ECC-Based Authenticated Key Agreement Protocol for Industrial Control System
Yanru Chen,Fengming Yin,Shunfang Hu,Limin Sun,Yang Li,Bin Xing,Liangyin Chen,Bing Guo
DOI: https://doi.org/10.1109/jiot.2022.3219233
IF: 10.6
2023-03-11
IEEE Internet of Things Journal
Abstract:Nowadays, Industrial Internet of Things (IIoT) technology has made a great progress and the industrial control systems (ICSs) have been used extensively, which has brought more and more serious information security threats to the ICS at the same time. The authenticated key agreement (AKA) protocol is a common method to ensure the communication security. This work proposes a lightweight AKA protocol based on the elliptic curve cryptography (ECC) algorithm to adapt to the resource-constrained environment. We only employ hash operation, XOR operation, and ECC algorithm to encrypt the data in the authentication and key agreement phase, and avoid involving the register center while proceeding the key agreement, to give consideration to both performance and security. The security analyses indicate that our protocol can meet nine critical security requirements, more than all of the existing protocols, and the performance analysis carried out indicates that our protocol has less computational and communication overheads in contrast to other corelative protocols.
computer science, information systems,telecommunications,engineering, electrical & electronic