Document Type

Journal Article

Publication Title

IEEE Access

Volume

11

First Page

67626

Last Page

67639

Publisher

IEEE

School

School of Engineering

RAS ID

61835

Funders

Ministry of Education in Saudi Arabia

Comments

Hammad, M., Badshah, A., Abbas, G., Alasmary, H., Waqas, M., & Khan, W. A. (2023). A provable secure and efficient authentication framework for smart manufacturing industry. IEEE Access, 11, 67626-67639. https://doi.org/10.1109/ACCESS.2023.3290913

Abstract

Smart manufacturing is transforming the manufacturing industry by enhancing productivity and quality, driving growth in the global economy. The Internet of Things (IoT) has played a crucial role in realizing Industry 4.0, where machines can communicate and interact in real-time. Despite these advancements, security remains a major challenge in developing and deploying smart manufacturing. As cyber-attacks become more prevalent, researchers are making security a top priority. Although IoT and Industrial IoT (IIoT) are used to establish smart industries, these systems remain vulnerable to various types of attacks. To address these security issues, numerous authentication methods have been proposed. However, many of these methods are vulnerable to known attacks, such as physical security, privileged-insider, and impersonation attacks, or have high computational and communication costs, making them unsuitable for resource-limited IoT devices. Therefore, in this paper, we present a new approach to mutual authentication between the flexible manufacturing system unit, the user, and the server. It enables secure communication in an IIoT-enabled system, which represents the smart manufacturing industry. This security is achieved through the establishment of session keys. Our proposed scheme demonstrates robust resistance against various security attacks, outperforming existing schemes. Although the communication overhead is slightly higher compared to some benchmark schemes, this trade-off is justified by the significant security advantages it offers. Overall, our scheme strikes a balance, providing superior security and competitive performance.

DOI

10.1109/ACCESS.2023.3290913

Creative Commons License

Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.

Share

 
COinS