Skip to main content

Secure Machine to Machine Communication in Industrial Internet of Things

  • Chapter
  • First Online:
Security and Privacy Trends in the Industrial Internet of Things

Abstract

In todays world, Internet of Things (IoT), is an emerging technology, where many smart devices are connected with each other. The rapidly growing deployment of IoT in real-world applications and the advancement in technology has attracted the concept of Industrial Internet of Things (IIoTs). The large number of applications such as smart oil and gas industry, smart transportation, smart grid, smart health-care and smart metering are the few examples of the use of smart devices in IIoTs. These intelligent devices have the capabilities of sensing, actuating, storing, and processing of the data, and it causes challenge-able problems (e.g., communication security and reliability) in the network. In this book chapter, first we present the key benefits and challenges of the use of IoT technologies in today’s industries. Second, to address few of the identify challenges, we propose SCOUT, which is a secure machine to machine communication technique for IIoTs. In particular, SCOUT makes efficient use of the Routing Protocol for Low Power and Lossy Networks (RPL), the de facto routing protocol for IoT and an optimized remote software attestation algorithm to improve the communication security and scalability in large scale heterogeneous IIoT network scenarios. Finally, to show the deployment feasibility and working efficiency of SCOUT, we explain it with a real-world industrial use case.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sheng Z, Yang S, Yu Y, Vasilakos A, McCann J, Leung K (2013) A survey on the IETF protocol suite for the internet of things: standards, challenges, and opportunities. IEEE Wirel Commun 20:91–98

    Article  Google Scholar 

  2. Abera T, Asokan N, Davi L, Koushanfar F, Paverd A, Sadeghi A-R, Tsudik G (2016) Invited things, trouble, trust: on building trust in IoT systems. In: 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), Austin, pp 1–6. https://doi.org/10.1145/2897937.2905020

  3. Xu LD, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inf 10:2233–2243

    Article  Google Scholar 

  4. Perera C, Liu CH, Jayawardena S (2015) The emerging internet of things marketplace from an industrial perspective: a survey. IEEE Trans Emerg Top Comput 3:585–598

    Article  Google Scholar 

  5. Wollschlaeger M, Sauter T, Jasperneite J (2017) The future of industrial communication: automation networks in the era of the internet of things and industry 4.0. IEEE Ind Electron Mag 11:17–27

    Article  Google Scholar 

  6. Wurm J, Hoang K, Arias O, Sadeghi AR, Jin Y (2016) Security analysis on consumer and industrial IoT devices. In: Proceedings of the 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pp 519–524

    Google Scholar 

  7. Esfahani A et al (2019) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J 6(1):288–296

    Article  Google Scholar 

  8. Conti M, Kaliyar P, Lal C (2017) REMI: a reliable and secure multicast routing protocol for IoT networks. In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES’17). ACM, New York. Article 84, pp 8. https://doi.org/10.1145/3098954.3106070

  9. Winter T, Thubert P, Brandt A, Hui J, Kelsey R, Levis P, Pister K, Struik R, Vasseur J, Alexander R (2012) RPL: IPv6 routing protocol for low-power and lossy networks (RFC 6550). https://tools.ietf.org/html/rfc6550.2012

  10. Dvir A, Holczer T, Buttyan L (2011) VeRA – version number and rank authentication in RPL. 2011 In: IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp 709–714

    Google Scholar 

  11. Wallgren L, Raza S, Voigt T (2013) Routing attacks and countermeasures in the RPL-based internet of things. Int J Distrib Sensor Netw. http://dx.doi.org/10.1155/2013/794326.2013

  12. Granjal J, Monteiro E, Sa Silva J (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17:1294–1312

    Article  Google Scholar 

  13. Yang W, Wan Y, Wang Q (2017) Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial internet of things. IET Inf Secur 11:369–376

    Article  Google Scholar 

  14. Karagiannis V, Chatzimisios P, Vázquez-Gallego F, Alonso-Zarate J (2015) A survey on application layer protocols for the internet of things. Trans IoT Cloud Comput 3:11–17

    Google Scholar 

  15. Conti M, Droms R, Hassan M, Lal C (2018) Fair-RTT-DAS: a robust and efficient dynamic adaptive streaming over ICN. Comput Commun. https://doi.org/10.1016/j.comcom.2018.07.033

    Article  Google Scholar 

  16. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutorials 17:2347–2376

    Article  Google Scholar 

  17. Kushalnagar N, Montenegro G, Schumacher C (2007) IPv6 over low-power wireless personal area networks (6LoWPANs): overview, assumptions, problem statement, and goals, (RFC 4919). https://tools.ietf.org/html/rfc4919.2007

  18. Kim HS, Ko J, Culler DE, Paek J (2017) Challenging the IPv6 routing protocol for low-power and lossy networks (RPL): a survey. IEEE Commun Surv Tutorials 19:2502–2525

    Article  Google Scholar 

  19. Shelby E, Zach S (2010) Chakrabarti and E. Nordmark.: Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) (RFC 6775). https://tools.ietf.org/html/rfc6775.2010

