Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0
|Title:||Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0||Authors:||Gaba, Gurjot Singh; Kumar, Gulshan; Monga, Himanshu; Liyanage, Madhusanka; et al.||Permanent link:||http://hdl.handle.net/10197/12086||Date:||20-Jul-2020||Online since:||2021-04-14T09:04:29Z||Abstract:||Industry 4.0 has brought solutions for faster data accessibility, fault identification, performance analysis, and control of machines remotely by managers. Though beneficial but dangerous as the IoT (Internet of Things) nodes communicate over the unsecured wireless medium. The communication over unsecured wireless channel opened enormous ways for the illegitimate nodes to access the information and take control over the industrial machines despite being physically away. These threats can be overpowered with secure sessions; however, the exchange of keys to establish a secure session over a vulnerable channel becomes a challenge. Our approach (LKE) intend to solve this problem. LKE provides a lightweight key exchange platform to the legitimate IoT nodes and prohibit the unauthorized abuses. LKE uses lightweight Elliptic Curve Qu-Vanstone (ECQV) based implicit certificates for trust-building and generating keys among entities. All the messages exchanged are secured to prevent unauthorized access to information and preventing against forgery, replay, modification, impersonation and man-in-the-middle attacks, etc. The proposed scheme is tested on the AVISPA tool and results indicate its trustworthiness and strong resistivity against potential attacks. LKE has less computation and communication complexities due to the utilization of limited cryptographic operations which make it superior in comparison to other state-of-the-work.||Funding Details:||European Commission||Type of material:||Journal Article||Publisher:||IEEE||Journal:||IEEE Access||Volume:||8||Start page:||132808||End page:||132824||Keywords:||Cyber-physical system; Industry 4.0; Protocols; Wireless sensor networks; Privacy; Industrial Internet of Things; Implicit certificates; Key exchange; Security||DOI:||10.1109/access.2020.3010302||Language:||en||Status of Item:||Peer reviewed||ISSN:||2169-3536||This item is made available under a Creative Commons License:||https://creativecommons.org/licenses/by/3.0/ie/|
|Appears in Collections:||Computer Science Research Collection|
Show full item record
If you are a publisher or author and have copyright concerns for any item, please email firstname.lastname@example.org and the item will be withdrawn immediately. The author or person responsible for depositing the article will be contacted within one business day.