You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

10 September 2020

MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things

,
,
and
1
School of Electronics and Electrical Engineering, Lovely Professional University, Punjab 144411, India
2
Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Gothenburg, Sweden
3
Department of Computer Science, Swansea University, Swansea, Wales SA1 8EN, UK
*
Authors to whom correspondence should be addressed.
This article belongs to the Special Issue Securing the Industrial Internet of Things

Abstract

Continuous development of the Industrial Internet of Things (IIoT) has opened up enormous opportunities for the engineers to enhance the efficiency of the machines. Despite the development, many industry administrators still fear to use Internet for operating their machines due to untrusted nature of the communication channel. The utilization of internet for managing industrial operations can be widespread adopted if the authentication of the entities are performed and trust is ensured. The traditional schemes with their inherent security issues and other complexities, cannot be directly deployed to resource constrained network devices. Therefore, we have proposed a strong mutual authentication and secret key exchange protocol to address the vulnerabilities of the existing schemes. We have used various cryptography operations such as hashing, ciphering, and so forth, for providing secure mutual authentication and secret key exchange between different entities to restrict unauthorized access. Performance and security analysis clearly demonstrates that the proposed work is energy efficient (computation and communication inexpensive) and more robust against the attacks in comparison to the traditional schemes.

1. Introduction

The Industrial Internet of Things (IIoT) alias Industry 4.0 is the new era of the industrial revolution which uses the sensor and actuators for the enhancement of the production and manufacturing industrial process. IIoT is the 4th generation of the industrial development. The first generation ( 1.0 ) industries of 18th century made use of steam power to generate resources for their industry. The next revolution took place is industry 2.0 in the year 1870 where industries ran through electricity and assembly lines. Second revolution brought attention of engineers towards industrial development. The 3rd progress (3.0) in industrial development escalated the efficiency to a par level. It introduced the concept of computer and Programmable Logic Control ( P L C ) which was believed to be the first step towards automation of industries. The recent advancement of industry 4.0 uses additional infrastructure to connect industrial processes with the internet; thus permitting the engineers to control the machines remotely as well as allowing them to get instant access of the information through cloud storage [1]. The whole era of industrial transformation along with the various significant applications of IIoT is depicted in Figure 1.
Figure 1. Industrial transformation and various applications of Industrial Internet of Things (IIoT).
IIoT is converging many traditional practices into intelligent and smart processes, few of the applications are illustrated in Figure 1 like supply chain optimization in warehouses, automotive manufacturing in industries, remote power generation monitoring and control in smart grids, recycling and sorting of waste products, and so forth. Another reason of motivation to industry owners for revamping their industries is the advancement in the field of micro electronics and ICT (Information & Communication Technology). The fundamental aim behind the evolution of IIoT is Machine to Machine (M2M) communication without human intervention [2]. M2M communication makes use of various equipment’s such as radio frequency identification (RFID), sensors, mobile devices, and wireless sensor networks (WSN) to achieve automation and seamless connectivity with other devices [3,4]. In addition, Internet of Things (IoT) enabled the industrial machines to upload the data on clouds for quick analyzing and decision making; thus eliminating the need of physical entries and analysis [5].
Industries with large manufacturing units are widespread adopting IIoT and have started making their machines IoT enabled. Some of the recent examples of its adoption are shown in Figure 2. Tech Mahindra (TM) is using IoT for monitoring and controlling painting and logistics section (transferring vehicle from production to manufacturing house). The use of IoT in TM enabled the workers to view the status of the assets anytime and anywhere. In addition, IoT strengthened the equipment and process diagnostic capabilities to reduce the time requirement from production to manufacturing [6]. Another application is implemented in Rio Tinto: Mine of the Future, the British and Australian mining industry [7]. They have launched an innovative automated mining machine in Pilbara, a remote region of Western Australia with the deep reserves of iron ore. The Driver less trucks and trains haul ore away from the mining sites while an autonomous drill technology enables a remote worker to oversee status of multiple drills from a single console. The company has a control center complex in Perth that connects to its mines as well as its rail and port operations, where the programmers, engineers, technicians, and analysts are remotely monitoring and guiding mining operations [7]. IIoT is a boon to industry owners as they can remotely visualize the performance of the staff, machines along with the status of the ongoing projects [8,9].
Figure 2. Few use cases of IIoT.
Modern ambush on cyber physical networks and systems upraise a solid security anxiety as such attacks can cause loss to customers, service providers, developers, and manufacturers [10,11]. The unknown vulnerabilities in the system like bugs, and broken processes, and so forth pave way to cyber attacks. Cyber attacks may result in loss of data privacy and integrity, illegal access to privileged zone, financial loss, and business disruption, and so forth. Inadequate or inappropriate security measures in IIoT can even lead to collapse of the whole industrial system. The setback of the industry operators happened due to news of attacks on IIoT networks: a network was created for controlling lights, fan, fire detection, and heating, ventilation, and air conditioning (HVAC) at Sochi arena for Olympics. But during inspection in 2018, it is found that 17,823 building automation control network (BACnet) devices and 78,000 supervisory control and data acquisition (SCADA) devices were exposed to internet without security protections. During investigation, the prime reason found is vulnerability in mutual authentication and key exchange protocol, that led the attackers to exploit the network resources [12].
Forbes reported an incident where attackers used malicious programs and communicating devices to harness the industrial network illegally. Attackers took over the charge of excavators, scrapers, and cranes, and so forth from the legitimate managers of the firm [13]. Another incident is informed by the security analyst firm, Zimperium Inc., USA. According to their report, IoT enabled electric scooter manufactured by Xiaomi Inc., China was accepting control commands for example, locking, braking, and acceleration, and so forth from even illegitimate users [13].
As thoroughly discussed in Reference [14], many IoT networks do not even possess basic security elements. On average, these are the cyber-security analysis of today’s COTS IoT products: 25 vulnerabilities are detected per device, 60% have vulnerable firmware, 70% do not encrypt any communications at all, and 80% fail to request a password for authentication that has a secure length.
There are few ways to protect IIoT against intrusions and cyber-attacks. One of them is allowing intrusions to happen and then detecting them via Intrusion Detection Systems [15], as discussed in Reference [16]. Alternatively, robust mutual authentication and secure key exchange procedures can be used to protect IIoT against attacks [17,18]. This article aims at providing a remedy by proposing: A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things (MAKE-IT).
The motivation behind the proposed work is the limitations of the existing mutual authentication and key exchange protocols. The computation, message exchange, and communication cost of conventional protocols are large enough to drain the resources of the IoT constrained devices. These factors pave way for new mutual authentication and key exchange protocols that satisfy the requirements (robust and lightweight) of IoT networks.
MAKE-IT protocol protects the unauthorised access to industrial network through secure mutual authentication and key exchange process. Data confidentiality and integrity, to name a few, are ensured throughout the mutual authentication and key exchange process. MAKE-IT has significantly optimized the computation and communication processes in comparison to traditional protocols. Our network consideration covers industrial network settings in which private/off-the-grid network implementations are elected such as SCADA, Device Language Message Specification (DLMS)/Companion Specification for Energy Metering (COSEM), Modbus, and so forth. Here in our proposal, Authentication Server acts as a gateway in between the trusted industrial network site and un-trusted outside world. Therefore, users are treated as potential threats and authentication credentials are verified accordingly. Other than IIoT, our proposal might also be applicable to very specific subset of IoT, such as home automation systems where outside world connects the inside network via dedicated/trusted gateways. In this article, we have concentrated on private networks that are operating at industrial sites. This might be considered as a subset of IIoT in which the network is considered as secure, whereas end-users (operators, foremen, engineers, etc.) that are trying to read/write/execute commands at the industrial devices are considered to have potential threat to the industrial network due to various reasons: wireless communications, various attack landscape (Man-in-the-middle attack alias MITM attack, impersonation, etc.).
The remaining paper is structured as follows: Section 2 discusses the security protocols developed by peers. Section 3 presents the system and adversary model, and Section 4 describes the proposed scheme. Section 5 provides the formal and informal security analysis whereas Section 6 discusses the performance and comparative analysis. Section 7 draws the conclusions.

