The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
최근 산업용 사물인터넷(IIoT)의 도입으로 많은 산업 부문이 최적화되고 산업의 '스마트화'가 촉진되었습니다. 스마트 팩토리와 스마트 산업은 사이버 물리 시스템(CPS)을 통해 현실 세계와 가상 세계를 연결합니다. 그러나 이러한 연결은 사이버 보안 위험 표면을 새로운 수준으로 높여 IIoT 설정과 같은 대규모 네트워크 시스템의 통신이 보안되지 않은 상태로 유지되면 수백만 달러 상당의 자산을 위험에 빠뜨릴 것입니다. 이러한 문제를 해결하기 위한 근본적인 방법은 인증, 비밀유지 등의 보안이며 암호화 키가 필요합니다. 그러나 센서의 제한된 성능으로 인해 보안 성능에 도전하고 있습니다. 경량화, 무결성 및 지속성을 위해 블록체인 기반 ID 관리가 등장하고 있습니다. 그러나 블록체인의 키 생성 및 관리 문제는 동일한 보안 성능 문제에 직면해 있습니다. 첫째, 블록체인 스마트 계약과 HD(계층적 결정론적) 지갑을 통해 계층적 키 파생을 통해 IIoT 환경에서 라인별, 그룹별 키를 효율적으로 배포하고 관리합니다. 둘째, Root Signature라는 타원곡선 단일점 기반의 페어링 검증값은 효율적인 공개키 인증서 등록 및 검증을 수행하고 키 저장 공간을 향상시킨다. 셋째, 블록체인을 통해 기록되는 신원 로그는 키 수명주기의 글로벌 투명성을 제공하여 다양한 보안 공격으로부터 시스템 신뢰성을 제공합니다. 해시 기반 체계(해시 캘린더, 해시 트리 등)를 통해 효율적으로 수행하기 위해 KSI(Keyless Signature Infrastructure)가 채택되었습니다. 우리는 해시 기반 상태 커밋 방법과 비교하여 프레임워크를 분석합니다. 따라서 우리의 방법은 기존 방식에 비해 O(nlog N)의 계산 효율성과 60%의 저장 공간 절약을 달성한다.
Gyeongjin RA
Soonchunhyang University
Su-hyun KIM
National IT Industry Promotion Agency
Imyeong LEE
Soonchunhyang University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Gyeongjin RA, Su-hyun KIM, Imyeong LEE, "Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things" in IEICE TRANSACTIONS on Information,
vol. E105-D, no. 11, pp. 1857-1871, November 2022, doi: 10.1587/transinf.2022NGP0003.
Abstract: Recently, the adoption of the industrial Internet of things (IIoT) has optimized many industrial sectors and promoted industry “smartization.” Smart factories and smart industries connect the real and virtual worlds through cyber-physical systems (CPS). However, these linkages will increase the cyber security danger surface to new levels, putting millions of dollars' worth of assets at risk if communications in big network systems like IIoT settings are left unsecured. To solve these problems, the fundamental method is security, such as authentication and confidentiality, and it should require the encryption key. However, it is challenging the security performance with the limited performance of the sensor. Blockchain-based identity management is emerging for lightweight, integrity and persistence. However, the key generation and management issues of blockchain face the same security performance issues. First, through blockchain smart contracts and hierarchical deterministic (HD) wallets, hierarchical key derivation efficiently distributes and manages keys by line and group in the IIoT environment. Second, the pairing verification value based on an elliptic curve single point called Root Signature performs efficient public key certificate registration and verification and improves the key storage space. Third, the identity log recorded through the blockchain is the global transparency of the key lifecycle, providing system reliability from various security attacks. Keyless Signature Infrastructure (KSI) is adopted to perform efficiently via hash-based scheme (hash calendar, hash tree etc.). We analyze our framework compared to hash-based state commitment methods. Accordingly, our method achieves a calculation efficiency of O(nlog N) and a storage space saving of 60% compared to the existing schemes.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2022NGP0003/_p
부
@ARTICLE{e105-d_11_1857,
author={Gyeongjin RA, Su-hyun KIM, Imyeong LEE, },
journal={IEICE TRANSACTIONS on Information},
title={Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things},
year={2022},
volume={E105-D},
number={11},
pages={1857-1871},
abstract={Recently, the adoption of the industrial Internet of things (IIoT) has optimized many industrial sectors and promoted industry “smartization.” Smart factories and smart industries connect the real and virtual worlds through cyber-physical systems (CPS). However, these linkages will increase the cyber security danger surface to new levels, putting millions of dollars' worth of assets at risk if communications in big network systems like IIoT settings are left unsecured. To solve these problems, the fundamental method is security, such as authentication and confidentiality, and it should require the encryption key. However, it is challenging the security performance with the limited performance of the sensor. Blockchain-based identity management is emerging for lightweight, integrity and persistence. However, the key generation and management issues of blockchain face the same security performance issues. First, through blockchain smart contracts and hierarchical deterministic (HD) wallets, hierarchical key derivation efficiently distributes and manages keys by line and group in the IIoT environment. Second, the pairing verification value based on an elliptic curve single point called Root Signature performs efficient public key certificate registration and verification and improves the key storage space. Third, the identity log recorded through the blockchain is the global transparency of the key lifecycle, providing system reliability from various security attacks. Keyless Signature Infrastructure (KSI) is adopted to perform efficiently via hash-based scheme (hash calendar, hash tree etc.). We analyze our framework compared to hash-based state commitment methods. Accordingly, our method achieves a calculation efficiency of O(nlog N) and a storage space saving of 60% compared to the existing schemes.},
keywords={},
doi={10.1587/transinf.2022NGP0003},
ISSN={1745-1361},
month={November},}
부
TY - JOUR
TI - Identity Access Management via ECC Stateless Derived Key Based Hierarchical Blockchain for the Industrial Internet of Things
T2 - IEICE TRANSACTIONS on Information
SP - 1857
EP - 1871
AU - Gyeongjin RA
AU - Su-hyun KIM
AU - Imyeong LEE
PY - 2022
DO - 10.1587/transinf.2022NGP0003
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E105-D
IS - 11
JA - IEICE TRANSACTIONS on Information
Y1 - November 2022
AB - Recently, the adoption of the industrial Internet of things (IIoT) has optimized many industrial sectors and promoted industry “smartization.” Smart factories and smart industries connect the real and virtual worlds through cyber-physical systems (CPS). However, these linkages will increase the cyber security danger surface to new levels, putting millions of dollars' worth of assets at risk if communications in big network systems like IIoT settings are left unsecured. To solve these problems, the fundamental method is security, such as authentication and confidentiality, and it should require the encryption key. However, it is challenging the security performance with the limited performance of the sensor. Blockchain-based identity management is emerging for lightweight, integrity and persistence. However, the key generation and management issues of blockchain face the same security performance issues. First, through blockchain smart contracts and hierarchical deterministic (HD) wallets, hierarchical key derivation efficiently distributes and manages keys by line and group in the IIoT environment. Second, the pairing verification value based on an elliptic curve single point called Root Signature performs efficient public key certificate registration and verification and improves the key storage space. Third, the identity log recorded through the blockchain is the global transparency of the key lifecycle, providing system reliability from various security attacks. Keyless Signature Infrastructure (KSI) is adopted to perform efficiently via hash-based scheme (hash calendar, hash tree etc.). We analyze our framework compared to hash-based state commitment methods. Accordingly, our method achieves a calculation efficiency of O(nlog N) and a storage space saving of 60% compared to the existing schemes.
ER -