- 1School of Automation Science and Engineering, South China University of Technology, Guangzhou, China
- 2International Business School, Guangdong University of Finance and Economics, Guangzhou, China
Industrial Internet of Things (IIoT) integrates the latest information and communication technology with the industrial economy, driving the intelligent transformation of the industry. However, with the rapid development of IIoT, its security challenges are increasingly severe. Therefore, this paper focuses on the security protection of industrial Internet, especially the application and challenges of group schemes. By analyzing the security requirements of IIoT, this paper proposes a secure and effective group authentication scheme for IIoT. Based on the Chinese remainder theorem, this scheme supports authorizing users to remotely access a set of industrial sensor devices and uses a three factor authentication method to verify the legitimacy of user identity. At the same time, through Chebyshev chaotic mapping, symmetric encryption, secret sharing technique and the Chinese remainder theorem, this scheme constructs a secure group session key to ensure encrypted transmission and integrity verification of data. The experimental results show that this scheme performs well in both security and computational efficiency, especially in large-scale group communication scenarios, which can significantly reduce communication latency and overhead.
Highlights
• This paper proposes a secure and effective authentication scheme for IIoT based on the Chinese Remainder
• The experimental results show that this scheme performs well in both security and computational efficiency.
1 Introduction
Industrial Internet of Things (IIoT) represents the fusion of new information technology and the industrial economy, emerging as a pivotal driver for industrial transformation and upgrading [1]. By enabling seamless connectivity, IIoT has forged a novel manufacturing and service framework, offering robust underpinning for the intelligent evolution of traditional industries, providing strong support for the intelligent transformation of traditional industries. However, with the rapid development of IIoT, its security and privacy issues are also increasingly prominent [2–4]. Especially in the context of the widespread deployment for industrial equipment and the generation of massive industrial data, how to ensure the safe communication, data integrity and availability of IIoT has become the focus and hotspot of current research [5].
In IIoT, the number of industrial devices is huge. The data generated by these devices is not only huge, but also often involves the privacy of users and enterprises [6]. For example, industrial production data, control instructions, identity privacy information, etc., are all important resources in the industrial Internet. However, because IIoT usually uses open channels for communication, attackers have the opportunity to obtain industrial privacy data through tampering, forgery, replay and other attacks, and undermine the security communication and data integrity of IIoT [7]. These attacks not only cause economic losses to users and businesses, but may also have immeasurable impacts on the entire industrial ecosystem [8]. Therefore, how to build a safe and reliable IIoT system to guarantee the security has become an important topic of IIoT security protection [9]. Among them, authentication schemes have received widespread attention as key means to solve this problem [6]. In IIoT, this can verify the identity of users and intelligent devices participating in communication. Meanwhile, by negotiating session keys, the requirements for data encryption can be met, ensuring the security of communication and the integrity of data. At present, authentication schemes have been widely applied in multiple fields. For example, in smart grid, it can ensure the stable operation and data security of the power grid system. In cloud computing, it can protect the security of cloud storage and cloud computing resources. In smart cities, it can ensure the intelligence and safety of urban infrastructure. In wireless sensor networks, it can ensure secure communication and data transmission between sensor nodes [10–12].
In recent years, IIoT based on group schemes has been widely applied in industrial manufacturing [13]. Group scheme allows a group of users or devices to jointly negotiate a key on an insecure channel, thereby achieving secure communication within the group. This protocol has a broad application prospect in IIoT, especially in the production, transportation and use processes that require the joint participation of multiple industrial entities. However, the application of group scheme in IIoT also faces many challenges [14–16]. Firstly, the large number and widespread distribution of industrial entities significantly increase the complexity and cost of group key negotiation. Secondly, industrial data frequently encompasses sensitive information, necessitating data security and privacy protection measures during group key negotiation. In addition, the attack means in IIoT system are diverse and complex. How to build a group key agreement scheme that can resist various attacks is also an urgent problem to be solved. Aiming at the challenge in IIoT, this paper proposes a secure and efficient group authentication scheme.