3. System and Adversary Model for Make-It Protocol

3.1. System Model

The system model describes the relationship between User, Gateway ( G W ), Authentication Server ( A S ), and IIoT nodes. Figure 3 illustrates their relationship with each other.
Figure 3. System model.

3.1.1. User

User could be industry manager, owner, administrator, and so forth who has privilege to control the machines, fetch the data from IIoT nodes, and so forth. User may access the network using any digital gadget like computer, laptop, and mobile, and so forth which has the capability to compute cryptography operations along with communication unit. User also requests the A S for generating the security credentials. Later, user utilizes the obtained credentials to generate the secured session key with the G W .

3.1.2. Gateway

Gateway ( G W ) provides the interface to user for getting connected to the IIoT network. The gateways are not necessarily powered up through mains, rather depends upon the use case of IIoT. The present system model is constructed considering those applications of IIoT where G W is also a resource constrained node, for example, an industrial network deployed near volcano for monitoring eruptions, and extracting volcanic minerals, and so forth. G W receives partial security credentials of user from A S which is later utilized by G W to verify the legitimacy of the request. As communication to all the nodes of IIoT network is possible via G W , any vulnerability in G W could compromise the whole network.

3.1.3. Authentication Server (AS)

A S is a trusted entity whose prime responsibility is to validate the users and other devices of the network. It is assumed that user IDs are stored offline in the A S . The users request for the security credentials from A S . Upon being validated, A S provides a random secret integer to the user which is further utilized by the user to generate secret key with the gateway. A S is considered to be tamper proof entity and has no resource constraints.

3.1.4. IIoT Nodes

Industrial machines are integrated with sensors (motion, proximity, vaccum, and pressure, etc.) and low power transceiver module (e.g., bluetooth, Zigbee, WiFi, etc.) for providing instant access to control and monitor the infrastructure of the industry. Legitimate users (manager, engineer, etc.) communicates to IIoT nodes via gateway. Note that this protocol is implemented to secure the network from external threats. Therefore, security considerations and message exchanges between user and gateway are only considered.

3.2. Adversary Model

MAKE-IT protocol has adopted the Dolev-Yao (DY) adversary model for evaluating the security performance under compromised conditions [22]. The threat model assumes that the attacker is competent enough to discover the vulnerabilities of the protocol; these vulnerabilities can be used by the attacker for mounting various attacks. Consider an industrial IoT network deployed near the volcano for monitoring eruptions and extracting volcanic minerals. Following the DY threat model, the user and the gateway (a network device communicating to autonomous mining machines, assembly lines, and driverless tipper trucks, etc.) are under threat in IIoT. Assume an attacker can eavesdrop all the communications happening between the user and the gateway. More precisely, an attacker can capture and replay the message for getting unauthorized access for example, machines, information, and so forth. In addition, an attacker can impersonate as an authorized user to steal precious information of volcanic minerals or locations where precious minerals are being kept. The adversary can try to modify the timestamp of the messages to get illegal access to the system to introduce malware for either disrupting or degrading the operations of the industry. The attacker can intercept the messages exchanged between the user and the gateway to extract the security parameters that are useful to approximate the future secret keys. The adversary can construct and inject new bogus messages to overwhelm the resources of the network device (gateway); as a result, the privileged user fails to deliver the messages to the gateway. Conclusively, the operational workflow of the industry will suffer and may result in financial and reputation loss.

4. Proposed Protocol: MAKE-IT

Assume a Industrial IoT environment where industrial machines are controlled and monitored over internet via gateway. Remote user can control and monitor the IIoT nodes after proving the legitimacy to gateway. Therefore, any vulnerability in authentication procedure could allow external attacker to access the network resources. In order to ensure legitimacy and avoidance of unauthorized access, we propose a light weight remote user authentication model. Note that in order to run the proposed protocol, we have assumed that gateway is resource constrained device and believe that all communications to industrial nodes happen via gateway. It is further assumed that clocks of all participating entities are synchronized to each other. The proposed protocol consist of two stages: User device registration phase, and Mutual Authentication & Secret Key Generation Phase.

