Abstract
Industrial Cyber-Physical Systems (ICPS), as a new industrial revolution, are to provide advanced intellectual foundation for next generation industrial systems. While such systems present substantial security challenges for the host-centric communication with the growing trend of sensor data streams. Information Centric Networking (ICN) architecture suggests features exploitable in ICPS applications, reducing delivery latency and promoting quality of services that applies broadly across Industrial Internet. Emerging available solutions for secure communication, however, few of them have thoroughly addressed concerns related to securing access due to the dependence on an online provider server. In this work, we propose a concrete authentication framework for ICN ICPS based on proxy signature, which guarantees authentic sensor data access only to legitimate users and does not require interaction between users. This framework would help lower the level of the complexity of the entire system and reduce the cost of authentication by leveraging edge cache. We prove the security of the proposed authentication scheme and present performance analysis to show its efficiency.
Supported in part by the National Natural Science Foundation of China under Grants 61802276 and in part by the Opening Foundation of Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology, China.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cisco annual internet report 2018–2023 white paper. http://www.cisco.com
Cyber-physical systems: situation analysis of current trends, technologies, and challenges (2012). http://www.google.com. Accessed 2030
Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81–97 (2017)
Azad, M.A., Bag, S., Perera, C., Barhamgi, M., Hao, F.: Authentic-caller: self-enforcing authentication in a next generation network. IEEE Trans. Industr. Inf. 16(5), 3606–3615 (2020)
Chandrasekaran, G., Wang, N., Tafazolli, R.: Caching on the move: towards D2D-based information centric networking for mobile content distribution. In: IEEE 40th conference on Local Computer Networks (LCN), pp. 312–320 (2015)
Compagno, A., Conti, M., Droms, R.: OnboardiCNg: a secure protocol for on-boarding iot devices in ICN. In: Proceedings of the 3rd ACM Conference on Information-Centric Networking (ICN), pp. 166–175 (2016)
Fan, C.I., Chen, I.T., Cheng, C.K., Huang, J.J., Chen, W.T.: FTP-NDN: file transfer protocol based on re-encryption for named data network supporting nondesignated receivers. IEEE Syst. J. 12(1), 473–484 (2018)
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS). pp. 83–92 (1998)
Fotiou, N., Polyzos, G.C.: Securing content sharing over ICN. In: Proceedings of the 3rd ACM conference on Information-Centric Networking (ICN), pp. 176–185 (2016)
Genge, B., Haller, P., Duka, A.V.: Engineering security-aware control applications for data authentication in smart industrial cyber-physical systems. Future Gener. Comput. Syst. 91, 206–222 (2019)
Hwang, J.Y., Chen, L., Cho, H.S., Nyang, D.: Short dynamic group signature scheme supporting controllable linkability. IEEE Trans. Inf. Forensics Secur. 10(6), 1109–1124 (2015)
Kim, Y., Kolesnikov, V., Thottan, M.: Resilient end-to-end message protection for cyber-physical system communications. IEEE Trans. Smart Grid 9(4), 2478–2487 (2016)
Li, B., Huang, D., Wang, Z., Zhu, Y.: Attribute-based access control for ICN naming scheme. IEEE Trans. Dependable Secure Comput. 15(2), 194–206 (2016)
Mick, T., Tourani, R., Misra, S.: LASeR: lightweight authentication and secured routing for ndn iot in smart cities. IEEE Internet Things J. 5(2), 755–764 (2017)
Misra, S., Tourani, R., Natividad, F., Mick, T., Majd, N.E., Huang, H.: AccConF: an access control framework for leveraging in-network cached data in the ICN-enabled wireless edge. IEEE Trans. Dependable Secure Comput. 16(1), 5–17 (2017)
Nunes, I.O., Tsudik, G.: KRB-CCN: lightweight authentication and access control for private content-centric networks. In: Preneel, B., Vercauteren, F. (eds.) ACNS 2018. LNCS, vol. 10892, pp. 598–615. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93387-0_31
Tramarin, F., Vitturi, S., Luvisotto, M.: A dynamic rate selection algorithm for IEEE 802.11 industrial wireless LAN. IEEE Trans. Ind. Inf. 13(2), 846–855 (2016)
Xiong, H., Qin, Z.: Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans. Inf. Forensics Secur. 10(7), 1442–1455 (2015)
Xue, K., Zhang, X., Xia, Q., Wei, D.S., Yue, H., Wu, F.: SEAF: a secure, efficient and accountable access control framework for information centric networking. In: 2018 International Conference on Computer Communications(INFOCOM), pp. 2213–2221. IEEE (2018)
Zhang, Y., Deng, R., Zheng, D., Li, J., Wu, P., Cao, J.: Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT. IEEE Trans. Industr. Inf. 15(9), 5099–5108 (2019)
Zheng, Q., Li, Q., Azgin, A., Weng, J.: Data verification in information-centric networking with efficient revocable certificateless signature. In: 2017 IEEE Conference on Communications and Network Security (CNS), pp. 1–9 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Lu, Y., Zhang, M., Zheng, X. (2021). An Authentication Framework in ICN-Enabled Industrial Cyber-Physical Systems. In: Wang, D., Meng, W., Han, J. (eds) Security and Privacy in New Computing Environments. SPNCE 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 344. Springer, Cham. https://doi.org/10.1007/978-3-030-66922-5_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-66922-5_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-66921-8
Online ISBN: 978-3-030-66922-5
eBook Packages: Computer ScienceComputer Science (R0)