Cargando…
Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT
The introduction of 5G communication capabilities presents additional challenges for the development of products and services that can fully exploit the opportunities offered by high bandwidth, low latency networking. This is particularly relevant to an emerging interest in the Industrial Internet o...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7180754/ https://www.ncbi.nlm.nih.gov/pubmed/32244458 http://dx.doi.org/10.3390/s20071963 |
_version_ | 1783525892123787264 |
---|---|
author | Al-Aqrabi, Hussain Johnson, Anju P. Hill, Richard Lane, Phil Alsboui, Tariq |
author_facet | Al-Aqrabi, Hussain Johnson, Anju P. Hill, Richard Lane, Phil Alsboui, Tariq |
author_sort | Al-Aqrabi, Hussain |
collection | PubMed |
description | The introduction of 5G communication capabilities presents additional challenges for the development of products and services that can fully exploit the opportunities offered by high bandwidth, low latency networking. This is particularly relevant to an emerging interest in the Industrial Internet of Things (IIoT), which is a foundation stone of recent technological revolutions such as Digital Manufacturing. A crucial aspect of this is to securely authenticate complex transactions between IIoT devices, whilst marshalling adversarial requests for system authorisation, without the need for a centralised authentication mechanism which cannot scale to the size needed. In this article we combine Physically Unclonable Function (PUF) hardware (using Field Programmable Gate Arrays—FPGAs), together with a multi-layer approach to cloud computing from the National Institute of Standards and Technology (NIST). Through this, we demonstrate an approach to facilitate the development of improved multi-layer authentication mechanisms. We extend prior work to utilise hardware security primitives for adversarial trojan detection, which is inspired by a biological approach to parameter analysis. This approach is an effective demonstration of attack prevention, both from internal and external adversaries. The security is further hardened through observation of the device parameters of connected IIoT equipment. We demonstrate that the proposed architecture can service a significantly high load of device authentication requests using a multi-layer architecture in an arbitrarily acceptable time of less than 1 second. |
format | Online Article Text |
id | pubmed-7180754 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-71807542020-05-01 Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT Al-Aqrabi, Hussain Johnson, Anju P. Hill, Richard Lane, Phil Alsboui, Tariq Sensors (Basel) Article The introduction of 5G communication capabilities presents additional challenges for the development of products and services that can fully exploit the opportunities offered by high bandwidth, low latency networking. This is particularly relevant to an emerging interest in the Industrial Internet of Things (IIoT), which is a foundation stone of recent technological revolutions such as Digital Manufacturing. A crucial aspect of this is to securely authenticate complex transactions between IIoT devices, whilst marshalling adversarial requests for system authorisation, without the need for a centralised authentication mechanism which cannot scale to the size needed. In this article we combine Physically Unclonable Function (PUF) hardware (using Field Programmable Gate Arrays—FPGAs), together with a multi-layer approach to cloud computing from the National Institute of Standards and Technology (NIST). Through this, we demonstrate an approach to facilitate the development of improved multi-layer authentication mechanisms. We extend prior work to utilise hardware security primitives for adversarial trojan detection, which is inspired by a biological approach to parameter analysis. This approach is an effective demonstration of attack prevention, both from internal and external adversaries. The security is further hardened through observation of the device parameters of connected IIoT equipment. We demonstrate that the proposed architecture can service a significantly high load of device authentication requests using a multi-layer architecture in an arbitrarily acceptable time of less than 1 second. MDPI 2020-03-31 /pmc/articles/PMC7180754/ /pubmed/32244458 http://dx.doi.org/10.3390/s20071963 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Al-Aqrabi, Hussain Johnson, Anju P. Hill, Richard Lane, Phil Alsboui, Tariq Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT |
title | Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT |
title_full | Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT |
title_fullStr | Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT |
title_full_unstemmed | Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT |
title_short | Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT |
title_sort | hardware-intrinsic multi-layer security: a new frontier for 5g enabled iiot |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7180754/ https://www.ncbi.nlm.nih.gov/pubmed/32244458 http://dx.doi.org/10.3390/s20071963 |
work_keys_str_mv | AT alaqrabihussain hardwareintrinsicmultilayersecurityanewfrontierfor5genablediiot AT johnsonanjup hardwareintrinsicmultilayersecurityanewfrontierfor5genablediiot AT hillrichard hardwareintrinsicmultilayersecurityanewfrontierfor5genablediiot AT lanephil hardwareintrinsicmultilayersecurityanewfrontierfor5genablediiot AT alsbouitariq hardwareintrinsicmultilayersecurityanewfrontierfor5genablediiot |