4.1. User Device Registration Phase

Table 1 presents the notations that are used to describe the working of the protocol. Note that some Greek symbols have been used to represent variables; besides storing values, the symbols do not have any mathematical perspectives.
Table 1. Notations and Descriptions.
In this phase, U s e r approaches Authentication Server ( A S ) to show his interest towards communication with Gateway. Users’ device initially prepares its identity details, β ( S U   | |   P U   | |   L U   | |   M U   | |   U I D ). In addition, u s e r adds a timestamp ( T 1 ) to message β , to prevent replay attacks. Finally u s e r encrypts the message ( β   | |   T 1 ) and sends it to A S for obtaining security credentials (random secret). Figure 4 illustrates the complete process of u s e r device registration with the A S .
Figure 4. User device registration phase in MAKE-IT Protocol.
A S receives the message ( ϵ ) from the user and decrypt it using private key, D ( P R A S , ϵ ). A S verifies the lifetime of the request by compiling the timestamp values ( T 2 T 1 ), fresh messages are processed and expired/replayed messages are discarded. Post timestamp verification, A S compares the received user identity, U I D with the offline stored user identity, U I D S for verifying the authenticity of the request; the session is aborted if comparison is not true. A S computes hash of decrypted message ( τ ) to preserve integrity. Further A S splits the hashed message ( O ) into two equal parts: O 1 and O 2 . O 1 is utilized for processing of security credential request, whereas, O 2 is later utilized as a temporary key for securing the communications between A S and u s e r . Afterwards, A S generates the random secret integer, R 1 and prepares the message ( Σ = O 1   | |   R 1   | |   T 2 ) for gateway. Eventually Σ is encrypted with the public key of gateway, E ( P U G , Σ ) to safeguard confidentiality. The encrypted message, E ( P U G , Σ ) is then sent to G W .
Gateway receives E ( P U G , Σ ) from A S , decrypts using private key, D ( P R G ) and forms λ . Before processing the message further, gateway verifies the timestamp of the message, T 3 T 2 . Upon successful validation, gateway computes W = hash ( S G   | |   P G   | |   L G   | |   M G   | |   G I D ). Gateway splits the hashed message ( W ) into two equal parts: W 1 and W 2 . W 1 is utilized for processing of request, whereas, W 2 is later utilized to securely exchange the random secret of G W with the u s e r . Further, gateway computes W 1 O 1 and concatenate timestamp T 3 to compose Ψ . Ψ is a useful component of protocol as it reflects a relationship between user and gateway. Additionally, Ψ is encrypted with the public key of A S , Θ = E ( P U A S , Ψ ) to attain data confidentiality. The encrypted message ( Θ ) is forwarded to A S for further processing.
A.S decrypts the message D ( P R A S , Θ ) using its private key. Upon successful decryption, freshness of the message is verified, T 4 T 3 followed by generation of random secret integer, R 2 . A S computes Ω = O 1 R 2 , assembles Ψ   | |   Ω   | |   T 4 , and encrypts the assembled message to form Y A S = E ( O 2 , ( Ψ   | |   Ω   | |   T 4 ) ) . The encrypted message Y A S is sent to the user. A S has utilized a secure mechanism to share the random secret with the u s e r . As no one else know O 1 , therefore only u s e r is able to retrieve R 2 .
User on the other hand, generates O by computing hash( β ). The generated value O is splitted equally into O 1 and O 2 . Using O 2 , u s e r decrypts the received message, Y U = D ( O 2 , ( Ψ   | |   Ω   | |   T 4 ) ) . Post successful decryption, the u s e r verifies the validity of the message, T 5 T 4 . Upon verifying the genuineness, user computes the random secret integer, R 2 = Ω O 1 .

4.2. Mutual Authentication and Secret Key Generation Phase

In this phase, User and G W mutually verifies the legitimacy of each other before finalizing the secret key. User initially retrieves W 1 (= Ψ O 1 ) and constructs Z U ( = E ( W 1 , ( Ω   | |   T 5 )). The random secret integer R 2 (enclosed in Ω ) is securely shared with the gateway through Z U .
Gateway decrypts the received message, Z G = D ( W 1 , Z U ) and verifies the timestamp, T 6 T 5 . Timestamp verification shunts out the bogus (expired) and suspicious (replayed) requests. Post verification, gateway prepares ρ 1 and ρ 2 for hiding the random secret integer R 1 , and parameter W 2 , respectively. Subsequently, G W computes the π G { = E ( W 1 , ( ρ 1   | |   ρ 2   | |   T 6 ) ) } , wherein ρ 1 carries hidden random secret integer ( R 1 ) , ρ 2 carries hidden parameter value ( W 2 ) which is required by the user to retrieve the R 1 from ρ 1 , and T 6 carries the present timestamp of the gateway. Thereafter, the encrypted message, π G is sent to the user. Figure 5 illustrates the whole process of mutual authentication and secret key generation phase.
Figure 5. Mutual Authentication and Secret Key Generation Phase in MAKE-IT Protocol.
The user decrypts the received message, π U = D ( W 1 , ( ρ 1   | |   ρ 2   | |   T 6 ) ) and verifies the time stamp, T 7 T 6 . The connection is either terminated if the timestamp is stale or continues otherwise. Subsequently, u s e r retrieves W 2 ( = ρ 2 W 1 ) . The retrieved W 2 is a key element required to recover the hidden random secret integer, R 1 ( = W 2 ρ 1 ) .
Successful decryption of π U and Z G results in mutual authentication between the u s e r and G W , respectively. Upon succeeding in mutual authentication, u s e r and G W initiates the process of secret key formation. The secret keys are generated using random secrets ( R 1 and R 2 ) issued by A S . User and G W have already exchanged the secret values required to form the secret key. Finally, user and the gateway computes the secret key, SK = R 1 R 2 . The lifetime of the key depends upon the sensitivity of the application and may vary from few days to couple of months.

5. Security Analysis

The robustness of the proposed MAKE-IT approach is tested through security analyzer tool and informal analysis. This section demonstrates the test procedure and also presents the analysis of the test results.

