Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications

被引:7
作者
Astorga, Jasone [1 ]
Barcelo, Marc [2 ]
Urbieta, Aitor [2 ]
Jacob, Eduardo [1 ]
机构
[1] Univ Basque Country, UPV EHU, Fac Engn, Dept Commun Engn, Plaza Ingn Torres Quevedo 1, Bilbao 48013, Spain
[2] Basque Res & Technol Alliance BRTA, Ikerlan Technol Res Ctr, P JM Arizmendiarrieta 2, Arrasate Mondragon 20500, Spain
关键词
ABE; blockchain; DTLS; IIoT; PKI; X; 509; INTERNET; ENCRYPTION; SECURITY; IOT; ARCHITECTURE; QUANTUM; SCHEME;
D O I
10.3390/s22072561
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Digital certificates are regarded as the most secure and scalable way of implementing authentication services in the Internet today. They are used by most popular security protocols, including Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The lifecycle management of digital certificates relies on centralized Certification Authority (CA)-based Public Key Infrastructures (PKIs). However, the implementation of PKIs and certificate lifecycle management procedures in Industrial Internet of Things (IIoT) environments presents some challenges, mainly due to the high resource consumption that they imply and the lack of trust in the centralized CAs. This paper identifies and describes the main challenges to implement certificate-based public key cryptography in IIoT environments and it surveys the alternative approaches proposed so far in the literature to address these challenges. Most proposals rely on the introduction of a Trusted Third Party to aid the IIoT devices in tasks that exceed their capacity. The proposed alternatives are complementary and their application depends on the specific challenge to solve, the application scenario, and the capacities of the involved IIoT devices. This paper revisits all these alternatives in light of industrial communication models, identifying their strengths and weaknesses, and providing an in-depth comparative analysis.
引用
收藏
页数:38
相关论文
共 101 条
[1]   SCPKI: A Smart Contract-based PKI and Identity System [J].
Al-Bassam, Mustafa .
BCC '17: PROCEEDINGS OF THE ACM WORKSHOP ON BLOCKCHAIN, CRYPTOCURRENCIES AND CONTRACTS, 2017, :35-40
[2]  
Alden R., 2016, INCIDENT REPORT OCR
[3]   Comparison and Feasibility of Various RFID Authentication Methods Using ECC [J].
Alexander, Pagan, Jr. ;
Baashirah, Rania ;
Abuzneid, Abdelshakour .
SENSORS, 2018, 18 (09)
[4]   Hashed Needham Schroeder Industrial IoT based Cost Optimized Deep Secured data transmission in cloud [J].
Alzubi, Jafar A. ;
Manikandan, Ramachandran ;
Alzubi, Omar A. ;
Qiqieh, Issa ;
Rahim, Robbi ;
Gupta, Deepak ;
Khanna, Ashish .
MEASUREMENT, 2020, 150
[5]   Cryptosystem design based on Hermitian curves for IoT security [J].
Alzubi, Omar A. ;
Alzubi, Jafar A. ;
Dorgham, Osama ;
Alsayyed, Mohammad .
JOURNAL OF SUPERCOMPUTING, 2020, 76 (11) :8566-8589
[6]  
[Anonymous], 2016, ISO/IEC Standard 20922:2016
[7]  
[Anonymous], 2014, Blackcoin's proof-of-stake protocol v2
[8]  
[Anonymous], 1985, P WORKSH THEOR APPL
[9]  
[Anonymous], 2015, SUSTAINING DIGITAL C
[10]  
[Anonymous], 2020, OPC Unified Architecture