  20. Conti M, Kaliyar P, Lal C (2017) REMI: a reliable and secure multicast routing protocol for IoT networks. In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES’17), pp 1–8

    Google Scholar 

  21. Meng W, Ma R, Chen HH (2014) Smart grid neighborhood area networks: a survey. IEEE Netw 28:24–32

    Article  Google Scholar 

  22. Sabbah AI, El-Mougy A, Ibnkahla M (2014) A survey of networking challenges and routing protocols in smart grids. IEEE Trans Ind Inf 10:210–221

    Article  Google Scholar 

  23. Wang D, Tao Z, Zhang J, Abouzeid AA (2010) RPL based routing for advanced metering infrastructure in smart grid. In: 2010 IEEE International Conference on Communications Workshops, pp 1–6

    Google Scholar 

  24. Ancillotti E, Bruno R, Conti M (2012) RPL routing protocol in advanced metering infrastructures: an analysis of the unreliability problems. In: 2012 Sustainable Internet and ICT for Sustainability, pp 1–10

    Google Scholar 

  25. Barki A, Bouabdallah A, Gharout S, Traore J M2M security: challenges and solutions. IEEE Commun Surv Tutorials 18(2):1241–1254, Secondquarter

    Google Scholar 

  26. Zhang Y, Guo Z, Lv J, Liu Y (2018) A framework for smart production-logistics systems based on CPS and industrial IoT. IEEE Trans Ind Inf 14:4019–4032

    Article  Google Scholar 

  27. Kulkarni P, Gormus S, Fan Z, Motz B (2011) A self-organising mesh networking solution based on enhanced RPL for smart metering communications. In 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp 1–6

    Google Scholar 

  28. Ancillotti B, Bruno R, Conti M (2013) The role of the RPL routing protocol for smart grid communications. IEEE Commun Mag 51:75–83

    Article  Google Scholar 

  29. https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/

  30. Asokan N, Brasser F, Ibrahim A, Sadeghi A-R, Schunter M, Tsudik G, Wachsmann C (2015) SEDA: scalable embedded device attestation. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15), pp 964–975

    Google Scholar 

  31. Ambrosin M, Conti M, Ibrahim A, Neven G, Sadeghi A-R, Schunter M (2016) SANA: secure and scalable aggregate network attestation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS’16), pp 731–742

    Google Scholar 

  32. Ibrahim A, Sadeghi A-R, Tsudik G, Zeitouni S (2016) DARPA: device attestation resilient to physical attacks. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec’16), pp 171–182

    Google Scholar 

  33. Ambrosin M, Conti M, Lazzeretti R, Rabbani MdM, Ranise S (2018, in press) PADS: practical attestation for highly dynamic swarm topologies. In: Proceedings of the 7th International Workshop on Secure Internet of Things (ESORICS 2018 workshop: SIoT 2018), 3–7 Sept 2018, Barcelona

    Google Scholar 

  34. Eldefrawy K, Tsudik G, Francillon A, Perito D (2012) SMART: secure and minimal architecture for (establishing dynamic) root of trust. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS’12), pp 1–15

    Google Scholar 

  35. Brasser F, El Mahjoub B, Sadeghi A-R, Wachsmann C, Koeberl P (2015) TyTAN: tiny trust anchor for tiny devices. In: 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp 1–6

    Google Scholar 

  36. Levis P, Clausen T, Hui J, Gnawali O, Ko J (2011) The trickle algorithm (RFC 6206). https://tools.ietf.org/html/rfc6206.2011

  37. Koeberl P, Schulz S, Sadeghi A-R, Varadharajan V (2014) TrustLite: a security architecture for tiny embedded devices. In: EuroSys’14, pp 1–10

    Google Scholar 

  38. Ambrosin M, Hosseini H, Mandal K, Conti M, Poovendran R (2016) Despicable me (ter): anonymous and fine-grained metering data reporting with dishonest meters. In: Proceedings of the 2016 IEEE Conference on Communications and Network Security, (CNS’16), pp 163–171

    Google Scholar 

  39. Illera AG, Vidal JV (2014) Lights off! The darkness of the smart meters. In: BlackHat Europe

    Google Scholar 

  40. Gungor VC, Sahin D, Kocak T, Ergut S, Buccella C, Cecati C, Hancke GP (2011) Smart grid technologies: communication technologies and standards. IEEE Trans Ind Inf 7:529–539

    Article  Google Scholar 

  41. Zheng J, Gao DW, Lin L (2013) Smart meters in smart grid: an overview. In: IEEE Green Technologies Conference (GreenTech), pp 57–64

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Conti, M., Kaliyar, P., Lal, C. (2019). Secure Machine to Machine Communication in Industrial Internet of Things. In: Alcaraz, C. (eds) Security and Privacy Trends in the Industrial Internet of Things. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-12330-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-12330-7_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-12329-1

  • Online ISBN: 978-3-030-12330-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics