Suppr超能文献

面向工业物联网资源受限设备的机器对机器通信的轻量级认证协议。

Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things.

机构信息

Facultad de Ciencias Químicas e Ingeniería, Universidad Autónoma de Baja California, Tijuana BC 22390, Mexico.

出版信息

Sensors (Basel). 2020 Jan 16;20(2):501. doi: 10.3390/s20020501.

Abstract

The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other's identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows-Abadi-Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes.

摘要

工业物联网 (IIoT) 由传感器、网络和服务组成,用于连接和控制生产系统。其好处包括供应链监控和机器故障检测。然而,它有许多漏洞,如工业间谍和破坏。此外,许多 IIoT 设备资源受限,这阻碍了传统安全服务在它们中的应用。认证允许设备相互确认身份,防止一些安全攻击。已经为 IIoT 提出了许多认证协议;然而,它们的计算要求很高,不适合资源受限的设备,或者已经发现不安全。本文提出了一种针对资源受限的 IIoT 设备的认证协议。它基于轻量级运算异或、加法和减法,以及哈希函数。此外,主体之间只交换四个消息来进行认证。它具有低执行时间和通信成本。它的安全性已成功使用形式化方法自动验证互联网安全协议和应用程序 (AVISPA) 工具和 Burrows-Abadi-Needham (BAN) 逻辑进行评估,并对其抵抗已知攻击的能力进行了非正式分析。它的性能和安全性与最新协议进行了比较,为资源受限的 IIoT 设备提供了良好的性能,并且与计算昂贵的方案具有相似的更高安全性。

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验