Cargando…

Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT

The introduction of 5G communication capabilities presents additional challenges for the development of products and services that can fully exploit the opportunities offered by high bandwidth, low latency networking. This is particularly relevant to an emerging interest in the Industrial Internet o...

Descripción completa

Detalles Bibliográficos
Autores principales: Al-Aqrabi, Hussain, Johnson, Anju P., Hill, Richard, Lane, Phil, Alsboui, Tariq
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7180754/
https://www.ncbi.nlm.nih.gov/pubmed/32244458
http://dx.doi.org/10.3390/s20071963
_version_ 1783525892123787264
author Al-Aqrabi, Hussain
Johnson, Anju P.
Hill, Richard
Lane, Phil
Alsboui, Tariq
author_facet Al-Aqrabi, Hussain
Johnson, Anju P.
Hill, Richard
Lane, Phil
Alsboui, Tariq
author_sort Al-Aqrabi, Hussain
collection PubMed
description The introduction of 5G communication capabilities presents additional challenges for the development of products and services that can fully exploit the opportunities offered by high bandwidth, low latency networking. This is particularly relevant to an emerging interest in the Industrial Internet of Things (IIoT), which is a foundation stone of recent technological revolutions such as Digital Manufacturing. A crucial aspect of this is to securely authenticate complex transactions between IIoT devices, whilst marshalling adversarial requests for system authorisation, without the need for a centralised authentication mechanism which cannot scale to the size needed. In this article we combine Physically Unclonable Function (PUF) hardware (using Field Programmable Gate Arrays—FPGAs), together with a multi-layer approach to cloud computing from the National Institute of Standards and Technology (NIST). Through this, we demonstrate an approach to facilitate the development of improved multi-layer authentication mechanisms. We extend prior work to utilise hardware security primitives for adversarial trojan detection, which is inspired by a biological approach to parameter analysis. This approach is an effective demonstration of attack prevention, both from internal and external adversaries. The security is further hardened through observation of the device parameters of connected IIoT equipment. We demonstrate that the proposed architecture can service a significantly high load of device authentication requests using a multi-layer architecture in an arbitrarily acceptable time of less than 1 second.
format Online
Article
Text
id pubmed-7180754
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-71807542020-05-01 Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT Al-Aqrabi, Hussain Johnson, Anju P. Hill, Richard Lane, Phil Alsboui, Tariq Sensors (Basel) Article The introduction of 5G communication capabilities presents additional challenges for the development of products and services that can fully exploit the opportunities offered by high bandwidth, low latency networking. This is particularly relevant to an emerging interest in the Industrial Internet of Things (IIoT), which is a foundation stone of recent technological revolutions such as Digital Manufacturing. A crucial aspect of this is to securely authenticate complex transactions between IIoT devices, whilst marshalling adversarial requests for system authorisation, without the need for a centralised authentication mechanism which cannot scale to the size needed. In this article we combine Physically Unclonable Function (PUF) hardware (using Field Programmable Gate Arrays—FPGAs), together with a multi-layer approach to cloud computing from the National Institute of Standards and Technology (NIST). Through this, we demonstrate an approach to facilitate the development of improved multi-layer authentication mechanisms. We extend prior work to utilise hardware security primitives for adversarial trojan detection, which is inspired by a biological approach to parameter analysis. This approach is an effective demonstration of attack prevention, both from internal and external adversaries. The security is further hardened through observation of the device parameters of connected IIoT equipment. We demonstrate that the proposed architecture can service a significantly high load of device authentication requests using a multi-layer architecture in an arbitrarily acceptable time of less than 1 second. MDPI 2020-03-31 /pmc/articles/PMC7180754/ /pubmed/32244458 http://dx.doi.org/10.3390/s20071963 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Al-Aqrabi, Hussain
Johnson, Anju P.
Hill, Richard
Lane, Phil
Alsboui, Tariq
Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT
title Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT
title_full Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT
title_fullStr Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT
title_full_unstemmed Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT
title_short Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT
title_sort hardware-intrinsic multi-layer security: a new frontier for 5g enabled iiot
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7180754/
https://www.ncbi.nlm.nih.gov/pubmed/32244458
http://dx.doi.org/10.3390/s20071963
work_keys_str_mv AT alaqrabihussain hardwareintrinsicmultilayersecurityanewfrontierfor5genablediiot
AT johnsonanjup hardwareintrinsicmultilayersecurityanewfrontierfor5genablediiot
AT hillrichard hardwareintrinsicmultilayersecurityanewfrontierfor5genablediiot
AT lanephil hardwareintrinsicmultilayersecurityanewfrontierfor5genablediiot
AT alsbouitariq hardwareintrinsicmultilayersecurityanewfrontierfor5genablediiot