A dynamic multiple-keys game-based industrial wireless sensor-cloud authentication scheme

Industrial wireless sensor clouds (IWSCs) are indispensable in industrial applications and can operate in tough industrial environments by using industrial wireless sensor nodes to perceive and control devices. Because wireless sensor nodes are often deployed in unattended, remote-controlled environments, attackers may impersonate legal nodes to change device parameters. Such unexpected events could lead to disastrous consequences. It is difficult for an intrusion detection system to detect such attacks. Therefore, an authentication scheme becomes one of an effective approaches to ensuring security. However, authentication schemes for industrial wireless sensor clouds have not yet been adequately studied. The current approach is only applicable to an authentication scheme based on the shared secret key of the wireless sensor cloud and cannot be applied to a dynamic multiple-keys authentication scheme. Based on this scheme, this paper studies a game-based dynamic multiple-keys authentication scheme. Based on the probability of interception of the key and the leak probability of devices’s operating authorization, the paper sets up an authentication framework for a dynamic multiple-keys game. It also derives the optimal strategy which game players can use to maximize security utility and analyze the evolution process of the trust in the dynamic multiple-keys game. The experimental results show that this approach can successfully improve the security of IWSC.

[1]  Jianhua Liu,et al.  Evolutionary trust scheme of certificate game in mobile cloud computing , 2018, Soft Comput..

[2]  Xinyi Huang,et al.  Provably secure authenticated key agreement scheme for distributed mobile cloud computing services , 2017, Future Gener. Comput. Syst..

[3]  Zheng Yan,et al.  CloudFile: A cloud data access control system based on mobile social trust , 2017, J. Netw. Comput. Appl..

[4]  Bharti Joshi,et al.  H-IBE: Hybrid-identity based encryption approach for cloud security with outsourced revocation , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).

[5]  Uthpala Subodhani Premarathne,et al.  Reliable context-aware multi-attribute continuous authentication framework for secure energy utilization management in smart homes , 2015 .

[6]  Jianhua Liu,et al.  Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds , 2018, IEEE Transactions on Information Forensics and Security.

[7]  Sanath S. Shenoy,et al.  Real-time remote monitoring and operation of industrial devices using IoT and cloud , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).

[8]  Huaglory Tianfield,et al.  Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing , 2018, IEEE Transactions on Big Data.

[9]  R. Chitra,et al.  Securing cloud from ddos attacks using intrusion detection system in virtual machine , 2013 .

[10]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[11]  Gongpu Wang,et al.  Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack , 2015, IEEE Transactions on Industrial Informatics.

[12]  Chandra Sekhar Vorugunti PPMUAS: A privacy preserving mobile user authentication system for cloud environment utilizing big data features , 2016, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

[13]  Ei Ei Mon,et al.  The privacy-aware access control system using attribute-and role-based access control in private cloud , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[14]  Sudip Misra,et al.  TRAST: Trust-Based Distributed Topology Management for Wireless Multimedia Sensor Networks , 2016, IEEE Transactions on Computers.

[15]  Maurizio Rebaudengo,et al.  Key Management for Static Wireless Sensor Networks With Node Adding , 2014, IEEE Transactions on Industrial Informatics.

[16]  J. Martin Leo Manickam,et al.  Collaborative Lightweight Trust Management Scheme for Wireless Sensor Networks , 2015, Wirel. Pers. Commun..

[17]  Dong Yang,et al.  A trust management scheme for industrial wireless sensor networks , 2013, IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society.

[18]  Mohammad Reza Aref,et al.  A fuzzy fully distributed trust management system in wireless sensor networks , 2016 .

[19]  Guangjie Han,et al.  A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.

[20]  Bharat K. Bhargava,et al.  Secure and efficient access to outsourced data , 2009, CCSW '09.

[21]  Taekyoung Kwon,et al.  An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.

[22]  Kim-Kwang Raymond Choo,et al.  Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment , 2017, Comput. Stand. Interfaces.

[23]  H. S. Fadewar,et al.  Authentication scheme for insecure networks in cloud computing , 2016, 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC).