Cargando…
Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, ma...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7014529/ https://www.ncbi.nlm.nih.gov/pubmed/31963181 http://dx.doi.org/10.3390/s20020501 |
_version_ | 1783496652002164736 |
---|---|
author | Lara, Evangelina Aguilar, Leocundo Sanchez, Mauricio A. García, Jesús A. |
author_facet | Lara, Evangelina Aguilar, Leocundo Sanchez, Mauricio A. García, Jesús A. |
author_sort | Lara, Evangelina |
collection | PubMed |
description | The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other’s identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows–Abadi–Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes. |
format | Online Article Text |
id | pubmed-7014529 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-70145292020-03-09 Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things Lara, Evangelina Aguilar, Leocundo Sanchez, Mauricio A. García, Jesús A. Sensors (Basel) Article The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other’s identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows–Abadi–Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes. MDPI 2020-01-16 /pmc/articles/PMC7014529/ /pubmed/31963181 http://dx.doi.org/10.3390/s20020501 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Lara, Evangelina Aguilar, Leocundo Sanchez, Mauricio A. García, Jesús A. Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things |
title | Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things |
title_full | Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things |
title_fullStr | Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things |
title_full_unstemmed | Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things |
title_short | Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things |
title_sort | lightweight authentication protocol for m2m communications of resource-constrained devices in industrial internet of things |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7014529/ https://www.ncbi.nlm.nih.gov/pubmed/31963181 http://dx.doi.org/10.3390/s20020501 |
work_keys_str_mv | AT laraevangelina lightweightauthenticationprotocolform2mcommunicationsofresourceconstraineddevicesinindustrialinternetofthings AT aguilarleocundo lightweightauthenticationprotocolform2mcommunicationsofresourceconstraineddevicesinindustrialinternetofthings AT sanchezmauricioa lightweightauthenticationprotocolform2mcommunicationsofresourceconstraineddevicesinindustrialinternetofthings AT garciajesusa lightweightauthenticationprotocolform2mcommunicationsofresourceconstraineddevicesinindustrialinternetofthings |