CLC number:
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 0000-00-00
Cited: 0
Clicked: 622
Wenli SHANG, Xudong WEN, Zhuo CHEN, Wenze XIONG, Zhiwei CHANG, Zhong CAO. Lightweight authentication scheme for edge control systems in Industrial Internet of Things[J]. Frontiers of Information Technology & Electronic Engineering, 1998, -1(-1): .
@article{title="Lightweight authentication scheme for edge control systems in Industrial Internet of Things",
author="Wenli SHANG, Xudong WEN, Zhuo CHEN, Wenze XIONG, Zhiwei CHANG, Zhong CAO",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="-1",
number="-1",
pages="",
year="1998",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2400497"
}
%0 Journal Article
%T Lightweight authentication scheme for edge control systems in Industrial Internet of Things
%A Wenli SHANG
%A Xudong WEN
%A Zhuo CHEN
%A Wenze XIONG
%A Zhiwei CHANG
%A Zhong CAO
%J Journal of Zhejiang University SCIENCE C
%V -1
%N -1
%P
%@ 2095-9184
%D 1998
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2400497
TY - JOUR
T1 - Lightweight authentication scheme for edge control systems in Industrial Internet of Things
A1 - Wenli SHANG
A1 - Xudong WEN
A1 - Zhuo CHEN
A1 - Wenze XIONG
A1 - Zhiwei CHANG
A1 - Zhong CAO
J0 - Journal of Zhejiang University Science C
VL - -1
IS - -1
SP -
EP -
%@ 2095-9184
Y1 - 1998
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2400497
Abstract: In edge computing-based industrial control systems (referred to as edge control systems, ECSs), edge computing places higher demands on the local processing power of data. The traditional industrial programmable logic controller (PLC) cannot complete this task. Edge intelligent controllers (EICs) have been developed according to the demand of edge computing. As the core component of edge computing, the security and reliable operation of the EIC has great significance and influence on the development and promotion of edge computing. The EIC needs to communicate sensitive information with terminal devices (TDs); hence, there is an urgent need to address the authentication issue between the EIC and TDs. The TDs that need to access the EIC have limited computing and storage capacity, and the traditional asymmetric cryptography-based authentication scheme is difficult to deploy on resource-constrained devices due to its high computational cost. Therefore, this paper designs a lightweight authentication scheme for ECSs using low-computational-cost hash functions and Exclusive OR (XOR) operations; this scheme can achieve bidirectional anonymous authentication and key agreement between the EIC and TDs to protect the privacy of the devices. Through security analysis, we demonstrate that the authentication scheme is able to provide the necessary security features and can resist major known attacks. Furthermore, performance analysis and comparisons indicate that the proposed authentication scheme is not only effective and feasible for deployment in ECSs but is also lightweight.
Open peer comments: Debate/Discuss/Question/Opinion
<1>