首页> 美国卫生研究院文献>Sensors (Basel Switzerland) >Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
【2h】

Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things

机译:工业物联网中资源受限设备的M2M通信的轻量级认证协议

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other’s identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows–Abadi–Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes.
机译:工业物联网(IIoT)由传感器,网络和用于连接和控制生产系统的服务组成。它的好处包括供应链监控和机器故障检测。但是,它具有许多漏洞,例如工业间谍活动和破坏活动。此外,许多IIoT设备受到资源限制,这阻碍了对其使用传统安全服务的使用。身份验证使设备可以确信彼此的身份,从而防止某些安全攻击。已经针对IIoT提出了许多身份验证协议。但是,它们对资源受限的设备不具备很高的计算要求,或者发现它们不安全。本文提出了一种资源受限的IIoT设备的认证协议。它基于轻量级运算xor,加法和减法以及哈希函数。此外,主体之间仅交换四个消息以进行身份​​验证。它具有较低的执行时间和通信成本。它的安全性已通过正式方法“ Internet安全协议和应用程序自动验证”(AVISPA)工具和Burrows-Abadi-Needham(BAN)逻辑进行了成功评估,并对其抗已知攻击能力进行了非正式分析。将其性能和安全性与最新协议进行了比较,从而为资源受限的IIoT设备提供了良好的性能,并具有类似于计算昂贵方案的更高安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号