5.1. Formal Analysis

Following References [54,55], the performance of the proposed protocol has been tested under the compromised conditions using AVISPA (Automated Validation of Internet Security Protocols and Applications). AVISPA is a security analyzer tool used to find vulnerabilities in the security protocols. It works on HLPSL (High Level Protocol Specification Language) and use an interpreter, HLPSL2IF which translates HLPSL to an Intermediate Format (IF). IF is presented as an input to the various back ends of AVISPA (e.g., on-the-fly model-checker (OFMC), Constraint-Logic-based ATtack SEarcher (CL-AtSe), etc.). The back ends compile the results and declare the protocol as safe or unsafe. We intentionally omitted the detailed discussion on the back ends of AVISPA, interested readers may refer to Reference [56].
The initial process is to script the subjected protocol into HLPSL language. The script begins with basic roles, followed by composition role, and ends with environment role. Basic roles declare the agents, crypto operations, compromised channel (dolev-yao), and various processes that are carried out locally by the agent. In contrast, composition roles declare the various legitimate entities that participate in the conversation. A very careful scripting of environment role is required as it may decide the effectiveness of this test. Environment role declares the global entities and constants. In addition, environment role describes the role and knowledge of intruder followed by various sessions that may exists during the communication. This role ends with the declaration of goals that defines the security attributes taken into consideration.
To assess the strength of the MAKE-IT protocol, the mutual authentication and key exchange phase has been scripted and examined on AVISPA. Note that notations used in HLPSL script is defined in Table 2.
Table 2. Notations and Descriptions for the symbols used in High Level Protocol Specification Language (HLPSL) script, Automated Validation of Internet Security Protocols and Applications (AVISPA).
Initially basic roles of the user and G W are declared that comprises of local agents (U, G W ), crypto operations (hash), description of keys ( S K , P U G , etc.) and details of the compromised channel (dy) used for communication. Additionally, it describes the various local constants and messages used and exchanged during the conversation, respectively. User device gets activated in State = 0 (RCV(start)) whereas in State’:= 1 the user device generates a timestamp ( T 5 ), and computes W 1 . Afterwards, user computes Z u = { O m e g a . T 5 } _ W 1 and forms the message, M I (= Z u ). The goal predicates set by the user is the privacy of the data ( O m e g a and T 5 ) along with the validation of the timestamp ( T 5 ) at G w . The encrypted message ( M I ) is sent to the G W as shown in Figure 6.
Figure 6. AVISPA Role Specification of the User and Gateway for our proposed MAKE-IT Protocol.
G W receives the M I in State = 1 and begins processing in State := 2. The foremost task performed by G W is the decryption of the received message, Z g = { Z u } _ W 1 . Post decryption, gateway validates the timestamp (witness( G w ,U,user_gateway_t5, T 5 )) to avoid replay attacks. Upon successful validation, G W computes R h o 1 (= x o r ( W 2 , R 1 )) and R h o 2 (= x o r ( W 1 , W 2 )). Subsequently, G W generates a fresh timestamp ( T 6 ), and computes P i e g = { R h o 1 . R h o 2 . T 6 } _ W 1 and compiles a message M I I (= P i e g ). The goal predicates set by the G w is the privacy of the data ( R h o 1 and R h o 2 ) along with the validation of the timestamp ( T 6 ) at u s e r . Thereafter, G W send the message to the user for extracting the required information to generate secret keys. Consequently, u s e r decrypts the received message ( M I I ) , P i e u = { R h o 1 . R h o 2 . T 6 } _ W 1 . Post decryption, u s e r validates the timestamp (witness(U, G w ,gateway_user_t6, T 6 )). Successful decryption of P i e u and Z g results in mutual authentication. Finally, user and G W use the retrieved information to generate the secret keys, S K .
Session role demonstrates the various constants, variables used by the entities during the communication for example, User(U, G w , H a s h , P u g , P r g , S K , W 1 , S U , R U ), G W (U, G w , H a s h , P u g , P r g , S K , W 1 , S G w , R G w ). On the contrary, environment role is very prominent as it describes the constants and variables used globally by the agents. Furthermore, it describes the behaviour of the i n t r u d e r { u s e r , g a t e w a y , p u g , p r g i , s k i , w 1 i ,h}. Environment role also discusses the organizations of various sessions that may takes place between legitimate and illegitimate entities, for example, S e s s i o n 1 ( u s e r , g a t e w a y ,h, p u g , p r g , s k , w 1 ), S e s s i o n 2 ( u s e r ,i,h, p u g , p r g i , s k i , w 1 i ), S e s s i o n 3 (i, g a t e w a y ,h, p u g , p r g i , s k i , w 1 i ).
Finally, the environment role ends with declaration of goals of interest. The goals established to evaluate the robustness of proposed protocol is depicted in Figure 7 and listed here:
Figure 7. AVISPA Role Specification of the Session, Environment and Goal for MAKE-IT Protocol.
  • Secrecy_of sub1 represents that {Omega; T5} are kept secret between user and gateway.
  • Authentication_on gateway_user_t6 states that the timestamp (i.e., T 6 ) of the message { M I I } will be validated at the user.
  • Authentication_on user_gateway_t5 states that the timestamp (i.e., T 5 ) of the message M I will be validated at the G W .
  • Secrecy_of sub2 represents that {Rho1; Rho2} are kept secret between gateway and user.
MAKE-IT approach has been tested on two back ends of AVISPA that is, OFMC and CL-AtSe as illustrated in Figure 8. The Output file (OF) of OFMC and CL-AtSe backend clearly demonstrates that no vulnerability has been identified and the protocol is declared safe to use in Internet of Things applications. Conclusively, the protocol can withstand all the attacks mentioned in DY model while still maintaining the data privacy, authenticity and integrity of communications.
Figure 8. AVISPA results by using on-the-fly model-checker (OFMC) and Constraint-Logic-based ATtack SEarcher (CL-AtSe) backend for our proposed MAKE-IT Protocol.

