Abstract
In todays world, Internet of Things (IoT), is an emerging technology, where many smart devices are connected with each other. The rapidly growing deployment of IoT in real-world applications and the advancement in technology has attracted the concept of Industrial Internet of Things (IIoTs). The large number of applications such as smart oil and gas industry, smart transportation, smart grid, smart health-care and smart metering are the few examples of the use of smart devices in IIoTs. These intelligent devices have the capabilities of sensing, actuating, storing, and processing of the data, and it causes challenge-able problems (e.g., communication security and reliability) in the network. In this book chapter, first we present the key benefits and challenges of the use of IoT technologies in today’s industries. Second, to address few of the identify challenges, we propose SCOUT, which is a secure machine to machine communication technique for IIoTs. In particular, SCOUT makes efficient use of the Routing Protocol for Low Power and Lossy Networks (RPL), the de facto routing protocol for IoT and an optimized remote software attestation algorithm to improve the communication security and scalability in large scale heterogeneous IIoT network scenarios. Finally, to show the deployment feasibility and working efficiency of SCOUT, we explain it with a real-world industrial use case.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sheng Z, Yang S, Yu Y, Vasilakos A, McCann J, Leung K (2013) A survey on the IETF protocol suite for the internet of things: standards, challenges, and opportunities. IEEE Wirel Commun 20:91–98
Abera T, Asokan N, Davi L, Koushanfar F, Paverd A, Sadeghi A-R, Tsudik G (2016) Invited things, trouble, trust: on building trust in IoT systems. In: 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), Austin, pp 1–6. https://doi.org/10.1145/2897937.2905020
Xu LD, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inf 10:2233–2243
Perera C, Liu CH, Jayawardena S (2015) The emerging internet of things marketplace from an industrial perspective: a survey. IEEE Trans Emerg Top Comput 3:585–598
Wollschlaeger M, Sauter T, Jasperneite J (2017) The future of industrial communication: automation networks in the era of the internet of things and industry 4.0. IEEE Ind Electron Mag 11:17–27
Wurm J, Hoang K, Arias O, Sadeghi AR, Jin Y (2016) Security analysis on consumer and industrial IoT devices. In: Proceedings of the 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pp 519–524
Esfahani A et al (2019) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J 6(1):288–296
Conti M, Kaliyar P, Lal C (2017) REMI: a reliable and secure multicast routing protocol for IoT networks. In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES’17). ACM, New York. Article 84, pp 8. https://doi.org/10.1145/3098954.3106070
Winter T, Thubert P, Brandt A, Hui J, Kelsey R, Levis P, Pister K, Struik R, Vasseur J, Alexander R (2012) RPL: IPv6 routing protocol for low-power and lossy networks (RFC 6550). https://tools.ietf.org/html/rfc6550.2012
Dvir A, Holczer T, Buttyan L (2011) VeRA – version number and rank authentication in RPL. 2011 In: IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp 709–714
Wallgren L, Raza S, Voigt T (2013) Routing attacks and countermeasures in the RPL-based internet of things. Int J Distrib Sensor Netw. http://dx.doi.org/10.1155/2013/794326.2013
Granjal J, Monteiro E, Sa Silva J (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17:1294–1312
Yang W, Wan Y, Wang Q (2017) Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial internet of things. IET Inf Secur 11:369–376
Karagiannis V, Chatzimisios P, Vázquez-Gallego F, Alonso-Zarate J (2015) A survey on application layer protocols for the internet of things. Trans IoT Cloud Comput 3:11–17
Conti M, Droms R, Hassan M, Lal C (2018) Fair-RTT-DAS: a robust and efficient dynamic adaptive streaming over ICN. Comput Commun. https://doi.org/10.1016/j.comcom.2018.07.033
Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutorials 17:2347–2376
Kushalnagar N, Montenegro G, Schumacher C (2007) IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals, (RFC 4919). https://tools.ietf.org/html/rfc4919.2007
Kim HS, Ko J, Culler DE, Paek J (2017) Challenging the IPv6 routing protocol for low-power and lossy networks (RPL): a survey. IEEE Commun Surv Tutorials 19:2502–2525