1.1 Contribution
The main contribution of this article are as follows:
(1) This paper proposes a secure and effective authentication scheme for IIoT based on the Chinese Remainder Theorem, which supports authorized users to remotely access a set of industrial sensor devices and ensures communication security and data integrity. By using passwords, biometric recognition and smart card, this scheme effectively verifies the legitimacy of user identity in the IIoT. At the same time, using Chebyshev chaotic mapping, symmetric encryption, secret sharing technology and Chinese remainder theorem, this scheme constructs a secure session key between a legitimate group of industrial sensor devices and achieves encrypted transmission and integrity verification of data through this session key.
(2) In order to verify the effectiveness and performance of the group authentication scheme proposed, we conducted extensive experimental verification and performance evaluation. The experimental results show that this scheme performs well in both security and computational efficiency. Especially in large-scale group communication scenarios, this scheme can significantly reduce communication latency and overhead.
1.2 Roadmap of this article
The organizational structure of the subsequent content is summarized as follows: Section 2 discusses related field work. In section 3, we elaborated on the relevant models and core technologies in detail. Section 4 focuses on a detailed description of the group authentication scheme. To comprehensively verify the effectiveness and practicality, we conducted security and performance evaluations in Sections 5, 6, respectively. In Section 7, we summarized the entire paper.
2 Related work
The authentication scheme is the first line of defense to ensure the security of user data and privacy in IIoT. Numerous scholars have conducted extensive research on authentication schemes.
Ingemarsson et al. [17] designed a circular interaction model that supports key negotiation and extended the number of negotiators to multiple parties. But this protocol can only resist passive attack. In order to meet the dynamic changes of group users, Kim et al. [18] introduced a binary tree-based group key negotiation protocol and provided an inspiring security proof. Subsequently, Barua et al. [19] designed a group key agreement protocol based on a ternary tree. But it still cannot verify the identity information of participating members. Burmester et al. [20] developed a group protocol that can achieve information sharing between groups with only two rounds of communication, and can also resist impersonation attack initiated by external nodes. Its disadvantage was that it cannot resist malicious attacks launched from within. Therefore, Bression et al. [21] presented a password-authenticated group protocol. Although this protocol can verify the user’s identity, communication rounds would increase linearly as the number of participating communication members increases. Zhang et al. [22] introduced a novel group protocol, in which users cannot deny the information sent, but overhead was high. Shen et al. [23] constructed a group protocol. This scheme introduced a combination structure into group key negotiation, which to some extent reduces communication overhead. However, due to the high number of communication rounds, the communication efficiency was relatively low. Shen et al. [24] proposed an identity based key agreement protocol, which introduced a mathematical structure of block design to achieve group key agreement supporting entity authentication. But the protocol lacked a certain degree of flexibility. Shen et al. [25] designed a group protocol based on block design by optimizing the data structure of the block design. However, due to the introduction of Weil pairing operation in the protocol, the computation overhead was too high. Zhang et al. [26] designed a vehicle authentication and key negotiation scheme. In addition, to address the issue of short-term key leakage, this solution can ensure the security of session keys without leaking long-term keys. However, its communication overhead was relatively high. Braeken et al. [27] introduced a public key group protocol that can significantly reduce the computational overhead caused by pairing operations. Due to the use of broadcast communication in this protocol, it would also increase communication overhead. Chen et al. [28] presented a group authentication protocol. However, this protocol was susceptible to man in the middle attack. Cao et al. [29] presented a group authentication protocol based on [28]. This protocol utilized aggregate signatures to aggregate a set of signatures into one signature, improving the computational efficiency in authentication and key negotiation processes. However, Lai et al. [30] pointed out that this method had too much overhead and designed a group authentication protocol to reduce computational costs. Li et al. [31] designed a protocol. This protocol enabled dynamic updates of group members and reduced communication overhead during group authentication and key negotiation processes. Cui et al. [32] presented a scalable authentication scheme based on ECC and hash functions. However, their scheme cannot resist temporary secret leak attack. Vinoth et al. [33] presented a group protocol in IIoT. This protocol was based on the Chinese remainder theorem and symmetric encryption technology to negotiate group key. However, this protocol cannot resist synchronous attack. Ming et al. [34] presented a one-to-many authentication protocol for industrial Internet based on ECC and Chinese remainder theorem. However, it could not resist synchronous attack. Li et al. [35] presented a scheme that supported dynamic updates of group members, which can reduce the communication overhead of signature transmission during the authentication process. Wang et al. [36] proposed two protocols. In the two proposed protocols, the generation of group session keys can ensure the security of communication between devices, but neither protocol can resist man in the middle attack. Wang et al. [37] proposed a key negotiation protocol with one round of communication. In this protocol, once the user responsible for generating system parameters was compromised, the privacy information would be tracked. Li et al. [38] proposed a lightweight anonymous authentication protocol to protect the privacy of IIoT and achieve secure IIoT communication. The protocol had been validated, demonstrating its comprehensive ability to overcome various vulnerabilities and prevent malicious attacks. Table 1 shows a summary of the schemes.
