信息网络安全 ›› 2024, Vol. 24 ›› Issue (7): 1015-1026.doi: 10.3969/j.issn.1671-1122.2024.07.004

• 专题论文:物联网安全 • 上一篇    下一篇

工业物联网系统基于混沌映射三因素认证与密钥协商协议

张晓均1,2(), 张楠1,2, 郝云溥1,2, 王周阳1,2, 薛婧婷1,2   

  1. 1.西南石油大学计算机与软件学院,成都 610500
    2.西南石油大学四川省油气勘探开发智能化工程研究中心,成都 610500
  • 收稿日期:2024-04-17 出版日期:2024-07-10 发布日期:2024-08-02
  • 通讯作者: 张晓均 zhangxjdzkd2012@163.com
  • 作者简介:张晓均(1985—),男,四川,副教授,博士,CCF会员,主要研究方向为密码学与信息安全|张楠(1999—),男,河北,硕士研究生,主要研究方向为密码学与工业信息安全|郝云溥(2000—),男,河北,硕士研究生,主要研究方向为密码学与数据安全|王周阳(2001—),男,四川,硕士研究生,主要研究方向为密码学与车联网安全|薛婧婷(1990—),女,四川,讲师,博士,主要研究方向为密码学与区块链。
  • 基金资助:
    国家自然科学基金(61902327);四川省自然科学基金(2023NSFSC1398);中国博士后科学基金(2020M681316);油气勘探开发软件国家工程研究中心开放课题(DFWT-ZYRJ-2024-JS-81)

Three-Factor Authentication and Key Agreement Protocol Based on Chaotic Map for Industrial Internet of Things Systems

ZHANG Xiaojun1,2(), ZHANG Nan1,2, HAO Yunpu1,2, WANG Zhouyang1,2, XUE Jingting1,2   

  1. 1. School of Computer Science and Software Engineering, Southwest Petroleum University, Chengdu 610500, China
    2. Engineering Research Center for Intelligent Oil & Gas Exploration and Development of Sichuan Province, Southwest Petroleum University, Chengdu 610500, China
  • Received:2024-04-17 Online:2024-07-10 Published:2024-08-02

摘要:

工业物联网系统通过各类终端传感器设备,将采集的关键工业数据实时传输到工业物联网平台,提供数据智能分析与决策。然而,对工业数据的非法访问将导致数据或敏感身份标识泄露、数据篡改等信息安全问题,影响工业物联网系统的正常运行。基于此,文章面向工业物联网系统,搭建多用户、多网关、多工业物联网平台下的分布式数据匿名传输架构,提出基于混沌映射的三因素认证与密钥协商协议。协议实现了用户到移动终端设备的智能卡、口令、生物特征信息的三因素登录认证。在网关协助下,用户利用移动终端设备,基于混沌映射技术与关键凭证,实现了用户到工业物联网平台的双向匿名认证,并协商了用于后续保密通信的会话密钥。文章对协议进行了应用拓展,包括用户口令与生物特征信息的更新、智能卡撤销的功能,基于中国剩余定理实现了对多网关的密钥同步更新。安全性分析与性能评估表明,该设计协议能够安全高效地部署在工业物联网系统。

关键词: 工业物联网, 三因素认证, 密钥协商, 混沌映射

Abstract:

Through various terminal sensor devices, Industrial Internet of Things (IIoT) system transmits the collected key industrial data to the industrial Internet of things platform in real time, to provide data intelligent analysis and decision-making. However, illegal access to industrial data will lead to information security issues, such as data or sensitive identity leakage, data tampering, which will affect the normal operation of IIoT system. To this end, for IIoT system, this paper built a distributed data anonymous transmission architecture under multi-user, multi-gateway and multi-industrial Internet of Things platform, and proposed a three-factor anonymous authentication and key agreement protocol based on chaotic map. The protocol realized the three-factor login authentication of smart card, password, and biometric information from the user to the mobile terminal device. Under the assistance of the gateway, the user utilized the mobile terminal device to realize two-way anonymous authentication from the user to the IIoT platform based on chaotic map technology and key credentials, and simultaneous achieved the session key agreement for subsequent secure communication. The application of the protocol was extended, including the update of each user’s password and biometric information, the revocation function of smart card, and the synchronous update of multi-gateway key based on Chinese remainder theorem. Security analysis and performance evaluation demonstrate that the proposed protocol can be securely and efficiently deployed in IIoT system.

Key words: Industrial Internet of Things, three factor authentication, key agreement, chaotic map

中图分类号: