Cargando…

Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things

The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, ma...

Descripción completa

Detalles Bibliográficos
Autores principales: Lara, Evangelina, Aguilar, Leocundo, Sanchez, Mauricio A., García, Jesús A.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7014529/
https://www.ncbi.nlm.nih.gov/pubmed/31963181
http://dx.doi.org/10.3390/s20020501
_version_ 1783496652002164736
author Lara, Evangelina
Aguilar, Leocundo
Sanchez, Mauricio A.
García, Jesús A.
author_facet Lara, Evangelina
Aguilar, Leocundo
Sanchez, Mauricio A.
García, Jesús A.
author_sort Lara, Evangelina
collection PubMed
description The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other’s identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows–Abadi–Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes.
format Online
Article
Text
id pubmed-7014529
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-70145292020-03-09 Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things Lara, Evangelina Aguilar, Leocundo Sanchez, Mauricio A. García, Jesús A. Sensors (Basel) Article The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other’s identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows–Abadi–Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes. MDPI 2020-01-16 /pmc/articles/PMC7014529/ /pubmed/31963181 http://dx.doi.org/10.3390/s20020501 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Lara, Evangelina
Aguilar, Leocundo
Sanchez, Mauricio A.
García, Jesús A.
Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
title Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
title_full Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
title_fullStr Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
title_full_unstemmed Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
title_short Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
title_sort lightweight authentication protocol for m2m communications of resource-constrained devices in industrial internet of things
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7014529/
https://www.ncbi.nlm.nih.gov/pubmed/31963181
http://dx.doi.org/10.3390/s20020501
work_keys_str_mv AT laraevangelina lightweightauthenticationprotocolform2mcommunicationsofresourceconstraineddevicesinindustrialinternetofthings
AT aguilarleocundo lightweightauthenticationprotocolform2mcommunicationsofresourceconstraineddevicesinindustrialinternetofthings
AT sanchezmauricioa lightweightauthenticationprotocolform2mcommunicationsofresourceconstraineddevicesinindustrialinternetofthings
AT garciajesusa lightweightauthenticationprotocolform2mcommunicationsofresourceconstraineddevicesinindustrialinternetofthings