Log In Sign Up

EBAKE-SE: A Novel ECC Based Authenticated Key Exchange between Industrial IoT Devices using Secure Element

by   Chintan Patela, et al.

Industrial IoT (IIoT) aims to enhance services provided by various industries such as manufacturing and product processing. IIoT suffers from various challenges and security is one of the key challenge among those challenges. Authentication and access control are two notable challenges for any Industrial IoT (IIoT) based industrial deployment. Any IoT based Industry 4.0 enterprise designs networks between hundreds of tiny devices such as sensors, actuators, fog devices and gateways. Thus, articulating a secure authentication protocol between sensing devices or a sensing device and user devices is an essential step in IoT security. In this paper, first, we present cryptanalysis for the certificate-based scheme proposed for similar environment by Das et al. and prove that their scheme is vulnerable to various traditional attacks such as device anonymity, MITM, and DoS. We then put forward an inter-device authentication scheme using an ECC (Elliptic Curve Cryptography) that is highly secure and lightweight compared to other schemes for a similar environment. Furthermore, we set forth a formal security analysis using the random oracle based ROR model and informal security analysis over the Doleve-Yao channel. In this paper, we present the comparison of the proposed scheme with existing schemes based on communication cost, computation cost and security index to prove that the proposed EBAKE-SE is highly efficient, reliable, and trustworthy compared to other existing schemes for inter-device authentication. At long last, we present an implementation for the proposed EBAKE-SE using MQTT protocol


page 1

page 10


LDA-2IoT : A Level Dependent Authentication using Two Factor for IoT Paradigm

The widespread expansion of the IoT based services are changing peoples ...

An Enclave-based TEE for SE-in-SoC in RISC-V Industry

Secure Element (SE) in SoC sees an increasing adoption in industry. Many...

A Key-Agreement Protocol Based on Static Parameters and Hash Functions

Wireless Body Sensor Network (WBSN) is a developing technology with cons...

RFID authentication protocol based on a novel EPC Gen2 PRNG

Continuous advances of Information Technologies (ITs), and in particular...

LAKEE: A Lightweight Authenticated Key Exchange Protocol for Power Constrained Devices

The rapid development of IoT networks has led to a research trend in des...

e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices

To facilitate monitoring and management, modern Implantable Medical Devi...

Efficient, Flexible and Secure Group Key Management Protocol for Dynamic IoT Settings

Many Internet of Things (IoT) scenarios require communication to and dat...