Abstract

An Efficient Mutual Authentication Scheme for Edge Computing Enabled IIoT


Abstract


The adoption of IIoT can revolutionize the working of industries to reduce unnecessary operational costs and increase usability and reliability, but there is the challenge of maintaining availability, scalability, and security. The collaboration of edge computing and IIoT can enhance the capabilities of industrial systems. The collaboration can resolve challenges related to latency, bandwidth, security, and real-time data processing, making industrial processes more efficient, responsive, and scalable. IIoT systems use radio frequency identification (RFID) technology to ensure that only authorized individuals or assets access specific areas, enhancing security and safety in industrial facilities. Edge computing reduces the volume of data sent from an RFID reader to a centralized cloud. RFID readers at the edge can process data locally, filtering and aggregating information before transmitting it to higher-level systems. This minimizes latency and optimizes efficiency and bandwidth usage. In this context, many authentication schemes for IIoT applications have been proposed in recent times trying to satisfy the security issue. But most of the schemes have a lot of vulnerability. This study carried out a systematic study of existing RFID authentication schemes based on Elliptic Curve Cryptography (ECC). Next, we present the system architecture, of RFID systems. Next, for IIoT applications, we developed an enhanced RFID mutual authentication system using ECC. Next, we performed a security analysis and comparison of our proposed protocol with some published work in this area. Using the AVISPA simulation tool, we finally executed a formal security verification of our proposed authentication method.




Keywords


Industrial Internet of Thing, Edge computing, Radio frequency identification system, Elliptic curve cryptography, Security, Privacy, Access control, AVISPA tool.