当前位置: X-MOL 学术Sensors › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things.
Sensors ( IF 3.9 ) Pub Date : 2020-01-16 , DOI: 10.3390/s20020501
Evangelina Lara 1 , Leocundo Aguilar 1 , Mauricio A Sanchez 1 , Jesús A García 1
Affiliation  

The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other's identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows-Abadi-Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes.

中文翻译:

工业物联网中资源受限设备的M2M通信的轻量级认证协议。

工业物联网(IIoT)由传感器,网络和用于连接和控制生产系统的服务组成。它的好处包括供应链监控和机器故障检测。但是,它具有许多漏洞,例如工业间谍活动和破坏活动。此外,许多IIoT设备受到资源限制,从而阻碍了对其使用传统安全服务的使用。身份验证使设备可以确信彼此的身份,从而防止某些安全攻击。已经针对IIoT提出了许多身份验证协议。但是,它们具有对资源受限的设备不可行的高计算要求,或者发现它们不安全。本文提出了一种资源受限的IIoT设备的认证协议。它基于轻量级运算xor,加法,和减法,以及哈希函数。此外,主体之间仅交换四个消息以进行身份​​验证。它具有较低的执行时间和通信成本。它的安全性已通过正式方法“ Internet安全协议和应用程序自动验证”(AVISPA)工具和Burrows-Abadi-Needham(BAN)逻辑进行了成功评估,并对其抗已知攻击能力进行了非正式分析。将其性能和安全性与最新协议进行了比较,从而为资源受限的IIoT设备提供了良好的性能,并具有类似于计算昂贵方案的更高安全性。它的安全性已通过正式方法“ Internet安全协议和应用程序自动验证”(AVISPA)工具和Burrows-Abadi-Needham(BAN)逻辑进行了成功评估,并对其抗已知攻击能力进行了非正式分析。将其性能和安全性与最新协议进行了比较,从而为资源受限的IIoT设备提供了良好的性能,并具有类似于计算昂贵方案的更高安全性。它的安全性已通过正式方法“ Internet安全协议和应用程序自动验证”(AVISPA)工具和Burrows-Abadi-Needham(BAN)逻辑进行了成功评估,并对其抗已知攻击能力进行了非正式分析。将其性能和安全性与最新协议进行了比较,从而为资源受限的IIoT设备提供了良好的性能,并具有类似于计算昂贵方案的更高安全性。
更新日期:2020-01-16
down
wechat
bug