In summary, it can be found that various authentication and key negotiation schemes have their own concerns. In most schemes, on the one hand, the authentication and key negotiation processes are not lightweight enough to meet the needs of resource constrained devices. On the other hand, it cannot meet sufficient security requirements in IIoT, such as internal attacks, key leak, man in the middle attacks, etc. In order to better address these issues and adapt to the need for lighter authentication schemes, this paper is dedicated to researching lightweight authentication scheme suitable for IIoT.
3 Preliminaries
3.1 Network model
In Figure 1, the network architecture built in this paper includes three protocol participating entities: User, Gateway (GW) and Industrial Sensor Equipment (ISE) [31–37]. In industrial application scenarios, ISE serves as data acquisition terminals, responsible for real-time monitoring of industrial environmental parameters and providing users with accurate working condition information services. These equipments have heterogeneous characteristics and may include various types of sensor nodes such as temperature, pressure, vibration, etc. Due to their inherent hardware limitations, these devices typically have limited computing power and storage space, and are susceptible to physical attacks when deployed in open environments. Therefore, they are defined as semi trusted entities in the security model. As the core control node in network architecture, GW plays an important role in cluster management. It is not only responsible for coordinating the registration and authentication process between users and equipments, but also participates in the key negotiation process. It is a key entity to ensure the secure operation of the system. As the main operator of IIoT, users need to complete identity registration and securely store authentication credentials in smart cards and gateways. After completing registration and authentication, authorized users can communicate securely with the sensor device cluster through GW. The authentication mechanism of the network model mainly includes the following steps. Firstly, the user’s identity is verified during the login phase, followed by initiating authentication and key negotiation requests. GW acts as a relay node to broadcast the requests to the ISE cluster. After receiving the request, a session key will be generated through a secure protocol. Ultimately, encrypted communication is achieved between users and ISE cluster through negotiated temporary session keys.
3.2 Threat model
This article uses the Dolev Yao threat model [39] to formally verify the security of the designed authentication scheme. Communication participants exchange data on a fully open and unprotected transmission channel. The characteristics of this model are as follows:
(1) Hash functions satisfy one-way property and collision resistance, ensuring their computational security.
(2) Potential attackers have the ability to fully control communication channels and can carry out malicious operations including eavesdropping, interception, replay, and tampering.
3.3 Chebyshev chaotic mapping
The definition of the Chebyshev polynomial is as follows [40]: for variables n and x, where
Chebyshev polynomials have semigroup properties, which means that for any
Zhang et al. proved that in Chebyshev polynomial, extending the range of variable
The definition of the extended Chebyshev polynomial is as follows: for variables n and x, where
Definition 1. Chebyshev Discrete Logarithm Problem (CDLP): If the value of
Definition 2. Chebyshev Diffie Hellman Problem (CDHP): If the values of
3.4 Chinese remainder theorem
Assuming there are k coprime positive integers
The specific steps for solving the Chinese remainder theorem are as follows:
The product of modulus
For each
For each i,
The solution
X is the unique solution of the congruence equation system.
3.5 Secret sharing technique
Secret sharing technology employs algorithms to divide a secret value, denoted as s, into n distinct secret shares and distributes these shares among n users [42]. Each user possesses one unique secret share. To recover the original secret value s, a minimum of t or more users must provide their respective secret shares, enabling the reconstruction of the secret value s. That is, n users will all receive the reconstructed secret value s, thus achieving the goal of sharing the secret value s.
4 Proposed scheme
4.1 Initialization stage
Gateway (GW) selects a prime number p, a random number x and a secret value s, and calculates the public key
4.2 Registration
User
Industrial Sensor Equipment (ISE) is registered with GW. GW assigns unique identity information
4.3 Login and mutual authentication
(1)
(2) After receiving the sent message, GW first verifies whether
(3) When each
(4) After receiving n
(5) When
(6) When
5 Security analysis
5.1 Heuristic analysis
According to the security requirements of the plan, we will conduct the following security analysis.
(1) Anonymity: In this article, the user’s identity
(2) Message authentication and integrity: In this scheme, communication entities verify each other’s legitimacy by validating messages, thus providing message authentication. Since messages are generated through secret values, no adversary can generate valid messages, ensuring authentication between communicating entities and message integrity.
(3) Mutual authentication: In this article, gateway verifies the identity of the user by checking whether
(4) Resist replay attack: In the scheme, each message is accompanied by a timestamp. By checking the validity of the timestamp, the entities can determine whether the message is replayed. If the timestamp of the received message differs too much from the current time, that is, the timestamp exceeds a predetermined time window and the entity can reject the message. This mechanism ensures the timeliness of messages and prevents adversaries from deceiving by replaying previously legitimate messages.
(5) Resistance to modification attack: The message used to verify entity integrity is calculated based on the secret value. It is dynamically updated, which means that the entity generates new secret values during each communication process. When an entity receives a message, it can use the corresponding secret value to calculate the verification value of the message and compare it with the authentication value in the message. If there is a mismatch, the entity can determine that the message has been modified and reject the message. Therefore, this scheme can resist modification attack.
(6) Resistance to man in the middle attack: Through the analysis of message verification and modification attacks, it can be found that when the attacker modifies a message, the entity will be unable to pass the verification of the message. The entity will detect that the integrity of the message has been compromised and immediately realize that the transmitted content has been tampered with. This mechanism makes the attack more difficult, as attackers cannot intercept and modify messages in the communication link without being detected by entities.
(7) To resist impersonation attack: In order to disguise request messages sent by legitimate users, adversaries need to send the correct {
(8) Smart card loss attack: When a user loses their smart card or is stolen, the adversary can use power analysis to obtain user information stored on the smart card, including {
(9) Session key security: The final key SK =
(10) Forward security: In each session, new timestamps and secret values are used to calculate SK =
5.2 Scyther analysis
Scyther is a formal verification tool widely used for verifying security protocols [43]. It effectively analyzes and verifies these protocols, detecting potential attacks and vulnerabilities, and provide clear termination results for protocols with infinite sessions and infinite state sets by characterizing the protocol and generating limited representations of all possible protocol behaviors. And according to the opponent’s ability, it is convenient to choose a security model, including the standard Dolev Yao model, as well as other models, supporting parallel analysis of the protocol. The Scyther tool requires the use of Security Policy Definition Language (SPDL) to model the protocol and propose security statements to analyze security functionality.
In this article, we employ Scyther to conduct security simulation analysis on our proposed scheme. Using SPDL, we delineate the protocol model. For analytical simplicity, we focus on three primary roles: U, GW, and ISE. We adopt the Dolev-Yao model to verify the security, assuming attackers have full network control and can execute various attacks. Subsequently, we model our scheme in SPDL and specify its security properties through Scyther declarations. Figure 3 demonstrates that our scheme successfully recognizes all Scyther declarations and remains attack-free under Scyther’s scrutiny.
6 Performance analysis
6.1 Computation overhead
In this section, we mainly analyzed the performance of our proposed scheme from the perspective of computation overhead. We mainly compare the scheme with [26, 32, 43, 44]. According to the experimental results, a laptop equipped with Intel(R)Core(TM) i5-8250U CPU @ 1.60 GHz, 8.0 GB memory and Windows 10 operating system was selected for the experiment [46]. In terms of computation cost, we only consider the scalar multiplication of elliptic curve cryptography (
6.2 Communication overhead
Here, we will compare the communication overhead. Assuming the output sizes of elliptic curve algorithm, Chebyshev chaotic mapping, identity information, hash function, random number, symmetric encryption/decryption, and timestamp are 40 bytes, 40 bytes, 20 bytes, 20 bytes, 20 bytes, 16 bytes, and 4 bytes, respectively. In our scheme, during the U authentication phase, the communication overhead is {
7 Conclusion
In this article, we propose a secure and efficient group authentication scheme based on the Chinese Remainder Theorem, aiming at the challenge of group key agreement in IIoT. This scheme achieves the legitimacy verification of user identity and constructs a secure session key using Chebyshev chaotic mapping, symmetric encryption, secret sharing technology and China Remainder Theorem to achieve encrypted transmission and integrity verification of data. The experimental results show that this scheme performs well in both security and computational efficiency, especially in large-scale group communication scenarios, which can significantly reduce communication latency and overhead. Therefore, the group authentication scheme provides an effective solution for the security protection of IIoT, which has important theoretical significance. In the future, we will continue to study the performance of this scheme in more application scenarios, and continue to optimize and improve its performance to better serve the security protection of IIoT.
