Author Identifier

Muhammad Waqas: https://orcid.org/0000-0003-0814-7544

Document Type

Journal Article

Publication Title

IEEE Internet of Things Journal

Volume

12

Issue

11

First Page

17197

Last Page

17209

Publisher

IEEE

School

School of Engineering

Funders

National Science Foundation (2302469) / Toyota / Amazon / Japan Science and Technology Agency / Adopting Sustainable Partnerships for Innovative Research Ecosystem (JPMJAP2326)

Comments

This is an an Author's Accepted Manuscript of an article published by IEEE. © 2025 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Hammad, M., Badshah, A., Almeer, M. A., Waqas, M., Song, H., Chen, S., & Han, Z. (2025). Lightweight and robust key agreement for securing IIoT-driven flexible manufacturing systems. IEEE Internet of Things Journal, 12(11), 17197-17209. https://doi.org/10.1109/JIOT.2025.3535846

Abstract

The ever-evolving Internet of Things (IoT) has ushered in a new era of intelligent manufacturing across multiple industries. However, the security and privacy of real-time data transmitted over the public channel of the industrial IoT (IIoT) remain formidable challenges. Existing lightweight protocols often omit one or more critical security features, such as anonymity and untraceability, and are susceptible to threats like desynchronization attacks. Additionally, they struggle to achieve an optimal balance between robust security and performance efficiency. To bridge these gaps, we introduce a new lightweight key agreement security scheme that guarantees secure access to the IIoT-enabled flexible manufacturing system (FMS). The strength of our scheme lies in its utilization of the authenticated encryption with associative data (AEAD) primitive, AEGIS, along with hash functions and physical unclonable functions, which secure the IIoT ecosystem. Additionally, our scheme offers flexibility in the form of the addition of new machines, password updates, and revocation in cases of theft or loss. A comprehensive security analysis demonstrates the efficacy of the proposed scheme in thwarting various attacks. The formal analysis, based on the Real-Or-Random (RoR) model, ensures session key indistinguishability, while the informal analysis highlights its resilience against known attacks. The comparative assessment demonstrate that the proposed scheme consistently outperforms the benchmark schemes across multiple dimensions, including security and functionality features, computational and communication overheads, and runtime efficiency. Specifically, the proposed scheme achieves peak performance enhancements of 77.55%, 44.73%, and 69.6% in computational overhead, runtime overhead, and communication overhead, respectively, underscoring its substantial performance advantages.

DOI

10.1109/JIOT.2025.3535846

Creative Commons License

Creative Commons Attribution-No Derivative Works 4.0 License
This work is licensed under a Creative Commons Attribution-No Derivative Works 4.0 License.

Available for download on Friday, January 29, 2027

Share

 
COinS
 

Link to publisher version (DOI)

10.1109/JIOT.2025.3535846