Netinfo Security ›› 2024, Vol. 24 ›› Issue (7): 1015-1026.doi: 10.3969/j.issn.1671-1122.2024.07.004

Previous Articles     Next Articles

Three-Factor Authentication and Key Agreement Protocol Based on Chaotic Map for Industrial Internet of Things Systems

ZHANG Xiaojun1,2(), ZHANG Nan1,2, HAO Yunpu1,2, WANG Zhouyang1,2, XUE Jingting1,2   

  1. 1. School of Computer Science and Software Engineering, Southwest Petroleum University, Chengdu 610500, China
    2. Engineering Research Center for Intelligent Oil & Gas Exploration and Development of Sichuan Province, Southwest Petroleum University, Chengdu 610500, China
  • Received:2024-04-17 Online:2024-07-10 Published:2024-08-02

Abstract:

Through various terminal sensor devices, Industrial Internet of Things (IIoT) system transmits the collected key industrial data to the industrial Internet of things platform in real time, to provide data intelligent analysis and decision-making. However, illegal access to industrial data will lead to information security issues, such as data or sensitive identity leakage, data tampering, which will affect the normal operation of IIoT system. To this end, for IIoT system, this paper built a distributed data anonymous transmission architecture under multi-user, multi-gateway and multi-industrial Internet of Things platform, and proposed a three-factor anonymous authentication and key agreement protocol based on chaotic map. The protocol realized the three-factor login authentication of smart card, password, and biometric information from the user to the mobile terminal device. Under the assistance of the gateway, the user utilized the mobile terminal device to realize two-way anonymous authentication from the user to the IIoT platform based on chaotic map technology and key credentials, and simultaneous achieved the session key agreement for subsequent secure communication. The application of the protocol was extended, including the update of each user’s password and biometric information, the revocation function of smart card, and the synchronous update of multi-gateway key based on Chinese remainder theorem. Security analysis and performance evaluation demonstrate that the proposed protocol can be securely and efficiently deployed in IIoT system.

Key words: Industrial Internet of Things, three factor authentication, key agreement, chaotic map

CLC Number: