Skip navigation

Lightweight and robust key agreement for securing IIoT-driven flexible manufacturing systems

Lightweight and robust key agreement for securing IIoT-driven flexible manufacturing systems

Hammad, Muhammad, Badshah, Akhtar, Almeer, Mohammed A., Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544, Song, Houbing, Chen, Sheng and Han, Zhu (2025) Lightweight and robust key agreement for securing IIoT-driven flexible manufacturing systems. IEEE Internet of Things. ISSN 2327-4662 (Online) (doi:10.1109/JIOT.2025.3535846)

[thumbnail of Author's Accepted Manuscript]
Preview
PDF (Author's Accepted Manuscript)
49608 WAQAS_Lightweight_And_Robust_Key_Agreement_For_Securing_IIoT-Driven_Flexible_Manufacturing_Systems_(AAM)_2025.pdf - Accepted Version

Download (2MB) | Preview

Abstract

The ever-evolving Internet of Things (IoT) has ushered in a new era of intelligent manufacturing across multiple industries. However, the security and privacy of real-time data transmitted over the public channel of the industrial IoT (IIoT) remain formidable challenges. {Existing lightweight protocols often omit one or more critical security features, such as anonymity and untraceability, and are susceptible to threats like desynchronization attacks. Additionally, they struggle to achieve an optimal balance between robust security and performance efficiency.} To bridge these gaps, we introduce a new lightweight key agreement security scheme that guarantees secure access to the IIoT-enabled flexible manufacturing system (FMS). The strength of our scheme lies in its utilization of the authenticated encryption with associative data (AEAD) primitive, AEGIS, along with hash functions and physical unclonable functions, which secure the IIoT ecosystem. Additionally, our scheme offers flexibility in the form of the addition of new machines, password updates, and revocation in cases of theft or loss. A comprehensive security analysis demonstrates the efficacy of the proposed scheme in thwarting various attacks. The formal analysis, based on the Real-Or-Random (RoR) model, ensures session key indistinguishability, while the informal analysis highlights its resilience against known attacks. The comparative assessment demonstrate that the proposed scheme consistently outperforms the benchmark schemes across multiple dimensions, including security and functionality features, computational and communication overheads, and runtime efficiency. Specifically, the proposed scheme achieves peak performance enhancements of {77.55\%, 44.73\%, and 69.6\% in computational overhead, runtime overhead, and communication overhead, respectively, underscoring its substantial performance advantages.

Item Type: Article
Uncontrolled Keywords: Industrial Internet of Things, flexible manufacturing system, physical unclonable functions, user authentication, security
Subjects: Q Science > Q Science (General)
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
T Technology > T Technology (General)
Faculty / School / Research Centre / Research Group: Faculty of Education, Health & Human Sciences
Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS)
Last Modified: 31 Jan 2025 15:08
URI: http://gala.gre.ac.uk/id/eprint/49608

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics