Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture

Mahmood, Khalid, Shamshad, Salman, Saleem, Muhammad Asad, Kharel, Rupak orcid iconORCID: 0000-0002-8632-7439, Das, Ashok Kumar, Shetty, Sachin and Rodrigues, Joel J P C (2023) Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture. Journal of Advanced Research . ISSN 2090-1232

[thumbnail of VOR (In Press; Corrected Proof)]
Preview
PDF (VOR (In Press; Corrected Proof)) - Published Version
Available under License Creative Commons Attribution Non-commercial.

1MB

Official URL: https://doi.org/10.1016/j.jare.2023.09.017

Abstract

The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical and digital domains is crucial for unlocking the full potential of the IIoT, and digital twins can facilitate this integration by providing a virtual representation of real-world entities. By combining digital twins with the IIoT, industries can simulate, predict, and control physical behaviors, enabling them to achieve broader value and support industry 4.0 and 5.0. Constituents of cooperative IIoT domains tend to interact and collaborate during their complicated operations. To secure such interaction and collaborations, we introduce a blockchain-based cross-domain authentication protocol for IIoT. The blockchain maintains only each domain's dynamic accumulator, which accumulates crucial materials derived from devices, decreasing the overhead. In addition, we use the on-chain accumulator to effectively validate the unlinkable identities of cross-domain IIoT devices. The implementation of the concept reveals the fact that our protocol is efficient and reliable. This efficiency and reliability of our protocol is also substantiated through comparison with state-of-the-art literature. In contrast to related protocols, our protocol exhibits a minimum 22.67% increase in computation cost efficiency and a 16.35% rise in communication cost efficiency. The developed protocol guarantees data transfer security across the domain and thwarts IoT devices from potential physical attacks. Additionally, in order to protect privacy, anonymity and unlinkability are also guaranteed. [Abstract copyright: Copyright © 2023. Production and hosting by Elsevier B.V.]


Repository Staff Only: item control page