Shelby E, Zach S (2010) Chakrabarti and E. Nordmark.: Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) (RFC 6775). https://tools.ietf.org/html/rfc6775.2010
Conti M, Kaliyar P, Lal C (2017) REMI: a reliable and secure multicast routing protocol for IoT networks. In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES’17), pp 1–8
Meng W, Ma R, Chen HH (2014) Smart grid neighborhood area networks: a survey. IEEE Netw 28:24–32
Sabbah AI, El-Mougy A, Ibnkahla M (2014) A survey of networking challenges and routing protocols in smart grids. IEEE Trans Ind Inf 10:210–221
Wang D, Tao Z, Zhang J, Abouzeid AA (2010) RPL based routing for advanced metering infrastructure in smart grid. In: 2010 IEEE International Conference on Communications Workshops, pp 1–6
Ancillotti E, Bruno R, Conti M (2012) RPL routing protocol in advanced metering infrastructures: an analysis of the unreliability problems. In: 2012 Sustainable Internet and ICT for Sustainability, pp 1–10
Barki A, Bouabdallah A, Gharout S, Traore J M2M security: challenges and solutions. IEEE Commun Surv Tutorials 18(2):1241–1254, Secondquarter
Zhang Y, Guo Z, Lv J, Liu Y (2018) A framework for smart production-logistics systems based on CPS and industrial IoT. IEEE Trans Ind Inf 14:4019–4032
Kulkarni P, Gormus S, Fan Z, Motz B (2011) A self-organising mesh networking solution based on enhanced RPL for smart metering communications. In 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp 1–6
Ancillotti B, Bruno R, Conti M (2013) The role of the RPL routing protocol for smart grid communications. IEEE Commun Mag 51:75–83
https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/
Asokan N, Brasser F, Ibrahim A, Sadeghi A-R, Schunter M, Tsudik G, Wachsmann C (2015) SEDA: scalable embedded device attestation. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15), pp 964–975
Ambrosin M, Conti M, Ibrahim A, Neven G, Sadeghi A-R, Schunter M (2016) SANA: secure and scalable aggregate network attestation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS’16), pp 731–742
Ibrahim A, Sadeghi A-R, Tsudik G, Zeitouni S (2016) DARPA: device attestation resilient to physical attacks. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec’16), pp 171–182
Ambrosin M, Conti M, Lazzeretti R, Rabbani MdM, Ranise S (2018, in press) PADS: practical attestation for highly dynamic swarm topologies. In: Proceedings of the 7th International Workshop on Secure Internet of Things (ESORICS 2018 workshop: SIoT 2018), 3–7 Sept 2018, Barcelona
Eldefrawy K, Tsudik G, Francillon A, Perito D (2012) SMART: secure and minimal architecture for (establishing dynamic) root of trust. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS’12), pp 1–15
Brasser F, El Mahjoub B, Sadeghi A-R, Wachsmann C, Koeberl P (2015) TyTAN: tiny trust anchor for tiny devices. In: 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp 1–6
Levis P, Clausen T, Hui J, Gnawali O, Ko J (2011) The trickle algorithm (RFC 6206). https://tools.ietf.org/html/rfc6206.2011
Koeberl P, Schulz S, Sadeghi A-R, Varadharajan V (2014) TrustLite: a security architecture for tiny embedded devices. In: EuroSys’14, pp 1–10
Ambrosin M, Hosseini H, Mandal K, Conti M, Poovendran R (2016) Despicable me (ter): anonymous and fine-grained metering data reporting with dishonest meters. In: Proceedings of the 2016 IEEE Conference on Communications and Network Security, (CNS’16), pp 163–171
Illera AG, Vidal JV (2014) Lights off! The darkness of the smart meters. In: BlackHat Europe
Gungor VC, Sahin D, Kocak T, Ergut S, Buccella C, Cecati C, Hancke GP (2011) Smart grid technologies: communication technologies and standards. IEEE Trans Ind Inf 7:529–539
Zheng J, Gao DW, Lin L (2013) Smart meters in smart grid: an overview. In: IEEE Green Technologies Conference (GreenTech), pp 57–64
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Conti, M., Kaliyar, P., Lal, C. (2019). Secure Machine to Machine Communication in Industrial Internet of Things. In: Alcaraz, C. (eds) Security and Privacy Trends in the Industrial Internet of Things. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-12330-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-12330-7_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12329-1
Online ISBN: 978-3-030-12330-7
eBook Packages: Computer ScienceComputer Science (R0)