5.2. Informal Analysis

The informal security analysis of MAKE-IT approach has been discussed in this sub-section.
Theorem 1.
Resistant to replay attacks.
Proof of Theorem 1.
Freshness in each session is guaranteed as the messages ( M N ) are composed of timestamps ( T N ). M 1 , M 2 , M 3 , M 4 , M I , and M I I , are all embedded with timestamps T 1 , T 2 , T 3 , T 4 , T 5 , and T 6 , respectively. Any misuse of expired message can be easily traced, for example, T 2 T 1 Δ T. Assume an attacker eavesdropped the message, M I ( Ω   | |   T 5 ) and replay later to G W for getting unauthorized access. The G W receives the replayed message and decrypts, D ( W 1 , ( Ω   | |   T 5 ) . Post decryption, G W verifies the timestamp and analyse that received message contains old and expired timestamp, T 6 T 5 > Δ T. The Δ T is usually kept very small to make it difficult for the adversary to replay the captured messages within Δ T. The G W instead of processing further discards the dishonest message. Additionally, the message M I is encrypted with the secret temporary session key W 1 , hence making it computationally infeasible for the adversary to modify the timestamp ( T 5 ) . Therefore, proposed protocol is resilient to replay attacks. □
Theorem 2.
Resilient to man in the middle (MITM) attack.
Proof of Theorem 2.
In MITM attack, adversary modifies the captured messages in such a way that destination cannot differentiate the modified message from the original message. Assume an attacker performs MITM attack between user and the gateway by capturing and modifying the message M I ( = E ( W 1 , ( Ω   | |   T 5 ) ) . These computations are hard for attacker due to non availability of temporary secret key ( W 1 ) required for deciphering the captured message D ( W 1 * , ( Ω   | |   T 5 ) ) followed by ciphering of modified message E ( W 1 * , ( Ω   | |   T 5 ) ) . Therefore, attacker fails to attempt MITM attack between the user and the gateway. Similarly, other messages M 1 , M 2 , M 3 , M 4 , and M I I are also encrypted and hence cannot be modified. Therefore, the proposed scheme is protected from MITM attacks. □
Theorem 3.
Secured against modification attack.
Proof of Theorem 3.
Integrity is preserved due to use of one way hash function (i.e., SHA), for example, the element O = hash ( τ ) guarantees prevention against modification attacks. Any form of alterations in O can be easily identified during reconstruction and comparison of hash at other entity for example, O 1 == O 1 . Apart from one way hash functions, the messages exchanged are encrypted to ensure that integrity of the communication is retained. Assume if attacker captures the message M I I { = E ( W 1 , ( ρ 1   | |   ρ 2   | |   T 6 ) ) } and tries to modify { = E ( W 1 ? , ( ρ 1   | |   ρ 2   | |   T 6 ) * ) } . However, it is computationally difficult for the attacker to make any changes as the information is encrypted with the temporary secret key, W 1 . Neither the k e y nor the security credentials (random secrets) are ever shared in plain text over the unsecured medium. Therefore, attacker does not find way to modify the content. Similarly, other messages M 1 , M 2 , M 3 , M 4 , and M I are ciphered to prevent modifications. Thus, proposed scheme is secured against modification attack. □
Theorem 4.
Secure secret key generation.
Proof of Theorem 4.
The proposed scheme ensures the secrecy during formation of secret key, S K . Secret key is formed using random secrets ( R 1 , R 2 ) generated by trusted and tamper proof entity, A S . User shares R 2 with gateway through message M I   ( =   Ω   | |   T 5 ) . Likewise, gateway shares R 1 with user through M I I   ( = ρ 1   | |   ρ 2   | |   T 6 ) . Both G W and user retrieve R 2 & R 1 from M I and M I I , respectively. Finally, user and gateway generate a shared secret key, SK = R 1 R 2 . As the keys are formed using random secrets which were never shared with anyone, therefore proposed protocol adheres to security measures while forming the secret key. The compliance to security measures ensures that secret key generated is not compromised and can be used for securing future communications. □
Theorem 5.
Proposed scheme exhibits data confidentiality.
Proof of Theorem 5.
Revealing of information to untrusted entities can pose serious threats to the existence of IIoT networks. Assume an attacker eavesdrop a message, M 3 ( = E ( P U A S , ψ ) ) . In spite of successful eavesdropping, the attacker would not be able to interpret the information due to the non availability of the private key of AS, D ( P R A S ? , ψ ) . The AS has never shared its private key ( P R A S ) with anyone, therefore, the attacker remains unsuccessful in obtaining the information from the captured message, M 3 . In another instance, lets assume that attacker has captured, M I I { = E ( W 1 , ( ρ 1   | |   ρ 2   | |   T 6 ) ) } . The attacker has intentions to retrieve W 2 and R 1 from the captured message, M I I . Despite the successful capturing of M I I , the attacker would not be able to recover W 2 and R 1 from ρ 1 and ρ 2 , respectively as the attacker needs a temporary secret key ( W 1 ) to decipher the information { = D ( W 1 ? , ( ρ 1   | |   ρ 2   | |   T 6 ) ) } ; the temporary secret key ( W 1 ) is shared amongst legitimate entities only. Similarly, the messages M 1 , M 2 , M 4 , and M I are also encrypted, therefore, confidentiality of the information is ensured at all levels of communication. The attacker does not have these keys, P R G , P R A S , O 2 , and W 1 , to recover the overall information exchanged between the IIoT network entities. The proposed scheme exhibits the security property of data confidentiality. □
Theorem 6.
MAKE-IT achieves identity anonymity.
Proof of Theorem 6.
Identity anonymity is desirous to prevent the network from flooding based attacks, location aware attacks, and impersonation attacks, and so forth. MAKE-IT never discloses the identities of the network nodes to any unauthorized entity. Only A S has prepared an offline database of identities for verification purposes. A S is a trusted entity and stores the information in tamper proof memory, therefore any access or modification by the attacker is not possible. Even the parties involved in the communication does not know the real identities of each other, their identity details are hashed before being shared. Consider an attacker intercepted the message M 3 = E ( P U A S , Ψ ) containing the hashed identity details of the G W , still the attacker would not be able to interpret the identity due to hashing (W = hash ( S G   | |   P G   | |   L G   | |   M G   | |   G I D )) and ciphering of information, E ( P U A S ) . The attacker does not have the private key of A S ( P R A S ) to decipher the information. Therefore, MAKE-IT keeps the communication anonymous by not revealing the identities of u s e r , g a t e w a y , and A S during the exchange of messages. □

6. Performance and Comparative Analysis

In this section, we evaluate the performance of the proposed protocol in terms of storage overhead, computational and communication cost. This section also presents the comparison analysis of proposed MAKE-IT approach with the traditional schemes [2,3,23,24,25,26,27] in terms of robustness against attacks and attainment of security features.
The storage cost requirement for implementing the proposed MAKE-IT approach is presented in Table 3. Total storage cost (all phases) of User, G W and A S are 264 bytes, 210 bytes, and 187 bytes, respectively. The storage space available in the CM5000 Telos B mote [57] (resource constrained device) is 1 MB , whereas the storage requirement to execute the proposed protocol (all phases) is just 0.02 % of the total available memory space. The MAKE-IT approach achieves the goal of performing mutual authentication and key exchange with a small storage requirement. Apparently, the storage requirements are very nominal, thus making a way for its (MAKE-IT) applicability in all possible use cases of IIoT.
Table 3. Storage cost of proposed protocol.
Table 4 demonstrates the computational cost spent by different entities (User, G W and A S ) in all phases (user device registration, mutual authentication and key exchange) whereas Table 5 compares the computational cost requirements of proposed scheme with existing state of the art schemes. It can be clearly witnessed that the proposed scheme has less computations, thus imposing less burden on device processing, storage and battery resources. Note that we have only compared for mutual authentication and key exchange phase as the registration phase occurs once during initialization.
Table 4. Computational cost of proposed protocol.
Table 5. Computation cost comparison with different schemes.
We have considered the Telos mote for calculating the communication cost of our scheme. Telos mote consumes 0.81 μ J and 0.72 μ J of energy for receiving and transmitting one bit, respectively [57]. Table 6 furnish the total communication cost spent by G W and User for performing mutual authentication and secret key generation. The results clearly signifies the efficiency of proposed scheme. The proposed protocol consumes only 385 μ J of energy whereas [2,3,23,24,25,26,27], consumes 768 μ J, 749 μ J, 658 μ J, 739 μ J, 742 μ J, 698 μ J, and 1411 μ J of energy, respectively. Therefore, existing schemes are not suitable for resource constrained environment of IIoT.
Table 6. Communication energy cost.
The robustness of the proposed protocol has been verified and presented in this section. The various security features offered by the proposed protocol accompanied with the list of attacks resisted by the protocol is presented in Table 7. It is observed from the Table that the proposed scheme exhibits strong protection against potential attacks and performs better in comparison to traditional schemes [2,3,23,24,25,26,27].
Table 7. Analysis and Comparison of Protocols based on protection against attacks and security goals.
Figure 9 illustrates the number of messages exchanged by the resource constrained device during mutual authentication and key exchange phase. It is found during analysis that proposed scheme exchanges only 2 messages in comparison to 3, 4, 3, 4, 3, 4, and 6 messages of scheme [2,3,23,24,25,26,27], respectively. Less message exchanges in proposed scheme is a vital sign of efficient utilization of resources.
Figure 9. Communication Cost Comparison in terms of the number of message exchanges.

7. Conclusions & Future Scope

In this paper, we propose a lightweight remote user mutual authentication and key exchange model for IIoT. Industrial network can be protected from external threats if authenticity verification is performed before allowing any entity to access the network resources. The proposed scheme uses symmetric and asymmetric key cryptography, hash, timestamps, and so forth and various other crypto primitives to achieve secure mutual authentication and key exchange. The robustness of the scheme against attacks (replay attacks, modification attacks, and man in the middle attacks, etc.) is evaluated using formal and informal security analysis. The scheme proposed can withstand many popular attacks and offer many security features like data confidentiality, identity anonymity, integrity, and so forth. Further the proposed scheme is found to be resource efficient in terms of computation and communication. All these advantages of proposed protocol over existing schemes paves a path for its use in IIoT applications. The proposed scheme can further be extended in future to protect the industrial IoT networks from internal threats as well. Future work might also consider having a comparison of MAKE-IT protocol with TCP-UDP/IP security protocols under different network settings and parameters. Especially observing the performance comparison of our MAKE-IT protocol against others under the industrial network environment settings (where network delay is up most important) would be appealing.

Author Contributions

Conceptualization, K.C. and G.S.G.; Methodology, K.C. and G.S.G.; Formal analysis, G.S.G., I.B. and P.K.; Results interpretation, K.C. and G.S.G.; Writing—original draft preparation, K.C. and G.S.G.; Writing—review and editing, I.B. and P.K.; Supervision, I.B. and P.K.; Project administration, P.K.; Funding acquisition, I.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research has been partially supported by the Swedish Civil Contingencies Agency (MSB) through the projects RICS, by the EU Horizon 2020 Framework Programme under grant agreement 773717, and by the Swedish Foundation for International Cooperation in Research and Higher Education (STINT) Initiation Grants program under grant agreement IB2019-8185.

