Lightweight and roubust key agreement for securing IIoT-driven flexible manufacturing systems

Author Identifier

Muhammad Waqas: https://orcid.org/0000-0003-0814-7544

Document Type

Journal Article

Publication Title

IEEE Internet of Things Journal

Publisher

IEEE

School

School of Engineering

Funders

National Science Foundation (2302469) / Toyota / Amazon / Japan Science and Technology Agency / Adopting Sustainable Partnerships for Innovative Research Ecosystem (JPMJAP2326)

Comments

Hammad, M., Badshah, A., Almeer, M. A., Waqas, M., Song, H., Chen, S., & Han, Z. (2025). Lightweight and robust key agreement for securing IIoT-driven flexible manufacturing systems. IEEE Internet of Things Journal. Advance online publication. https://doi.org/10.1109/JIOT.2025.3535846

Abstract

The ever-evolving Internet of Things (IoT) has ushered in a new era of intelligent manufacturing across multiple industries. However, the security and privacy of real-time data transmitted over the public channel of the industrial IoT (IIoT) remain formidable challenges. Existing lightweight protocols often omit one or more critical security features, such as anonymity and untraceability, and are susceptible to threats like desynchronization attacks. Additionally, they struggle to achieve an optimal balance between robust security and performance efficiency. To bridge these gaps, we introduce a new lightweight key agreement security scheme that guarantees secure access to the IIoT-enabled flexible manufacturing system (FMS). The strength of our scheme lies in its utilization of the authenticated encryption with associative data (AEAD) primitive, AEGIS, along with hash functions and physical unclonable functions, which secure the IIoT ecosystem. Additionally, our scheme offers flexibility in the form of the addition of new machines, password updates, and revocation in cases of theft or loss. A comprehensive security analysis demonstrates the efficacy of the proposed scheme in thwarting various attacks. The formal analysis, based on the Real-Or-Random (RoR) model, ensures session key indistinguishability, while the informal analysis highlights its resilience against known attacks. The comparative assessment demonstrate that the proposed scheme consistently outperforms the benchmark schemes across multiple dimensions, including security and functionality features, computational and communication overheads, and runtime efficiency. Specifically, the proposed scheme achieves peak performance enhancements of 77.55%, 44.73%, and 69.6% in computational overhead, runtime overhead, and communication overhead, respectively, underscoring its substantial performance advantages.

DOI

10.1109/JIOT.2025.3535846

Access Rights

subscription content

Share

 
COinS