Abstract
This article considers the need for secure communications between Industrial Internet of Things (IIoT) devices that operate in 5G-enabled environments. 5G networks enable greater data throughput and lower latency, which presents new opportunities for the secure authentication of business transactions between IoT hardware. We propose an approach to developing a flexible and secure model for IIoT components in 5G environments. Using the National Institute of Standards and Technology (NIST) seven layer model of cloud computing, in conjunction with Physically Unclonable Function (PUF) hardware provided via FPGAs, we demonstrate algorithms that replicate common authorisation challenges in 5G enabled IoT scenarios.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alrawais, A., Alhothaily, A., Hu, C., Cheng, X.: Fog computing for the Internet of Things: security and privacy issues. IEEE Internet Comput. 21(2), 34–42 (2017)
Al-Aqrabi, H., Liu, L., Xu, J., Hill, R., Antonopoulos, N., Zhan, Y.: Investigation of IT security and compliance challenges in security-as-a-service for cloud computing. In: Proceedings of 15th IEEE International Symposium on ISORC 2012, Shenzhen, China, 11–13 April, pp. 124–129. IEEE (2012)
Al Aqrabi, H., Liu, L., Hill, R., Antonopoulos, N.: A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service. In: Proceedings of 6th International Symposium on (CSS) and IEEE 11th International Conference on (ESS), France, Paris, 20–22 March, pp. 137–144. IEEE (2014)
Al-Aqrabi, H., Liu, L., Hill, R., Antonopoulos, N.: Cloud BI: future of business intelligence in the Cloud. J. Comput. Syst. Sci. 81, 85–96 (2015)
Al-Aqrabi, H., Hill, R.: Dynamic multiparty authentication of data analytics services within cloud environments. In: 20th IEEE International Conference on High Performance Computing and Communications, HPCC-2018, 28-30 Exeter (2018)
AlAlawi, K., Al-Aqrabi, H.: Quality of service evaluation of VoIP over wireless networks. In: 2015 IEEE 8th GCC Conference and Exhibition (GCCCE), pp. 1–6 (2015)
Panian, Z.: How to make business intelligence actionable through service-oriented architectures. WSEAS Trans. Bus. Econ. 5(5), 210–221 (2008)
NIST: US Government Cloud Computing Technology Roadmap. Special Publication 500-293. Cloud Computing Program, National Institute of Standards and Technology (NIST), US Department of Commerce, pp. 13–78 (2011)
Mell, P., Grance, T.: The NIST definition of cloud computing, Computer Security Division, Information Technology Laboratory, NIST (2011)
Demchenko, Y., Ngo, C., de Laat, C., Lopez, D.R., Morales, A., García-Espín, J.A.: Security infrastructure for dynamically provisioned cloud infrastructure services. In: Pearson, S., Yee, G. (eds.) Privacy and Security for Cloud Computing. CCN, pp. 167–210. Springer, London (2013). https://doi.org/10.1007/978-1-4471-4189-1_5
Carvalho, M.: SECaaS-security as a service. ISSA J. 20–24 (2011)
Luo, S., et al.: Virtualization security for Cloud computing service. In: Proceedings of 4th International Symposium on Cloud and Service Computing, Hong Kong, 12–14 December 2011, pp. 174–179. IEEE (2011)
Semenko, Y., Saucez, D.: Distributed privacy preserving platform for ridesharing services. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11611, pp. 1–14. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24907-6_1
Kumar, N., DuPree, L.: Protection and privacy of information assets in the cloud. In: Halpert, B. (ed.) Auditing Cloud Computing: A Security and Privacy Guide. Wiley, New York (2011)
Pearson, S.: Taking account of privacy when designing cloud computing services. In: Proceedings of International Symposium on Software Engineering Challenges of Cloud Computing, Vancouver, Canada, 23 May 2009, pp. 1–9. IEEE (2009)
Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Computer 44(9), 51–58 (2011)
Li, J., Zhang, Y., Chen, Y.F., Nagaraja, K.: A mobile phone based WSN infrastructure for IoT over future internet architecture. In: Proceedings of IEEE International Conference on Cyber, Physical and Social Green Computing and Communications (GreenCom), pp. 426–433 (2013)
Diaz-Sanchez, D., et al.: Media gateway: bringing privacy to private multimedia cloud connections. Telecommun. Syst. 2013, 1–16 (2013)
Pervez, Z., Khattak, A.M., Lee, S., Lee, Y.: SAPDS: self-healing attribute-based privacy aware data sharing in Cloud. J. Supercomput. 62, 431–460 (2012)
Chadwick, D.W., Fatema, K.: A privacy preserving authorisation system for the Cloud. J. Comput. Syst. Sci. 78, 1359–1373 (2012)
Johnson, A.P., Chakraborty, R., Mukhopadhyay, D.: A PUF-enabled secure architecture for FPGA-based IoT applications. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 110–122 (2015)
Tobisch, J., Becker, G.T.: On the scaling of machine learning attacks on PUFs with application to noise bifurcation. In: Mangard, S., Schaumont, P. (eds.) RFIDSec 2015. LNCS, vol. 9440, pp. 17–31. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24837-0_2
Seetharam, N., et al.: Hardware Trojan detection by multiple-parameter side-channel analysis. IEEE Trans. Comput. 62(11), 2183–2195 (2012)
ISE Design Suite Overview, Xilinx Inc. https://www.xilinx.com/support/documentation/sw_manuals/xilinx11/ise_c_overview.htm. Accessed 21 May 2019
Digilent Nexys 4 Artix-7 FPGA Trainer Board, Xilinx Inc. https://www.xilinx.com/products/boards-and-kits/1-3yznp5.html. Accessed 21 May 2019
Xilinx Power Estimator User Guide, Xilinx Inc. (2018). https://www.xilinx.com/support/documentation/sw_manuals/xilinx2018_3/ug440-xilinx-power-estimator.pdf. Accessed 21 May 2019
ChipScope Pro Software and Cores, Xilinx Inc. (2012). https://www.xilinx.com/support/documentation/sw_manuals/xilinx14_7/chipscope_pro_sw_cores_ug029.pdf. Accessed 21 May 2019
Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026–2030 (2002). https://doi.org/10.1126/science.1074376. Bibcode:2002Sci...297.2026P. hdl:1721.1/45499. PMID 12242435
Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the Computer and Communications Security Conference, November 2002
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Al-Aqrabi, H., Johnson, A.P., Hill, R., Lane, P., Liu, L. (2019). A Multi-layer Security Model for 5G-Enabled Industrial Internet of Things. In: Wang, G., El Saddik, A., Lai, X., Martinez Perez, G., Choo, KK. (eds) Smart City and Informatization. iSCI 2019. Communications in Computer and Information Science, vol 1122. Springer, Singapore. https://doi.org/10.1007/978-981-15-1301-5_23
Download citation
DOI: https://doi.org/10.1007/978-981-15-1301-5_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1300-8
Online ISBN: 978-981-15-1301-5
eBook Packages: Computer ScienceComputer Science (R0)