Acknowledgments

The authors would like to thank Editor-in-Chief, Editor and anonymous Reviewers for their valuable reviews.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Waidner, M.; Kasper, M. Security in Industry 4.0—Challenges and solutions for the fourth industrial revolution. In Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany, 14–18 March 2016; pp. 1303–1308. [Google Scholar]
  2. Esfahani, A.; Mantas, G.; Matischek, R.; Saghezchi, F.B.; Rodriguez, J.; Bicaku, A.; Maksuti, S.; Tauber, M.; Schmittner, C.; Bastos, J. A lightweight authentication mechanism, for M2M communication in industrial IoT environment. IEEE Internet Things J. 2017, 6, 288–296. [Google Scholar] [CrossRef]
  3. Li, X.; Peng, J.; Niu, J.; Liao, J.; Choo, K.K.R. A robust and energy efficient authentication protocol for industrial internet of things. IEEE Internet Things J. 2018, 5, 1606–1615. [Google Scholar] [CrossRef]
  4. Xu, L.D.; He, W.; Li, S. Internet of things in industry: A survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243. [Google Scholar] [CrossRef]
  5. Xiong, H.; Mei, Q.; Zhao, Y. Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments. IEEE Syst. J. 2019, 5, 310–320. [Google Scholar] [CrossRef]
  6. IoT for Manufacturing. Available online: https://www.techmahindra.com/industries/Enterprise/Manufacturing/Service-Offerings/automotive/IOT-for-Manufacturing.aspx (accessed on 10 December 2019).
  7. Humphreys, D. Mining productivity and the fourth industrial revolution. Miner. Econ. 2020, 33, 115–125. [Google Scholar] [CrossRef]
  8. Chi, P.W.; Wang., M.H. A lightweight compound defence framework against injection attacks on IIoT. In Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing (DSC), Kaohsiung, Taiwan, 10–13 December 2018; pp. 1–8. [Google Scholar]
  9. Mumtaz, S.; Alsohaily, A.; Pang, Z.; Rayes, A.; Tsang, K.F.; Rodriguez, J. Massive internet of things for industrial applications: Addressing wireless IIoT connectivity challenges and ecosystem fragmentation. IEEE Ind. Electron. Mag. 2017, 11, 28–33. [Google Scholar] [CrossRef]
  10. Nakamura, E.T.; Ribeiro, S.L. A privacy, security, safety, resilience and reliability focused risk assessment methodology for IIoT system. In Proceedings of the 2018 Global Internet of Things Summit (GIoTS), Bilbao, Spain, 4–7 June 2018; pp. 1–6. [Google Scholar]
  11. Panchal, A.C.; Khadse, V.M.; Mahalle, P.N. Security issues in IIoT: A comprehensive survey of attacks on IIoT and its countermeasures. In Proceedings of the 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN), Lonavala, India, 23–24 November 2018; pp. 124–130. [Google Scholar]
  12. Zheng, Z.; Reddy, A.L.N. Safeguarding building automation networks: THE-driven anomaly detector based on traffic analysis. In Proceedings of the 26th International Conference on Computer Communication and Networks (ICCCN), Vancouver, BC, Canada, 31 July–3 August 2017; pp. 1–11. [Google Scholar]
  13. Sureshkanth, N.V.; Wijewickrama, R.; Maiti, A.; Jadliwala, M. Security and privacy challenges in upcoming intelligent urban micromobility transportation systems. In Proceedings of the AutoSec ’20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, New Orleans, LA, USA,, 18 March 2020; pp. 31–35. [Google Scholar]
  14. Butun, I.; Österberg, P.; Song, H. Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures. IEEE Commun. Surv. Tutor. 2019, 22, 616–644. [Google Scholar] [CrossRef]
  15. Butun, I.; Österberg, P. Detecting intrusions in cyber-physical systems of smart cities: Challenges and directions. In Secure Cyber-Physical Systems for Smart Cities; IGI Global: Hershey, PA, USA, 2019; pp. 74–102. [Google Scholar]
  16. Aydogan, E.; Yilmaz, S.; Sen, S.; Butun, I.; Forsström, S.; Gidlund, M. A central intrusion detection system for RPL-based Industrial Internet of Things. In Proceedings of the 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), Sundsvall, Sweden, 27–29 May 2019; pp. 1–5. [Google Scholar]
  17. Sisinni, E.; Saifullah, A.; Han, S.; Jennehag, U.; Gidlund, M. Industrial Internet of Things: Challenges, opportunities, and directions. IEEE Trans. Ind. Electron. 2018, 14, 4724–4734. [Google Scholar] [CrossRef]
  18. Taher, B.H.; Jiang, S.; Yassin, A.A.; Lu, H. Low-overhead remote user authentication protocol for IoT based on a fuzzy extractor and feature extraction. IEEE Access 2019, 7, 148950–148966. [Google Scholar] [CrossRef]
  19. Xu, L.; Wu, F. A lightweight authentication scheme for multi gateway wireless sensor network under IoT conception. Arab. J. Sci. Eng. 2019, 44, 3977–3993. [Google Scholar] [CrossRef]
  20. Haseeb, K.; Almogren, A.; Islam, N.; Din, I.U.; Jan, Z. An energy-efficient and secure routing protocol for intrusion avoidance in IoT-based WSN. Energies 2019, 12, 4174. [Google Scholar] [CrossRef]
  21. Rao, V.; Prema, K.V. Light-weight hashing method for user authentication in Internet-of-Things. Ad Hoc Netw. 2019, 89, 97–106. [Google Scholar] [CrossRef]
  22. Kumar, P.; Braeken, A.; Gurtov, A.; Iinatti, J.; Ha, P.H. Anonymous secure framework in connected smart home environments. IEEE Trans. Inf. Forensics Secur. 2017, 12, 968–979. [Google Scholar] [CrossRef]
  23. Das, A.K.; Wazid, M.; Kumar, N.; Vasilakos, A.V.; Rodrigues, J.J. Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment. IEEE Internet Things J. 2018, 5, 4900–4913. [Google Scholar] [CrossRef]
  24. Li, X.; Niu, J.; Bhuiyan, M.Z.A.; Wu, F.; Karuppiah, M.; Kumari, S. A robust ecc-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans. Ind. Electron. 2018, 14, 3599–3609. [Google Scholar] [CrossRef]
  25. Paliwal, S. Hash-based conditional privacy preserving authentication and key exchange protocol suitable for industrial internet of things. IEEE Access 2019, 7, 136073–136093. [Google Scholar] [CrossRef]
