Research Article
SF-LAP: Secure M2M Communication in IIoT with a Single-Factor Lightweight Authentication Protocol
Table 1
Comparison of SF-LAP with other protocols.
| Resilience against attacks | [33] | [34] | [35] | [36] | [37] | [38] | SF-LAP |
| Replay attack resilience | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | MITM attack resilience | ✓ | ✓ | ✗ | ✓ | ✓ | ✓ | ✓ | Impersonation attack resilience | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | Modification attack resilience | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | Compromise attack resilience | ✗ | ✗ | ✗ | ✓ | ✗ | ✓ | ✓ | Tracing attack resilience | ✗ | ✗ | ✗ | ✓ | ✗ | ✓ | ✓ | Eavesdropping attack resilience | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✓ | Session-key breach | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Identity confidentiality resilience | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | Formal verification by AVISPA | ✓ | ✗ | ✓ | ✓ | ✗ | ✓ | ✓ | Desynchronization attack resilience | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ |
|
|