• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

硬件固有多层安全:5G 赋能工业物联网的新前沿。

Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT.

机构信息

Department of Computer Science, Centre for Industrial Analytics (CIndA), School of Computing and Engineering, University of Huddersfield, Queensgate, Huddersfield HD1 3DH, UK.

Department of Engineering and Technology, Centre for Planning, Autonomy and Representation of Knowledge (PARK), School of Computing and Engineering, University of Huddersfield, Queensgate, Huddersfield HD1 3DH, UK.

出版信息

Sensors (Basel). 2020 Mar 31;20(7):1963. doi: 10.3390/s20071963.

DOI:10.3390/s20071963
PMID:32244458
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7180754/
Abstract

The introduction of 5G communication capabilities presents additional challenges for the development of products and services that can fully exploit the opportunities offered by high bandwidth, low latency networking. This is particularly relevant to an emerging interest in the Industrial Internet of Things (IIoT), which is a foundation stone of recent technological revolutions such as Digital Manufacturing. A crucial aspect of this is to securely authenticate complex transactions between IIoT devices, whilst marshalling adversarial requests for system authorisation, without the need for a centralised authentication mechanism which cannot scale to the size needed. In this article we combine Physically Unclonable Function (PUF) hardware (using Field Programmable Gate Arrays-FPGAs), together with a multi-layer approach to cloud computing from the National Institute of Standards and Technology (NIST). Through this, we demonstrate an approach to facilitate the development of improved multi-layer authentication mechanisms. We extend prior work to utilise hardware security primitives for adversarial trojan detection, which is inspired by a biological approach to parameter analysis. This approach is an effective demonstration of attack prevention, both from internal and external adversaries. The security is further hardened through observation of the device parameters of connected IIoT equipment. We demonstrate that the proposed architecture can service a significantly high load of device authentication requests using a multi-layer architecture in an arbitrarily acceptable time of less than 1 second.

摘要

5G 通信功能的引入为开发能够充分利用高带宽、低延迟网络所带来的机会的产品和服务带来了额外的挑战。这对于工业物联网(IIoT)的新兴兴趣尤为重要,它是数字制造等最近技术革命的基石。其中一个关键方面是安全地验证 IIoT 设备之间的复杂事务,同时应对系统授权的敌对请求,而无需使用无法扩展到所需规模的集中式身份验证机制。在本文中,我们结合了物理不可克隆函数(PUF)硬件(使用现场可编程门阵列-FPGA),以及来自国家标准与技术研究院(NIST)的多层云计算方法。通过这种方式,我们展示了一种促进改进的多层身份验证机制开发的方法。我们扩展了先前的工作,利用硬件安全基元进行对抗性木马检测,这是受生物参数分析方法的启发。这种方法有效地展示了来自内部和外部攻击者的攻击预防。通过观察连接的 IIoT 设备的设备参数,进一步加强了安全性。我们证明,所提出的架构可以使用多层体系结构在任意可接受的 1 秒内服务于大量设备身份验证请求。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/968ec6748b6b/sensors-20-01963-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/090a25736d87/sensors-20-01963-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/d802f3463a1a/sensors-20-01963-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/11da375cbb43/sensors-20-01963-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/8417afd9a6ee/sensors-20-01963-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/ba0d3282a282/sensors-20-01963-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/8d4411688dfa/sensors-20-01963-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/be53c92e12e2/sensors-20-01963-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/968ec6748b6b/sensors-20-01963-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/090a25736d87/sensors-20-01963-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/d802f3463a1a/sensors-20-01963-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/11da375cbb43/sensors-20-01963-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/8417afd9a6ee/sensors-20-01963-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/ba0d3282a282/sensors-20-01963-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/8d4411688dfa/sensors-20-01963-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/be53c92e12e2/sensors-20-01963-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/ecfe/7180754/968ec6748b6b/sensors-20-01963-g008.jpg

