4.8 Article

A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 6, 期 1, 页码 288-296

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2017.2737630

关键词

Industrial Internet of Things (IIoT); lightweight authentication; machine-to-machine (M2M) communications; security; sensors

资金

  1. Power Semiconductor and Electronics Manufacturing 4.0 (SemI40) [692466]
  2. Electronic Component Systems for European Leadership Joint Undertaking under Grant ECSEL JU
  3. Fundacao para a Ciencia e Tecnologia from Austria [CSEL/0009/2015]
  4. Fundacao para a Ciencia e Tecnologia from Germany [ECSEL/0009/2015]
  5. Fundacao para a Ciencia e Tecnologia from Italy [ECSEL/0009/2015]
  6. Fundacao para a Ciencia e Tecnologia from France [ECSEL/0009/2015]
  7. Fundacao para a Ciencia e Tecnologia from Portugal [ECSEL/0009/2015]

向作者/读者索取更多资源

In the emerging industrial Internet of Things (IIoT) era, machine-to-machine (M2M) communication technology is considered as a key underlying technology for building IIoT environments, where devices (e.g., sensors, actuators, and gateways) are enabled to exchange information with each other in an autonomous way without human intervention. However, most of the existing M2M protocols that can be also used in the IIoT domain provide security mechanisms based on asymmetric cryptography resulting in high computational cost. As a consequence, the resource-constrained IoT devices are not able to support them appropriately and thus, many security issues arise for the IIoT environment. Therefore, lightweight security mechanisms are required for M2M communications in IIoT in order to reach its full potential. As a step toward this direction, in this paper, we propose a lightweight authentication mechanism, based only on hash and XOR operations, for M2M communications in IIoT environment. The proposed mechanism is characterized by low computational cost, communication, and storage overhead, while achieving mutual authentication, session key agreement, device's identity confidentiality, and resistance against the following attacks: replay attack, man-in-the-middle attack, impersonation attack, and modification attack.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据