Data availability statement
The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.
Author contributions
TW: Investigation, Resources, Software, Validation, Writing – original draft. BS: Data curation, Resources, Software, Validation, Writing – review and editing. JX: Conceptualization, Methodology, Project administration, Supervision, Visualization, Writing – original draft.
Funding
The author(s) declare that no financial support was received for the research and/or publication of this article.
Conflict of interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Generative AI statement
The author(s) declare that no Generative AI was used in the creation of this manuscript.
Publisher’s note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
References
1. Sisinni E, Saifullah A, Han S, Jennehag U, Gidlund M. Industrial internet of things: challenges, opportunities, and directions. IEEE Trans Ind Inform (2018) 14(11):4724–34. doi:10.1109/tii.2018.2852491
2. Hu Y, Jia Q, Yao Y, Lee Y, Lee M, Wang C Industrial internet of things intelligence empowering smart manufacturing: a literature review. IEEE Internet Things J (2024) 11:19143–67. doi:10.1109/jiot.2024.3367692
3. Naouri A, Nouri NA, Khelloufi A, Sada AB, Ning H, Dhelim S. Efficient fog node placement using nature-inspired metaheuristic for IoT applications. Cluster Comput (2024) 27(6):8225–41. doi:10.1007/s10586-024-04409-3
4. Miao J, Wang Z, Wang M, Garg S, Hossain MS, Rodrigues JJ. Secure and efficient communication approaches for industry 5.0 in edge computing. Computer Networks (2024) 242:110244. doi:10.1016/j.comnet.2024.110244
5. Sasikumar A, Ravi L, Devarajan M, Selvalakshmi A, Almaktoom AT, Almazyad AS Blockchain-assisted hierarchical attribute-based encryption scheme for secure information sharing in industrial internet of things. IEEE Access (2024) 12:12586–601. doi:10.1109/access.2024.3354846
6. Zou S, Cao Q, Lu R, Wang C, Xu G, Ma H A robust and effective 3-factor authentication protocol for smart factory in IIoT. Computer Commun (2024) 220:81–93. doi:10.1016/j.comcom.2024.04.011
7. Guo Y, Guo Y, Xiong P, Yang F, Zhang C. A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things. Pervasive Mobile Comput (2024) 98:101877. doi:10.1016/j.pmcj.2024.101877
8. Xiao N, Wang Z, Sun X, Miao J. A novel blockchain-based digital forensics framework for preserving evidence and enabling investigation in industrial Internet of Things. Alexandria Eng J (2024) 86:631–43. doi:10.1016/j.aej.2023.12.021
9. Zhang Q, Wu J, Zhong H, He D, Cui J. Efficient anonymous authentication based on physically unclonable function in industrial internet of things. IEEE Trans Inf Forensics Security (2023) 18(18):233–47. doi:10.1109/tifs.2022.3218432
10. Wei H, Miao J, Lv J, Chen C -M, Kumari S, Amoon M. Secure and trustworthy data management mechanism for dance-consumer electronics in AIoT. IEEE Trans Consumer Electronics (2024) 1. doi:10.1109/tce.2024.3471573
11. Khelloufi A, Ning H, Naouri A, Sada AB, Qammar A, Khalil A A multimodal latent-features-based service recommendation system for the social internet of things. IEEE Trans Comput Social Syst (2024) 11(4):5388–403. doi:10.1109/tcss.2024.3360518
12. Cui J, Yu J, Zhong H, Wei L, Liu L. Chaotic map-based authentication scheme using physical unclonable function for internet of autonomous vehicle. IEEE Trans Intell Transportation Syst (2022) 24(3):3167–81. doi:10.1109/tits.2022.3227949