相似文献

1
Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT.硬件固有多层安全:5G 赋能工业物联网的新前沿。
Sensors (Basel). 2020 Mar 31;20(7):1963. doi: 10.3390/s20071963.
2
Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems.物联网环境下的信息物理系统安全的生物启发方法。
Sensors (Basel). 2020 Feb 5;20(3):844. doi: 10.3390/s20030844.
3
WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks.WSNEAP:面向工业物联网的无线传感器网络的高效认证协议。
Sensors (Basel). 2022 Sep 29;22(19):7413. doi: 10.3390/s22197413.
4
Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things.面向工业物联网资源受限设备的机器对机器通信的轻量级认证协议。
Sensors (Basel). 2020 Jan 16;20(2):501. doi: 10.3390/s20020501.
5
A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities.工业物联网安全综述:需求、攻击、基于人工智能的解决方案及边缘计算机遇
Sensors (Basel). 2023 Aug 28;23(17):7470. doi: 10.3390/s23177470.
6
A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks.面向 5G 网络的工业物联网设备安全在线指纹认证系统。
Sensors (Basel). 2022 Oct 7;22(19):7609. doi: 10.3390/s22197609.
7
ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things.ASAP-IIoT:一种用于工业物联网的匿名安全认证协议。
Sensors (Basel). 2024 Feb 15;24(4):1243. doi: 10.3390/s24041243.
8
Hardware Security of Fog End-Devices for the Internet of Things.雾端物联网设备的硬件安全。
Sensors (Basel). 2020 Oct 9;20(20):5729. doi: 10.3390/s20205729.
9
Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey.工业物联网(IIoT)的最新技术、安全对策和持续挑战:综述。
Sensors (Basel). 2021 Oct 6;21(19):6647. doi: 10.3390/s21196647.
10
Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy.基于 PUF 验证的区块链:能源互联网中的并发数据和设备安全。
Sensors (Basel). 2020 Dec 23;21(1):28. doi: 10.3390/s21010028.

引用本文的文献

1
Domain Feature Mapping with YOLOv7 for Automated Edge-Based Pallet Racking Inspections.基于 YOLOv7 的域特征映射在自动化边缘式托盘货架检测中的应用。
Sensors (Basel). 2022 Sep 13;22(18):6927. doi: 10.3390/s22186927.

本文引用的文献

1
Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems.物联网环境下的信息物理系统安全的生物启发方法。
Sensors (Basel). 2020 Feb 5;20(3):844. doi: 10.3390/s20030844.
2
Exploring Self-Repair in a Coupled Spiking Astrocyte Neural Network.探索耦合脉冲星形胶质细胞神经网络中的自我修复
IEEE Trans Neural Netw Learn Syst. 2019 Mar;30(3):865-875. doi: 10.1109/TNNLS.2018.2854291. Epub 2018 Jul 31.
3
Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.通过轻量级和经过认证的密钥管理方法增强 LoRaWAN 安全性。
Sensors (Basel). 2018 Jun 5;18(6):1833. doi: 10.3390/s18061833.
4
Spike timing-dependent plasticity of neural circuits.神经回路的尖峰时间依赖性可塑性。
Neuron. 2004 Sep 30;44(1):23-30. doi: 10.1016/j.neuron.2004.09.007.
5
Physical one-way functions.物理单向函数。
Science. 2002 Sep 20;297(5589):2026-30. doi: 10.1126/science.1074376.
6
Spike-driven synaptic plasticity: theory, simulation, VLSI implementation.尖峰驱动的突触可塑性:理论、模拟与超大规模集成电路实现
Neural Comput. 2000 Oct;12(10):2227-58. doi: 10.1162/089976600300014917.
7
Theory for the development of neuron selectivity: orientation specificity and binocular interaction in visual cortex.神经元选择性发展的理论:视觉皮层中的方向特异性和双眼相互作用
J Neurosci. 1982 Jan;2(1):32-48. doi: 10.1523/JNEUROSCI.02-01-00032.1982.