Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT

被引:10
作者
Al-Aqrabi, Hussain [1 ]
Johnson, Anju P. [2 ]
Hill, Richard [1 ]
Lane, Phil [1 ]
Alsboui, Tariq [1 ]
机构
[1] Univ Huddersfield, Sch Comp & Engn, Ctr Ind Analyt CIndA, Dept Comp Sci, Huddersfield HD1 3DH, W Yorkshire, England
[2] Univ Huddersfield, Sch Comp & Engn, Ctr Planning Auton & Representat Knowledge PARK, Dept Engn & Technol, Huddersfield HD1 3DH, W Yorkshire, England
关键词
Internet of Things; cloud computing; hardware security; field programmable gate array (FPGA); 5G; analytics; PLASTICITY; INTERNET; PRIVACY;
D O I
10.3390/s20071963
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The introduction of 5G communication capabilities presents additional challenges for the development of products and services that can fully exploit the opportunities offered by high bandwidth, low latency networking. This is particularly relevant to an emerging interest in the Industrial Internet of Things (IIoT), which is a foundation stone of recent technological revolutions such as Digital Manufacturing. A crucial aspect of this is to securely authenticate complex transactions between IIoT devices, whilst marshalling adversarial requests for system authorisation, without the need for a centralised authentication mechanism which cannot scale to the size needed. In this article we combine Physically Unclonable Function (PUF) hardware (using Field Programmable Gate Arrays-FPGAs), together with a multi-layer approach to cloud computing from the National Institute of Standards and Technology (NIST). Through this, we demonstrate an approach to facilitate the development of improved multi-layer authentication mechanisms. We extend prior work to utilise hardware security primitives for adversarial trojan detection, which is inspired by a biological approach to parameter analysis. This approach is an effective demonstration of attack prevention, both from internal and external adversaries. The security is further hardened through observation of the device parameters of connected IIoT equipment. We demonstrate that the proposed architecture can service a significantly high load of device authentication requests using a multi-layer architecture in an arbitrarily acceptable time of less than 1 second.
引用
收藏
页数:19
相关论文
共 44 条
[1]  
Al-Aqrabi H., 2019, INT C SMART CITY INF, V7, P279
[2]   Dynamic Multiparty Authentication of Data Analytics Services within Cloud Environments [J].
Al-Aqrabi, Hussain ;
Hill, Richard .
IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2018, :742-749
[3]   A Multi-layer Hierarchical Inter-Cloud Connectivity Model for Sequential Packet Inspection of Tenant Sessions Accessing BI as a Service [J].
Al-Aqrabi, Hussain ;
Liu, Lu ;
Hill, Richard ;
Antonopoulos, Nick .
2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, :498-505
[4]  
AlAqrabi H, 2019, P 4 INT C INF COMM T, P267
[5]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[6]  
Alsboui T, 2020, COMPUT SPRINGER WIEN, V1, P28
[7]   Enabling Distributed Intelligence in the Internet of Things using the IOTA Tangle Architecture [J].
Alsboui, Tariq ;
Qin, Yongrui ;
Hill, Richard .
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS 2019), 2019, :392-398
[8]  
Anju P, 2020, SENSORS, V20, P844
[9]  
[Anonymous], P ACM SIGDA INT S FI
[10]  
Badger L, 2011, RELEASE, V1, P500