Cargando…

Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications

Digital certificates are regarded as the most secure and scalable way of implementing authentication services in the Internet today. They are used by most popular security protocols, including Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The lifecycle management of di...

Descripción completa

Detalles Bibliográficos
Autores principales: Astorga, Jasone, Barcelo, Marc, Urbieta, Aitor, Jacob, Eduardo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9003447/
https://www.ncbi.nlm.nih.gov/pubmed/35408176
http://dx.doi.org/10.3390/s22072561
_version_ 1784686136394776576
author Astorga, Jasone
Barcelo, Marc
Urbieta, Aitor
Jacob, Eduardo
author_facet Astorga, Jasone
Barcelo, Marc
Urbieta, Aitor
Jacob, Eduardo
author_sort Astorga, Jasone
collection PubMed
description Digital certificates are regarded as the most secure and scalable way of implementing authentication services in the Internet today. They are used by most popular security protocols, including Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The lifecycle management of digital certificates relies on centralized Certification Authority (CA)-based Public Key Infrastructures (PKIs). However, the implementation of PKIs and certificate lifecycle management procedures in Industrial Internet of Things (IIoT) environments presents some challenges, mainly due to the high resource consumption that they imply and the lack of trust in the centralized CAs. This paper identifies and describes the main challenges to implement certificate-based public key cryptography in IIoT environments and it surveys the alternative approaches proposed so far in the literature to address these challenges. Most proposals rely on the introduction of a Trusted Third Party to aid the IIoT devices in tasks that exceed their capacity. The proposed alternatives are complementary and their application depends on the specific challenge to solve, the application scenario, and the capacities of the involved IIoT devices. This paper revisits all these alternatives in light of industrial communication models, identifying their strengths and weaknesses, and providing an in-depth comparative analysis.
format Online
Article
Text
id pubmed-9003447
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-90034472022-04-13 Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications Astorga, Jasone Barcelo, Marc Urbieta, Aitor Jacob, Eduardo Sensors (Basel) Review Digital certificates are regarded as the most secure and scalable way of implementing authentication services in the Internet today. They are used by most popular security protocols, including Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The lifecycle management of digital certificates relies on centralized Certification Authority (CA)-based Public Key Infrastructures (PKIs). However, the implementation of PKIs and certificate lifecycle management procedures in Industrial Internet of Things (IIoT) environments presents some challenges, mainly due to the high resource consumption that they imply and the lack of trust in the centralized CAs. This paper identifies and describes the main challenges to implement certificate-based public key cryptography in IIoT environments and it surveys the alternative approaches proposed so far in the literature to address these challenges. Most proposals rely on the introduction of a Trusted Third Party to aid the IIoT devices in tasks that exceed their capacity. The proposed alternatives are complementary and their application depends on the specific challenge to solve, the application scenario, and the capacities of the involved IIoT devices. This paper revisits all these alternatives in light of industrial communication models, identifying their strengths and weaknesses, and providing an in-depth comparative analysis. MDPI 2022-03-27 /pmc/articles/PMC9003447/ /pubmed/35408176 http://dx.doi.org/10.3390/s22072561 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Astorga, Jasone
Barcelo, Marc
Urbieta, Aitor
Jacob, Eduardo
Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications
title Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications
title_full Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications
title_fullStr Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications
title_full_unstemmed Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications
title_short Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications
title_sort revisiting the feasibility of public key cryptography in light of iiot communications
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9003447/
https://www.ncbi.nlm.nih.gov/pubmed/35408176
http://dx.doi.org/10.3390/s22072561
work_keys_str_mv AT astorgajasone revisitingthefeasibilityofpublickeycryptographyinlightofiiotcommunications
AT barcelomarc revisitingthefeasibilityofpublickeycryptographyinlightofiiotcommunications
AT urbietaaitor revisitingthefeasibilityofpublickeycryptographyinlightofiiotcommunications
AT jacobeduardo revisitingthefeasibilityofpublickeycryptographyinlightofiiotcommunications