  26. Chang, C.-C.; Le, H.-D. A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 2015, 15, 357–366. [Google Scholar] [CrossRef]
  27. Gope, P.; Das, A.K.; Kumar, N.; Cheng, Y. Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 2019, 15, 4957–4968. [Google Scholar] [CrossRef]
  28. Vucinic, M.; Selander, G.; Mattsson, J.; Garcia, D. Requirements for a Lightweight AKE for OSCORE. Available online: https://tools.ietf.org/html/draft-ietf-lake-reqs-04 (accessed on 6 August 2020).
  29. Selander, G.; Mattsson, J.; Palombini, F. Ephemeral Diffie-Hellman Over COSE (EDHOC). Available online: https://datatracker.ietf.org/doc/draft-selander-ace-cose-ecdhe/ (accessed on 6 August 2020).
  30. Rescorla, E.; Barnes, R.; Tschofenig, H. Compact TLS 1.3. Available online: https://datatracker.ietf.org/doc/draft-rescorla-tls-ctls/ (accessed on 6 August 2020).
  31. Ronen, E.; Gillham, R.; Genkin, D.; Shamir, A.; Wong, D.; Yarom, Y. The 9 lives of Bleichenbacher’s CAT: New cache attacks on TLS implementations. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2019; pp. 435–452. [Google Scholar]
  32. Wireless IoT Protocols: Breaking Down the Network Stack|BehrTech Blog. Available online: https://behrtech.com/blog/wireless-iot-protocols-breaking-down-the-network-stack/ (accessed on 1 September 2020).
  33. Challenges in IoT Networking via TCP/IP Architecture. Available online: https://named-data.net/wp-content/uploads/2016/02/ndn-0038-1-challenges-iot.pdf (accessed on 1 September 2020).
  34. Open Standard—Weightless Management Ltd. Available online: http://www.weightless.org/keyfeatures/open-standard (accessed on 2 September 2020).
  35. Qualcomm, 5G Industrial IOT|Private LTE Industrial Networks|Qualcomm. Available online: https://www.qualcomm.com/invention/5g/5g-industrial-iot (accessed on 2 September 2020).
  36. How Microsoft Is Leveraging OPC UA to Get an Irreplaceable Position in Your Factory. Available online: https://www.automation.com/en-us/articles/2017/how-microsoft-is-leveraging-opc-ua-to-get-an-irrep (accessed on 2 September 2020).
  37. Modbus RTU Protocol Overview. Available online: http://www.rtautomation.com/technologies/modbus-rtu/ (accessed on 2 September 2020).
  38. Haxhibeqiri, J.; Karaagac, A.; Van den Abeele, F.; Joseph, W.; Moerman, I.; Hoebeke, J. LoRa indoor coverage and performance in an industrial environment: Case study. In Proceedings of the 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, Cyprus, 12–15 September 2017; pp. 1–8. [Google Scholar]
  39. Hernandez, D.M.; Peralta, G.; Manero, L.; Gomez, R.; Bilbao, J.; Zubia, C. Energy and coverage study of LPWAN schemes for Industry 4.0. In Proceedings of the IEEE International Workshop of Electronics, Control, Measurement, Signals and their Application to Mechat and ronics (ECMSM), Donostia-San Sebastian, Spain, 24–26 May 2017; pp. 1–6. [Google Scholar]
  40. Raposo, D.; Rodrigues, A.; Sinche, S.; Sá Silva, J.; Boavida, F. Industrial IoT monitoring: Technologies and architecture proposal. Sensors 2018, 18, 3568. [Google Scholar] [CrossRef]
  41. Dimitrios, Z.; Khaled, A.; Panayiotis, K.; Dirk, P. TS-LoRa: Time-slotted LoRaWAN for the Industrial Internet of Things. Comput. Commun. 2020, 153, 1–10. [Google Scholar]
  42. Haxhibeqiri, J.; De Poorter, E.; Moerman, I.; Hoebeke, J. A survey of LoRaWAN for IoT: From technology to application. Sensors 2018, 18, 3995. [Google Scholar] [CrossRef]
  43. Michele, L.; Federico, T.; Lorenzo, V.; Stefano, V. On the use of LoRaWAN for indoor Industrial IoT applications. Wirel. Commun. Mob. Comput. 2018, 2018, 1–11. [Google Scholar]
  44. Ertürk, M.A.; Aydın, M.A.; Büyükakkaşlar, M.T.; Evirgen, H. A survey on LoRaWAN architecture, protocol and technologies. Future Internet 2019, 11, 216. [Google Scholar] [CrossRef]
  45. Butun, I.; Pereira, N.; Gidlund, M. Analysis of LoRaWAN v1.1 security. In Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects, Los Angeles, CA, USA, 25 June 2018; pp. 1–6. [Google Scholar]
  46. Butun, I.; Pereira, N.; Gidlund, M. Security risk analysis of LoRaWAN and future directions. Future Internet 2019, 11, 3. [Google Scholar] [CrossRef]
  47. Mohamed, E.; Butun, I.; Pereira, N.; Gidlund, M. Formal security analysis of LoRaWAN. Comput. Netw. 2019, 148, 328–339. [Google Scholar]
  48. DASH7 Alliance—An Open Specification. Available online: https://dash7-alliance.org/ (accessed on 2 September 2020).
  49. LoRa Alliance. Available online: https://lora-alliance.org/ (accessed on 2 September 2020).
  50. MIOTY by BehrTech|LPWAN Solution for Industrial IoT. Available online: https://behrtech.com/mioty/ (accessed on 2 September 2020).
  51. Manners, D. IIoT Consortium Formed. Available online: https://www.electronicsweekly.com/news/business/533376-2018-07/ (accessed on 2 September 2020).
  52. Mioty—The Wireless IoT Platform. Available online: https://www.iis.fraunhofer.de/en/ff/lv/net/telemetrie.html (accessed on 2 September 2020).
  53. Recursive Internetwork Architecture (RINA). Available online: http://pouzinsociety.org/ (accessed on 2 September 2020).
  54. Gaba, G.S.; Kumar, G.; Monga, H.; Kim, T.; Kumar, P. Robust and lightweight mutual authentication scheme in distributed smart environments. IEEE Access 2020, 8, 69722–69733. [Google Scholar] [CrossRef]
  55. Gaba, G.S.; Kumar, G.; Monga, H.; Kim, T.; Liyanage, M.; Kumar, P. Robust and Lightweight Key Exchange (LKE) protocol for Industry 4.0. IEEE Access 2020, 8, 132808–132824. [Google Scholar] [CrossRef]
  56. Viganò, L. Automated security protocol analysis with the avispa tool. Electr. Not. Theor. Comp. Sci. 2006, 155, 61–86. [Google Scholar] [CrossRef]
  57. Telos Ultra Low Power IEEE 802.15.4 Compliant Wireless Sensor Module. Available online: http://www2.ece.ohio-state.edu/bibyk/ee582/telosMote.pdf (accessed on 17 March 2020).

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.