Next Article in Journal
Neutrons for Cultural Heritage—Techniques, Sensors, and Detection
Previous Article in Journal
Internet of Measurement Things Architecture: Proof of Concept with Scope of Accreditation
Previous Article in Special Issue
A Novel Finger-Controlled Passive RFID Tag Design for Human–Machine Interaction
Open AccessArticle

Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things

Facultad de Ciencias Químicas e Ingeniería, Universidad Autónoma de Baja California, Tijuana BC 22390, Mexico
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(2), 501; https://doi.org/10.3390/s20020501
Received: 28 December 2019 / Revised: 12 January 2020 / Accepted: 14 January 2020 / Published: 16 January 2020
(This article belongs to the Special Issue Internet of Things for Smart Homes and Industrial Application)
The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other’s identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows–Abadi–Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes. View Full-Text
Keywords: Internet of Things; Industrial Internet of Things; authentication; M2M; lightweight; AVISPA; BAN Internet of Things; Industrial Internet of Things; authentication; M2M; lightweight; AVISPA; BAN
Show Figures

Figure 1

MDPI and ACS Style

Lara, E.; Aguilar, L.; Sanchez, M.A.; García, J.A. Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things. Sensors 2020, 20, 501.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop