The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Récemment, l’adoption de l’Internet industriel des objets (IIoT) a optimisé de nombreux secteurs industriels et favorisé la « smartisation » de l’industrie. Les usines et industries intelligentes connectent les mondes réel et virtuel via des systèmes cyber-physiques (CPS). Cependant, ces liens augmenteront le danger de cybersécurité à de nouveaux niveaux, mettant en danger des actifs valant des millions de dollars si les communications dans les grands systèmes de réseau comme les paramètres IIoT ne sont pas sécurisées. Pour résoudre ces problèmes, la méthode fondamentale est la sécurité, comme l'authentification et la confidentialité, et elle doit nécessiter la clé de cryptage. Cependant, cela remet en question les performances de sécurité en raison des performances limitées du capteur. La gestion des identités basée sur la blockchain émerge pour plus de légèreté, d'intégrité et de persistance. Cependant, les problèmes de génération et de gestion clés de la blockchain sont confrontés aux mêmes problèmes de performances de sécurité. Premièrement, grâce aux contrats intelligents blockchain et aux portefeuilles déterministes hiérarchiques (HD), la dérivation hiérarchique des clés distribue et gère efficacement les clés par ligne et par groupe dans l'environnement IIoT. Deuxièmement, la valeur de vérification d'appariement basée sur un point unique de courbe elliptique appelé Root Signature effectue un enregistrement et une vérification efficaces des certificats de clé publique et améliore l'espace de stockage des clés. Troisièmement, le journal d'identité enregistré via la blockchain assure la transparence globale du cycle de vie des clés, garantissant la fiabilité du système face à diverses attaques de sécurité. L'infrastructure de signature sans clé (KSI) est adoptée pour fonctionner efficacement via un schéma basé sur le hachage (calendrier de hachage, arbre de hachage, etc.). Nous analysons notre cadre par rapport aux méthodes d'engagement d'État basées sur le hachage. En conséquence, notre méthode atteint une efficacité de calcul de O(nlog N) et une économie d’espace de stockage de 60 % par rapport aux schémas existants.
Gyeongjin RA
Soonchunhyang University
Su-hyun KIM
National IT Industry Promotion Agency
Imyeong LEE
Soonchunhyang University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Gyeongjin RA, Su-hyun KIM, Imyeong LEE, "Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things" in IEICE TRANSACTIONS on Information,
vol. E105-D, no. 11, pp. 1857-1871, November 2022, doi: 10.1587/transinf.2022NGP0003.
Abstract: Recently, the adoption of the industrial Internet of things (IIoT) has optimized many industrial sectors and promoted industry “smartization.” Smart factories and smart industries connect the real and virtual worlds through cyber-physical systems (CPS). However, these linkages will increase the cyber security danger surface to new levels, putting millions of dollars' worth of assets at risk if communications in big network systems like IIoT settings are left unsecured. To solve these problems, the fundamental method is security, such as authentication and confidentiality, and it should require the encryption key. However, it is challenging the security performance with the limited performance of the sensor. Blockchain-based identity management is emerging for lightweight, integrity and persistence. However, the key generation and management issues of blockchain face the same security performance issues. First, through blockchain smart contracts and hierarchical deterministic (HD) wallets, hierarchical key derivation efficiently distributes and manages keys by line and group in the IIoT environment. Second, the pairing verification value based on an elliptic curve single point called Root Signature performs efficient public key certificate registration and verification and improves the key storage space. Third, the identity log recorded through the blockchain is the global transparency of the key lifecycle, providing system reliability from various security attacks. Keyless Signature Infrastructure (KSI) is adopted to perform efficiently via hash-based scheme (hash calendar, hash tree etc.). We analyze our framework compared to hash-based state commitment methods. Accordingly, our method achieves a calculation efficiency of O(nlog N) and a storage space saving of 60% compared to the existing schemes.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2022NGP0003/_p
Copier
@ARTICLE{e105-d_11_1857,
author={Gyeongjin RA, Su-hyun KIM, Imyeong LEE, },
journal={IEICE TRANSACTIONS on Information},
title={Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things},
year={2022},
volume={E105-D},
number={11},
pages={1857-1871},
abstract={Recently, the adoption of the industrial Internet of things (IIoT) has optimized many industrial sectors and promoted industry “smartization.” Smart factories and smart industries connect the real and virtual worlds through cyber-physical systems (CPS). However, these linkages will increase the cyber security danger surface to new levels, putting millions of dollars' worth of assets at risk if communications in big network systems like IIoT settings are left unsecured. To solve these problems, the fundamental method is security, such as authentication and confidentiality, and it should require the encryption key. However, it is challenging the security performance with the limited performance of the sensor. Blockchain-based identity management is emerging for lightweight, integrity and persistence. However, the key generation and management issues of blockchain face the same security performance issues. First, through blockchain smart contracts and hierarchical deterministic (HD) wallets, hierarchical key derivation efficiently distributes and manages keys by line and group in the IIoT environment. Second, the pairing verification value based on an elliptic curve single point called Root Signature performs efficient public key certificate registration and verification and improves the key storage space. Third, the identity log recorded through the blockchain is the global transparency of the key lifecycle, providing system reliability from various security attacks. Keyless Signature Infrastructure (KSI) is adopted to perform efficiently via hash-based scheme (hash calendar, hash tree etc.). We analyze our framework compared to hash-based state commitment methods. Accordingly, our method achieves a calculation efficiency of O(nlog N) and a storage space saving of 60% compared to the existing schemes.},
keywords={},
doi={10.1587/transinf.2022NGP0003},
ISSN={1745-1361},
month={November},}
Copier
TY - JOUR
TI - Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things
T2 - IEICE TRANSACTIONS on Information
SP - 1857
EP - 1871
AU - Gyeongjin RA
AU - Su-hyun KIM
AU - Imyeong LEE
PY - 2022
DO - 10.1587/transinf.2022NGP0003
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E105-D
IS - 11
JA - IEICE TRANSACTIONS on Information
Y1 - November 2022
AB - Recently, the adoption of the industrial Internet of things (IIoT) has optimized many industrial sectors and promoted industry “smartization.” Smart factories and smart industries connect the real and virtual worlds through cyber-physical systems (CPS). However, these linkages will increase the cyber security danger surface to new levels, putting millions of dollars' worth of assets at risk if communications in big network systems like IIoT settings are left unsecured. To solve these problems, the fundamental method is security, such as authentication and confidentiality, and it should require the encryption key. However, it is challenging the security performance with the limited performance of the sensor. Blockchain-based identity management is emerging for lightweight, integrity and persistence. However, the key generation and management issues of blockchain face the same security performance issues. First, through blockchain smart contracts and hierarchical deterministic (HD) wallets, hierarchical key derivation efficiently distributes and manages keys by line and group in the IIoT environment. Second, the pairing verification value based on an elliptic curve single point called Root Signature performs efficient public key certificate registration and verification and improves the key storage space. Third, the identity log recorded through the blockchain is the global transparency of the key lifecycle, providing system reliability from various security attacks. Keyless Signature Infrastructure (KSI) is adopted to perform efficiently via hash-based scheme (hash calendar, hash tree etc.). We analyze our framework compared to hash-based state commitment methods. Accordingly, our method achieves a calculation efficiency of O(nlog N) and a storage space saving of 60% compared to the existing schemes.
ER -