Abstract
In this paper, we consider the NB-Fi protocol that provides secure communication between IoT devices and control servers. It is shown that the version of the protocol proposed in the draft national standard of the Russian Federation does not provide confidentiality and data integrity in the considered adversary model. A variant of the protocol modification that provides these properties is proposed.







Similar content being viewed by others
REFERENCES
Predvaritel’nyi natsional’nyi standart Rossiiskoi Federatsii. Informatsionnaya tekhnologiya. Internet veshchei. Protokol besprovodnoi peredachi dannykh na osnove uzkopolosnoi modulyatsii radiosignala (NB-Fi) (Preliminary National Standard of the Russian Federation. Information Technology. Internet of Things. Protocol of Wireless Data Transmission Based on Narrow-Band Modulation of Radio Signal (NB-Fi)), Moscow: Standartinform, 2019.
NB-Fi is the first Russian standard of IoT. RSpectr. https://www.rspectr.com/articles/486/nb-fi-pervyj-otechestvennyj-standart-iot. Cited March 16, 2020.
Vaudenay, S., Security flaws induced by CBC padding—Applications to SSL, IPSEC, WTLS, Advances in Cryptology—EUROCRYPT 2002, Knudsen, L.R., Ed., Lecture Notes in Computer Science, vol. 2332, Berlin: Springer, 2002, pp. 534–545.
Bard, G.V., The vulnerability of SSL to chosen plaintext attack, in IACR Cryptol. ePprint Arch., Rep. 2004/111, 2004.
Nozdrunov, V.I., On project of national standard “Protocol of IoT for the interchanging data in narrowband spectrum (NB-Fi)” (brief cryptanalysis), Short talk on CTCrypt, 2018. https://ctcrypt.ru/files/ files/2018/Rump/R02_Nozdrunov.pdf. Cited March 16, 2020.
R 50.1.113–2016: Information Technology. Cryptographic Data Security. Cryptographic Algorithms to Accompany the Usage of Digital Signature and Hash Function Algorithms, 2016.
R 1323565.1.026–2019: Information Technology. Cryptographic Data Security. Authenticated Encryption Block Cipher Operation Modes, 2019.
Bellare, M. and Namprempre, C., Authenticated encryption: relations among notions and analysis of the generic composition paradigm, Advance in Cryptology – ASIACRYPT 2000, Okamoto, T., Ed., Lecture Notes in Computer Science, vol. 1976, Berlin: Springer, 2000, pp. 531–545. https://doi.org/10.1007/3-540-44448-3_41
Boyd, C., Hale, B., Mjølsnes, S., and Stebila, D., From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS, Topics in Cryptology—CT-RSA 2016, Sako, K., Ed., Lecture Notes in Computer Science, vol. 9610, Cham: Springer, 2016, pp. 55–71. https://doi.org/10.1007/978-3-319-29485-8_4
Alekseev, E.K., Oshkin, I.B., Popov, V.O., and Smyshlyaev, S.V., On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11–2012 and GOST R 34.10–2012, Mat. Vopr. Kriptogr., 2016, vol. 7, no. 1, pp. 5–38. https://doi.org/10.4213/mvk172
ACKNOWLEDGMENTS
The results described in the work were obtained in close cooperation with the specialists of the WAVIoT company.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by A. Ivanov
About this article
Cite this article
Alekseev, E.K., Akhmetzyanova, L.R., Nikolaev, V.D. et al. On Cryptographic Properties of the NB-Fi Protocol. Aut. Control Comp. Sci. 55, 1180–1187 (2021). https://doi.org/10.3103/S0146411621080344
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411621080344