Abstract

The benefit of a smart manufacturing Industrial Internet of Things (IIoT) platform is that it can provide real-time monitoring, accurate analysis, and reporting for equipment by collecting data throughout the whole manufacturing facility. However, the increased internet connectivity of manufacturing machines or devices leads to various security vulnerabilities. In order to securely operate smart manufacturing IIoT systems in unmanned environments, it is necessary to establish a cryptographic key for protecting exchanged data between IIoT devices and stored data in the devices by using cryptographic algorithms. Especially, since the IIoT system is in an unmanned environment, the following two challenges must be solved: 1) The IIoT device must recover its own secret key without user interaction. 2) The IIoT device must prevent secret key recovery when anomaly situations such as unauthorized physical access occur. In this paper, we present a novel method to protect an IIoT device’s secret key in unmanned smart manufacturing environments, called Two-Factor Device DNA-based Fuzzy Vault scheme. To satisfy the two challenges, our proposed method generates a specific two-factor device DNA through the combination of the IIoT device’s intrinsic factor and its surrounding environments and then creates a vault set to conceal the secret key based on the two-factor device DNA. We also implement a prototype for ensuring the feasibility of our method by utilizing an EPUF and IEEE 802.15.4g receiver in a Raspberry Pi and a laptop, respectively, and then measure their performance. We then conduct experiments in an unmanned environment at the Smart Manufacturing Learning Center at Hanyang University by considering various normal and abnormal situations. Our experiment results show that the proposed method quickly extracts the secret key stored in the device in normal cases, but fails at key extraction in abnormal cases.

Highlights

  • T HE rapid growth of Internet of Things (IoT) has caused it to spread to the industrial sector, creating the Industrial Internet of Things (IIoT), which connects machines, advanced analytical technologies, and workers

  • We assume that a legitimate IIoT device applied the two-factor device DNA based fuzzy vault scheme to protect a secret key for performing cryptographic operations such as encryption/decryption

  • PROTOCOL DESIGN we present the details of our design for generating two-factor device DNA and Fuzzy Vault for protecting secret keys in IIoT devices

Read more

Summary

INTRODUCTION

T HE rapid growth of Internet of Things (IoT) has caused it to spread to the industrial sector, creating the Industrial Internet of Things (IIoT), which connects machines, advanced analytical technologies, and workers. Increased device connectivity and more aggregation of data in IIoT can lead to increased security vulnerabilities. This is the reason why the Telecommunication Standardization Sector of ITU (International Telecommunication Union), ITU-T [1] requires that smart manufacturing systems protect production facilities, communication networks and data from misuse and unauthorized access. We are focusing on the third, data protection Cryptographic techniques such as VOLUME 4, 2016. The most critical thing in using cryptography for securing data is to protect cryptographic keys stored in IIoT devices. The smart manufacturing system operating in an unmanned environment must take measures to protect the IIoT device’s secret key in preparation for the case when unauthorized physical access occurs

MOTIVATION AND CHALLENGES
RELATED WORKS
PROTOCOL DESIGN
SECURITY OF FUZZY VAULT
SYSTEM PERFORMANCE
C9 D6 81 B5 C4 8A 9C 6F 9B A4 AE D1 B3 8C 74 CB 69
DISCUSSION AND LIMITATION
Findings
VIII. CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.