Research Article

SF-LAP: Secure M2M Communication in IIoT with a Single-Factor Lightweight Authentication Protocol

Table 2

SF-LAP VS. SLAP Protocol.

SF-LAPSLAP

It provides a clear use-case in 3 stepsDoes not provide the use-case diagram
Provides security against eavesdropping attacksDoes not provide resilience against eavesdropping attacks
Provides security against replay attacksDoes not resist replay attack
Provides security against impersonation attacksDoes not resist impersonation attack
Provides security against desynchronization attacksDoes not resist desynchronization attack
Timestamps both the and simultaneouslyDoes not provide this phenomenon
Communicates between and via serverThere is no medium other than the sensor and controller
Provides the facility of timestamp through the server clockNot provide the facility of this type of a timestamp
Provides pseudocode of our procedureDoes not provide any pseudocode
A special nonce function is used which provides the random number only for one time and then it never uses the same random number again in its communicationThere is a simple random number is used in communication that is vulnerable for replay attack