Cryptology ePrint Archive: Report 2018/891

Breaking a Lightweight M2M Authentication Protocol for Communications in IIoT Environment

Seyed Farhad Aghili and Hamid Mala

Abstract: The concept of the Industrial Internet of Things (IIoT) can be defined as the integration of smart sensor networks and the Internet of Things (IoT). This technology can be employed in various industries such as agriculture, food processing industry, environmental monitoring, security surveillance, and so on. Generally, a smart sensor is a resource-constrained device which is responsible for gathering data from the monitored area. Machine-to-Machine (M2M) communication is one of the most important technologies to exchange information between entities in industrial areas. However, due to the insecure wireless communication channel and the smart sensorís limitations, security and privacy concerns are the important challenges in IIoT environments. The goal of this paper is to address the security flaws of a recent M2M authentication protocol proposed for employing in IIoT including DoS, router impersonation and smart sensor traceability attacks. Moreover, we showed that an untrusted smart sensor can obtain the secret key of the router and the session key which another sensor establishes with the target router.

Category / Keywords: cryptographic protocols / M2M communications, IIoT, Authentication, DoS Attack, Traceability Attack, Impersonation attack, Disclosure Attack

Date: received 21 Sep 2018

Contact author: aghili farhad60 at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20180923:193553 (All versions of this report)

Short URL: ia.cr/2018/891


[ Cryptology ePrint archive ]