13. Xu Z, Liang W, Li K -C, Xu J, Zomaya AY, Zhang J. A time-sensitive token-based anonymous authentication and dynamic group key agreement scheme for industry 5.0. IEEE Trans Ind Inform (2022) 18(10):7118–27. doi:10.1109/tii.2021.3129631
14. Zhang S, Lee J-H. A group signature and authentication scheme for blockchain-based mobile-edge computing. IEEE Internet Things J (2020) 7(5):4557–65. doi:10.1109/jiot.2019.2960027
15. Wei D, Shi F, Dhelim S. A self-supervised learning model for unknown internet traffic identification based on surge period. Future Internet (2022) 14(10):289. doi:10.3390/fi14100289
16. Islam SKH, Obaidat MS, Vijayakumar P, Abdulhay E, Li F, Reddy MKC. A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. Future Generation Computer Syst (2018) 84:216–27. doi:10.1016/j.future.2017.07.002
17. Ingemarsson I, Tang D, Wong C. A conference key distribution system. IEEE Trans Inf Theor (1982) 28(5):714–20. doi:10.1109/tit.1982.1056542
18. Kim Y, Perrig A, Tsudik G. Tree-based group key agreement. ACM Trans Inf Syst Security (Tissec) (2004) 7(1):60–96. doi:10.1145/984334.984337
19. Barua R, Dutta R, Sarkar P. Extending Joux’s protocol to multi party key agreement. In: Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on Cryptology in India; December 8-10, 2003; New Delhi, India. Springer Berlin Heidelberg (2003). p. 205–17.
20. Burmester M, Desmedt Y. A secure and efficient conference key distribution system. In: Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application of Cryptographic Techniques; May 9–12, 1994; Perugia, Italy. Springer Berlin Heidelberg (1995). p. 275–86.
21. Bresson E, Chevassut O, Pointcheval D. Group Diffie-Hellman key exchange secure against dictionary attacks. In: International Conference on the Theory and Application of Cryptology and Information Security; Berlin, Heidelberg. Springer Berlin Heidelberg (2002). p. 497–514.
22. Zhang R, Zhang L, Choo KKR, Chen T. Dynamic authenticated asymmetric group key agreement with sender non-repudiation and privacy for group-oriented applications. IEEE Trans Dependable Secure Comput (2021) 20(1):492–505. doi:10.1109/tdsc.2021.3138445
23. Shen J, Zhou T, Liu X, Chang YC. A novel Latin-square-based secret sharing for M2M communications. IEEE Trans Ind Inform (2018) 14(8):3659–68. doi:10.1109/tii.2018.2810840
24. Shen J, Moh S, Chung I. Identity-based key agreement protocol employing a symmetric balanced incomplete block design. J Commun networks (2012) 14(6):682–91. doi:10.1109/jcn.2012.00034
25. Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y. Block design-based key agreement for group data sharing in cloud computing. IEEE Trans dependable secure Comput (2017) 16(6):996–1010. doi:10.1109/tdsc.2017.2725953
26. Zhang J, Zhong H, Cui J, Xu Y, Liu L. SMAKA: secure many-to-many authentication and key agreement scheme for vehicular networks. IEEE Trans Inf Forensics Security (2020) 16:1810–24. doi:10.1109/tifs.2020.3044855
27. Braeken A. Pairing free asymmetric group key agreement protocol. Computer Commun (2022) 181:267–73. doi:10.1016/j.comcom.2021.10.011
28. Chen YW, Wang JT, Chi KH, Tseng CC. Group-based authentication and key agreement. Wireless Personal Commun (2012) 62(4):965–79. doi:10.1007/s11277-010-0104-7
29. Cao J, Ma M, Li H. A group-based authentication and key agreement for mtc in lte networks. In: 2012 IEEE Global Communications Conference (GLOBECOM). IEEE (2012). p. 1017–22.
