首页|工业物联网系统基于混沌映射三因素认证与密钥协商协议

工业物联网系统基于混沌映射三因素认证与密钥协商协议

扫码查看
工业物联网系统通过各类终端传感器设备,将采集的关键工业数据实时传输到工业物联网平台,提供数据智能分析与决策.然而,对工业数据的非法访问将导致数据或敏感身份标识泄露、数据篡改等信息安全问题,影响工业物联网系统的正常运行.基于此,文章面向工业物联网系统,搭建多用户、多网关、多工业物联网平台下的分布式数据匿名传输架构,提出基于混沌映射的三因素认证与密钥协商协议.协议实现了用户到移动终端设备的智能卡、口令、生物特征信息的三因素登录认证.在网关协助下,用户利用移动终端设备,基于混沌映射技术与关键凭证,实现了用户到工业物联网平台的双向匿名认证,并协商了用于后续保密通信的会话密钥.文章对协议进行了应用拓展,包括用户口令与生物特征信息的更新、智能卡撤销的功能,基于中国剩余定理实现了对多网关的密钥同步更新.安全性分析与性能评估表明,该设计协议能够安全高效地部署在工业物联网系统.
Three-Factor Authentication and Key Agreement Protocol Based on Chaotic Map for Industrial Internet of Things Systems
Through various terminal sensor devices,Industrial Internet of Things(IIoT)system transmits the collected key industrial data to the industrial Internet of things platform in real time,to provide data intelligent analysis and decision-making.However,illegal access to industrial data will lead to information security issues,such as data or sensitive identity leakage,data tampering,which will affect the normal operation of IIoT system.To this end,for IIoT system,this paper built a distributed data anonymous transmission architecture under multi-user,multi-gateway and multi-industrial Internet of Things platform,and proposed a three-factor anonymous authentication and key agreement protocol based on chaotic map.The protocol realized the three-factor login authentication of smart card,password,and biometric information from the user to the mobile terminal device.Under the assistance of the gateway,the user utilized the mobile terminal device to realize two-way anonymous authentication from the user to the IIoT platform based on chaotic map technology and key credentials,and simultaneous achieved the session key agreement for subsequent secure communication.The application of the protocol was extended,including the update of each user's password and biometric information,the revocation function of smart card,and the synchronous update of multi-gateway key based on Chinese remainder theorem.Security analysis and performance evaluation demonstrate that the proposed protocol can be securely and efficiently deployed in IIoT system.

Industrial Internet of Thingsthree factor authenticationkey agreementchaotic map

张晓均、张楠、郝云溥、王周阳、薛婧婷

展开 >

西南石油大学计算机与软件学院,成都 610500

西南石油大学四川省油气勘探开发智能化工程研究中心,成都 610500

工业物联网 三因素认证 密钥协商 混沌映射

国家自然科学基金四川省自然科学基金中国博士后科学基金油气勘探开发软件国家工程研究中心开放课题

619023272023NSFSC13982020M681316DFWT-ZYRJ-2024-JS-81

2024

信息网络安全
公安部第三研究所 中国计算机学会计算机安全专业委员会

信息网络安全

CSTPCDCHSSCD北大核心
影响因子:0.814
ISSN:1671-1122
年,卷(期):2024.24(7)
  • 1