznamOxSlzVNIrJt1D3DBiLj2r1hNk5nX6UW3ziZX0_PtCbI2rT_N2ul17q0oko_sIoB5uorvzLUVtYZHYB9RxfhsHmjQ9BRxRHY2xoieAyek-lwhLKsnN_D5EWU5kn4JjbI5qcVFFbBXlSuMgd1q8WChqzC770dsKkMqgqWGja7PE_AYvQwT1Lk1iUg6bOoQlhHCseS2qFiMsBkpVkgCKNyRX2Wx6E2TkNyQ-ikDmlMQyxFpGPpCRKzMPby4BR0i7JQZwB60o6NIZY9MBJRT3hCKYqlPUxLglUf3LUQ8U0zFYO3crFXbvDkFk_e4NkHpAWR__i03ETtv83O_2d2A3bS-XTCJ9lsfAF27Z1Ge3cJutX7h7oyHKLKr52PfAIGQMDA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=CMAF-IIoT%3A+Chaotic+map-based+authentication+framework+for+Industrial+Internet+of+Things&rft.jtitle=Internet+of+things+%28Amsterdam.+Online%29&rft.au=Tanveer%2C+Muhammad&rft.au=Badshah%2C+Akhtar&rft.au=Khan%2C+Abd+Ullah&rft.au=Alasmary%2C+Hisham&rft.date=2023-10-01&rft.issn=2542-6605&rft.eissn=2542-6605&rft.volume=23&rft.spage=100902&rft_id=info:doi/10.1016%2Fj.iot.2023.100902&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_iot_2023_100902
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2542-6605&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2542-6605&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2542-6605&client=summon