ORIGINAL RESEARCH article
Front. Phys.
Sec. Social Physics
Volume 13 - 2025 | doi: 10.3389/fphy.2025.1582969
An efficient and privacy protection group authentication scheme in the Industrial Internet of Things
Provisionally accepted- 1South China University of Technology, Guangzhou, Guangdong Province, China
- 2Guangdong University of Finance and Economics, Guangzhou, China
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
Industrial Internet of Things (IIoT) integrates the latest information and communication technology with the industrial economy, driving the intelligent transformation of the industry. However, with the rapid development of IIoT, its security challenges are increasingly severe. Therefore, this paper focuses on the security protection of industrial Internet, especially the application and challenges of group schemes. By analyzing the security requirements of IIoT, this paper proposes a secure and effective group authentication scheme for IIoT. Based on the Chinese remainder theorem, this scheme supports authorizing users to remotely access a set of industrial sensor devices and uses a three factor authentication method to verify the legitimacy of user identity. At the same time, through Chebyshev chaotic mapping, symmetric encryption, secret sharing technique and the Chinese remainder theorem, this scheme constructs a secure group session key to ensure encrypted transmission and integrity verification of data. The experimental results show that this scheme performs well in both security and computational efficiency, especially in large-scale group communication scenarios, which can significantly reduce communication latency and overhead.
Keywords: Industrial internet of things, authentication, security, group, Session key
Received: 25 Feb 2025; Accepted: 15 Apr 2025.
Copyright: © 2025 Wan, Xiao and Shi. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence: Jiongen Xiao, Guangdong University of Finance and Economics, Guangzhou, China
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.