30. Lai C, Li H, Lu R, Shen XS. Se-aka: a secure and efficient group authentication and key agreement protocol for lte networks. Computer Networks (2013) 57(17):3492–510. doi:10.1016/j.comnet.2013.08.003
31. Li J, Wen M, Zhang T. Group-based authentication and key agreement with dynamic policy updating for mtc in lte-a networks. IEEE Internet Things J (2015) 3(3):408–17. doi:10.1109/jiot.2015.2495321
32. Cui J, Zhang X, Zhong H, Liu L. Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment. IEEE Trans Inf Forensics Security (2019) 15:1654–67. doi:10.1109/tifs.2019.2946933
33. Vinoth R, Deborah LJ, Vijayakumar P, Kumar N. Secure multifactor authenticated key agree ment scheme for industrial iot. IEEE Internet Things J (2020) 8(5):3801–11. doi:10.1109/jiot.2020.3024703
34. Ming Y, Yang P, Mahdikhani H, Lu R. A secure one-to-many authentication and key agreement scheme for industrial iot. IEEE Syst J (2022) 17:2225–36. doi:10.1109/jsyst.2022.3209868
35. Li J, Wen M, Zhang T. Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE Internet Things J (2015) 3(3):408–17. doi:10.1109/jiot.2015.2495321
36. Wang M, Yan Z. Privacy-Preserving authentication and key agreement protocols for D2D group communications. IEEE Trans Ind Inform (2018) 14(8):3637–47. doi:10.1109/tii.2017.2778090
37. Wang L, Tian Y, Zhang D, Lu Y. Constant-round authenticated and dynamic group key agreement protocol for D2D group communications. Inf Sci (2019) 503:61–71. doi:10.1016/j.ins.2019.06.067
38. Li N, Ma M, Wang H. ASAP-IIOT: an anonymous secure authentication protocol for industrial internet of things. Sensors (2024) 24(4):1243. doi:10.3390/s24041243
39. Miao J, Wang Z, Wu Z, Ning X, Tiwari P. A blockchain-enabled privacy-preserving authentication management protocol for Internet of Medical Things. Expert Syst Appl (2024) 237:121329. doi:10.1016/j.eswa.2023.121329
40. Long Y, Peng C, Tan W, Chen Y. Blockchain-based anonymous authentication and key management for internet of things with Chebyshev chaotic maps. IEEE Trans Ind Inform (2024) 20:7883–93. doi:10.1109/tii.2024.3366975
41. Zhang J, Cui J, Zhong H, Chen Z, Liu L. PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. IEEE Trans Dependable Secure Comput (2019) 18(2):722–35. doi:10.1109/tdsc.2019.2904274
42. Shree S, Zhou C, Barati M. Data protection in internet of medical things using blockchain and secret sharing method. The J Supercomputing (2024) 80(4):5108–35. doi:10.1007/s11227-023-05657-7
43. Belfaik Y, Lotfi Y, Sadqi Y, Safi S . A comparative study of protocols’ security verification tools: avispa, scyther, ProVerif, and tamarin. In: International Conference on Digital Technologies and Applications. Cham: Springer Nature Switzerland (2024). p. 118–28.
44. Yadav KA, Vijayakumar P. LPPSA: an efficient Lightweight Privacy-Preserving Signature-based Authentication protocol for a vehicular ad hoc network. Ann telecommunications (2022) 77:473–89. doi:10.1007/s12243-021-00897-1
45. Miao J, Wang Z, Xue X, Wang M, Lv J, Li M. Lightweight and secure D2D group communication for wireless IoT. Front Phys (2023) 11:1210777. doi:10.3389/fphy.2023.1210777
Keywords: industrial internet of things, authentication, security, group, session key
Citation: Wan T, Shi B and Xiao J (2025) An efficient and privacy protection group authentication scheme in the industrial internet of things. Front. Phys. 13:1582969. doi: 10.3389/fphy.2025.1582969
Received: 25 February 2025; Accepted: 15 April 2025;
Published: 28 April 2025.
Edited by:
Peiying Zhang, China University of Petroleum (East China), ChinaReviewed by:
Chaker Abdelaziz Kerrache, University of Ghardaia, AlgeriaSouleyman Chaib, Ecole Supérieure d'Informatique de Sidi Bel Abbès, Algeria
Nyothiri Aung, University College Dublin, Ireland
Copyright © 2025 Wan, Shi and Xiao. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Jiongen Xiao, MjAxOTEwNjhAZ2R1ZmUuZWR1LmNu