Skip to main content

An Authentication Framework in ICN-Enabled Industrial Cyber-Physical Systems

  • Conference paper
  • First Online:
Security and Privacy in New Computing Environments (SPNCE 2020)

Abstract

Industrial Cyber-Physical Systems (ICPS), as a new industrial revolution, are to provide advanced intellectual foundation for next generation industrial systems. While such systems present substantial security challenges for the host-centric communication with the growing trend of sensor data streams. Information Centric Networking (ICN) architecture suggests features exploitable in ICPS applications, reducing delivery latency and promoting quality of services that applies broadly across Industrial Internet. Emerging available solutions for secure communication, however, few of them have thoroughly addressed concerns related to securing access due to the dependence on an online provider server. In this work, we propose a concrete authentication framework for ICN ICPS based on proxy signature, which guarantees authentic sensor data access only to legitimate users and does not require interaction between users. This framework would help lower the level of the complexity of the entire system and reduce the cost of authentication by leveraging edge cache. We prove the security of the proposed authentication scheme and present performance analysis to show its efficiency.

Supported in part by the National Natural Science Foundation of China under Grants 61802276 and in part by the Opening Foundation of Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology, China.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cisco annual internet report 2018–2023 white paper. http://www.cisco.com

  2. Cyber-physical systems: situation analysis of current trends, technologies, and challenges (2012). http://www.google.com. Accessed 2030

  3. Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81–97 (2017)

    Article  Google Scholar 

  4. Azad, M.A., Bag, S., Perera, C., Barhamgi, M., Hao, F.: Authentic-caller: self-enforcing authentication in a next generation network. IEEE Trans. Industr. Inf. 16(5), 3606–3615 (2020)

    Article  Google Scholar 

  5. Chandrasekaran, G., Wang, N., Tafazolli, R.: Caching on the move: towards D2D-based information centric networking for mobile content distribution. In: IEEE 40th conference on Local Computer Networks (LCN), pp. 312–320 (2015)

    Google Scholar 

  6. Compagno, A., Conti, M., Droms, R.: OnboardiCNg: a secure protocol for on-boarding iot devices in ICN. In: Proceedings of the 3rd ACM Conference on Information-Centric Networking (ICN), pp. 166–175 (2016)

    Google Scholar 

  7. Fan, C.I., Chen, I.T., Cheng, C.K., Huang, J.J., Chen, W.T.: FTP-NDN: file transfer protocol based on re-encryption for named data network supporting nondesignated receivers. IEEE Syst. J. 12(1), 473–484 (2018)

    Article  Google Scholar 

  8. Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS). pp. 83–92 (1998)

    Google Scholar 

  9. Fotiou, N., Polyzos, G.C.: Securing content sharing over ICN. In: Proceedings of the 3rd ACM conference on Information-Centric Networking (ICN), pp. 176–185 (2016)

    Google Scholar 

  10. Genge, B., Haller, P., Duka, A.V.: Engineering security-aware control applications for data authentication in smart industrial cyber-physical systems. Future Gener. Comput. Syst. 91, 206–222 (2019)

    Article  Google Scholar 

  11. Hwang, J.Y., Chen, L., Cho, H.S., Nyang, D.: Short dynamic group signature scheme supporting controllable linkability. IEEE Trans. Inf. Forensics Secur. 10(6), 1109–1124 (2015)

    Article  Google Scholar 

  12. Kim, Y., Kolesnikov, V., Thottan, M.: Resilient end-to-end message protection for cyber-physical system communications. IEEE Trans. Smart Grid 9(4), 2478–2487 (2016)

    Article  Google Scholar 

  13. Li, B., Huang, D., Wang, Z., Zhu, Y.: Attribute-based access control for ICN naming scheme. IEEE Trans. Dependable Secure Comput. 15(2), 194–206 (2016)

    Article  Google Scholar 

  14. Mick, T., Tourani, R., Misra, S.: LASeR: lightweight authentication and secured routing for ndn iot in smart cities. IEEE Internet Things J. 5(2), 755–764 (2017)

    Article  Google Scholar 

  15. Misra, S., Tourani, R., Natividad, F., Mick, T., Majd, N.E., Huang, H.: AccConF: an access control framework for leveraging in-network cached data in the ICN-enabled wireless edge. IEEE Trans. Dependable Secure Comput. 16(1), 5–17 (2017)

    Article  Google Scholar 

  16. Nunes, I.O., Tsudik, G.: KRB-CCN: lightweight authentication and access control for private content-centric networks. In: Preneel, B., Vercauteren, F. (eds.) ACNS 2018. LNCS, vol. 10892, pp. 598–615. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93387-0_31

    Chapter  MATH  Google Scholar 

  17. Tramarin, F., Vitturi, S., Luvisotto, M.: A dynamic rate selection algorithm for IEEE 802.11 industrial wireless LAN. IEEE Trans. Ind. Inf. 13(2), 846–855 (2016)

    Article  Google Scholar 

  18. Xiong, H., Qin, Z.: Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans. Inf. Forensics Secur. 10(7), 1442–1455 (2015)

    Article  Google Scholar 

  19. Xue, K., Zhang, X., Xia, Q., Wei, D.S., Yue, H., Wu, F.: SEAF: a secure, efficient and accountable access control framework for information centric networking. In: 2018 International Conference on Computer Communications(INFOCOM), pp. 2213–2221. IEEE (2018)

    Google Scholar 

  20. Zhang, Y., Deng, R., Zheng, D., Li, J., Wu, P., Cao, J.: Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT. IEEE Trans. Industr. Inf. 15(9), 5099–5108 (2019)

    Article  Google Scholar 

  21. Zheng, Q., Li, Q., Azgin, A., Weng, J.: Data verification in information-centric networking with efficient revocable certificateless signature. In: 2017 IEEE Conference on Communications and Network Security (CNS), pp. 1–9 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanrong Lu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lu, Y., Zhang, M., Zheng, X. (2021). An Authentication Framework in ICN-Enabled Industrial Cyber-Physical Systems. In: Wang, D., Meng, W., Han, J. (eds) Security and Privacy in New Computing Environments. SPNCE 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 344. Springer, Cham. https://doi.org/10.1007/978-3-030-66922-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66922-5_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66921-8

  • Online ISBN: 978-3-030-66922-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics