Authenticated Key Exchange among IIoT Devices via Modified Blowfish with Optimal Key Generation

Kurni, Muralidhar,Singh, Charanjeet,Geerthik, S.
DOI: https://doi.org/10.1007/s11277-024-11536-y
IF: 2.017
2024-10-22
Wireless Personal Communications
Abstract:The Industrial Internet of Things (IIoT) refers to the application of intelligent actuators and sensors to enhance manufacturing and industrial operations. IIoT, or the industrial internet, or Industry 4.0, has been utilizing data generated by "dumb machines" in industrial settings for years by leveraging the capabilities of smart devices and real-time analytics. Traditional security solutions designed to protect sensitive data are becoming outdated because third parties are involved in the IIoT. During communication, there is the risk of security via different attacks. This ensures the need for authorization during the communication. The main objective of this research is to develop a novel authentication scheme by modifying the blowfish algorithm for secure encryption in IIoT. This paper intends to propose a new IIOT authentication scheme that includes four major aspects a) the System Setup phase b) the Device Registration phase c) the Authentication Phase and d) the Dynamic Device Addition phase. In the system Setup phase, System setup is done via trusted CA-based system parameters selection. The Certification Authority (CA) performs device registration for the registration of Internet of Things (IoT) smart devices corresponding to a certain Gateway Node (GWN) based on the IoT applications. Every partner in the IoT arrangement must have faith in the other. They provide mutual authentication among devices during the Authentication phase. Here, the mutual authentication procedure is done using an encryption technique. An enhanced Blowfish with optimum key generation is proposed in this work to ensure the authentication. For tuning the optimal key, this work implements a novel Self-improved Tasmanian Devil Optimization (SITDO). Finally, the Dynamic device addition phase is performed, where the Trusted Authority (TA) deploys a new device or replaces the device. The work is validated over the other conventional methods in terms of different attacks. The SITDO model had the lowest attack value (0.2) for key size (32 bits) while conventional methods have acquired maximum attack rates.
telecommunications
What problem does this paper attempt to address?