Sie sind auf Seite 1von 4

Lightweight Authentication Protocol for M2M

Communications of Resource-Constrained Devices in


Industrial Internet of Things

Question # 1:
From the abstract of the paper identify the main issue and its solution.
Answer:
An abstract is a short summary of a research or long report. It provides the
basic aims and outcomes of the report, helps reader to understand
regarding the complete paper. The main issue of the abstract of the paper
“Lightweight authentication protocol for M2M Communications of Resource-
constrained devices in Industrial internet of things” does not provides
concise summary of the paper rather an introduction of the paper.
Summary provides the first impression, the most important one sharing the
potential value or relevance of the research results. Abstract must focuses
on the basic overview of the paper rather than defining as in the abstract of
the paper it shares definition of authentication. Moreover, the abstract
should be precise and be specific to the content.
The solution is quite bit simple. Abstract should be precise and relevant to
the content. It should attract the attention of the reader as a complete
manuscript. The main concern lies in the initial part of the abstract. It
should summarize the whole research paper rather than focusing on
introduction, methodology, results or conclusion specifically.

Question # 2:
a) The properties of Class 0 devices in the classification of the RFC 7288
Answer:
The following are the properties of Class 0 devices of RFC 7288:
i. No utilization of public key encryption
ii. No encryption algorithms are used
iii. Its replacement relies on simple operations as XOR, hash
functions, addition, subtraction etc.
iv. According to study in the report, devices follow category 0
accounts more than 29% of the devices based on internet on
everything in the market.

b) What are AVISPA tool and Burrows–Abadi–Needham (BAN) logic?


Answer:
AVISPA (Automated Validation of Internet Security Protocols and
application) tool and Burrows-abadi Needham logic are used for
analysing the completion process of mutual authentication. They are also

1
used for checking the resistance to know attacks, used to evaluate
security of different protocols.

c) What are the RESTful services?


Answer:
RESTful services are a set of restrictions used for creating web
services. An individual can perform predefined operations using the
restful services.

d) Explain the purpose of each element of the authentication message


M1 = {T1, AID, D1, D2} in section 4.2.
Answer:
Elements of the authentication message are:
- T1 is the timestamp
- AID is the pseudonym of the sensor node
- D1 represents the computations of h(AID||b1||T1) ⊕ r1 and
- D2 represents h(r1||T1||b0).

e) How confidentiality and integrity are obtained in the proposed


method?
Answer:
Confidentiality
Keeping all information secret by transmitting sensor node using XOR
encryption. It can be escaped with the help of one-way hash functions
with the values of r2 along with r1 making the secret of the relationship.
KP (idx), b1 and b0 are used in making long-term encryption while
making message dependent on the current scenario, making it
unpredictable and unique between sessions and create a session key
(SK). It will not allow the opponents to figure out secrets shared in the
messages along with the hash function.
Integrity
The following describes what happens if the message changes during
transmission. In all of these cases, the recipient can detect a violation of
data integrity. Therefore, it interrupts communication.
 In the case of modifications D1, AID or T1, the check of the total value
D2 = h (r1 || T1 || b0) will not be determined, since it is created by the
gateway with r1, T1 obtained from D1 and based on the value AID Select
b0. Even changing only one of D1, AID or T1 will cause r1 to be different
from the originally sent r1, which will cause D2 to be checked as false.
Moreover, the adversary cannot effectively hide the D2 modification,

2
which is impossible because his design uses b0, which is the secret
between the node AID sensor and the gateway.
 If D3 or D4, or T2 is modified, a check of the general value D5 = h (idx ||
r2 || b0 || r1) will not be determined, since it is created using r2 and
idx from which the gateway tries to extract D4 as well as D3. As for T2, it
is used in D3. Therefore, its change will also affect r2. Even if only one of
D3 or D4, or T2is changed, the r2 and idx values sent by the gateway will
be different, which will lead to false authentication of D5. Moreover, the
adversary cannot create an effective D5 because he uses b0.
 In the case of D6 or T3 modifications, checking the value of the sum D6 =
h (b1 || r1 || T3 || r2 || KP (idx)) will be false, because it is made of T3.
It also uses KP (idx), which is the KP key selected by the gateway from
the gateway using idx in D4. The opponent cannot build a valid D6
because he does not know the key.
 For D7 or T4 modifications, since D7 depends on KP (idx) and T4, a
situation similar to that described above occurs.

f) Why and how Forward and Backward Secrecy are achieved in the
proposed method?
Answer:
Forward Secrecy (also known as perfect secrecy) is a feature which gives
assurance that session keys will not be compromised even if the private
keys on the server is compromised. It can be achieved by configuring
server to select most desirable suite from the list offered by SSL client.
Backward secrecy ensures whenever a new user joins the group, he will
not get any access to the previous details.

g) How the replay attack is prevented in this protocol?


Answer:
To carry out such an attack, the adversary intercepts the correct message
and maliciously puts it off or repeats it in order to falsify its property. The
LAKD protocol responds to this attack in two ways. The first is to use a
timestamp to check for transmission delay. The delay in sending
messages from an old conversation will be more than acceptable. This
will be detected by the gateway in D2 and the sensor node in D5.
Therefore, the recipient does not receive the message and stops
communicating. The second form of resistance to this attack is the use of
temporary random numbers r1 and r2 for each session and the use of
different keys KP (idx). If the old message is repeated by the adversary
from the gateway, the sensor node detects in D5 = h (idx || r2 || b0 ||
r1) that r1 is not the message that it sent to M1. Similarly, if a message is
played from the sensor node, the gateway detects that R2 is not a
message that it sent to M2 with D6 = h (bl || r1 || T3 || r2 || KP (idx)),

3
A KP ( idx)) is not the one he chooses. Therefore, the LAKD protocol can
be based on repeated attacks.

Question # 3:
Summarize the performance analysis of the protocol in your own words.
Answer:
The security projects implementation time and communication cost are
high. However, the touch node is most limited device. In case 1, execution
time has reduced by 63% and in case 2 by 99.69%. In addition, the number
of transmitted bits has reduced by 71.43%. These savings carries great
importance for devices with limited resources. These devices share limited
information by Internet applications, networks or security services.

Question # 4:
Discuss the advantages and the disadvantages of the proposed
authentication method.
Answer:
The following are the advantages of proposed authentication method:
i. Lower computational cost
ii. Lightweight exceptional operations
iii. Providing addition, subtraction and functions of mixing
iv. Better communication costs and delivery in-time
v. Resistant to different attacks
vi. High security services protect data privacy and industry secrets
(spam, data leakage, MITM attacks)

Following are the disadvantages of proposed authentication method:


i. No strong identity check
ii. No mutual authentication history
iii. Permanent secure channel between device and authority needed.

Das könnte Ihnen auch gefallen