Research Article

SF-LAP: Secure M2M Communication in IIoT with a Single-Factor Lightweight Authentication Protocol

Table 1

Comparison of SF-LAP with other protocols.

Resilience against attacks[33][34][35][36][37][38]SF-LAP

Replay attack resilience
MITM attack resilience
Impersonation attack resilience
Modification attack resilience
Compromise attack resilience
Tracing attack resilience
Eavesdropping attack resilience
Session-key breach
Identity confidentiality resilience
Formal verification by AVISPA
Desynchronization attack resilience