A Lightweight Authentication and Key Negotiation Protocol for IIoT using ECC

Industrial Internet of Things (IIoT) is reshaping the manufacturing and automation sectors by connecting smart devices across factories, plants, and supply chains. But as connectivity grows, so do security risks — especially when devices are resource-constrained and operate in potentially hostile environments. In this post, I’ll share a lightweight three-factor mutual authentication protocol using Elliptic Curve Cryptography (ECC) that I developed as part of my cryptography project. This scheme ensures secure communication between users and gateways in an IIoT environment. ECC ECC offers strong security with smaller key sizes, making it ideal for IIoT devices that have limited processing power and storage. It supports faster computations and lower energy consumption compared to traditional cryptographic methods like RSA. Authentication & Login Phase When the user wants to log in, the smart card is used to verify the three factors again (ID, password, biometric). Only if all three match, the gateway authenticates the user and starts a secure session.

Apr 10, 2025 - 07:33
 0
A Lightweight Authentication and Key Negotiation Protocol for IIoT using ECC

Industrial Internet of Things (IIoT) is reshaping the manufacturing and automation sectors by connecting smart devices across factories, plants, and supply chains. But as connectivity grows, so do security risks — especially when devices are resource-constrained and operate in potentially hostile environments.

In this post, I’ll share a lightweight three-factor mutual authentication protocol using Elliptic Curve Cryptography (ECC) that I developed as part of my cryptography project. This scheme ensures secure communication between users and gateways in an IIoT environment.

ECC
ECC offers strong security with smaller key sizes, making it ideal for IIoT devices that have limited processing power and storage. It supports faster computations and lower energy consumption compared to traditional cryptographic methods like RSA.

Authentication & Login Phase
When the user wants to log in, the smart card is used to verify the three factors again (ID, password, biometric). Only if all three match, the gateway authenticates the user and starts a secure session.

Image description