Skip to main content

A Multi-layer Security Model for 5G-Enabled Industrial Internet of Things

  • Conference paper
  • First Online:
Smart City and Informatization (iSCI 2019)

Abstract

This article considers the need for secure communications between Industrial Internet of Things (IIoT) devices that operate in 5G-enabled environments. 5G networks enable greater data throughput and lower latency, which presents new opportunities for the secure authentication of business transactions between IoT hardware. We propose an approach to developing a flexible and secure model for IIoT components in 5G environments. Using the National Institute of Standards and Technology (NIST) seven layer model of cloud computing, in conjunction with Physically Unclonable Function (PUF) hardware provided via FPGAs, we demonstrate algorithms that replicate common authorisation challenges in 5G enabled IoT scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alrawais, A., Alhothaily, A., Hu, C., Cheng, X.: Fog computing for the Internet of Things: security and privacy issues. IEEE Internet Comput. 21(2), 34–42 (2017)

    Article  Google Scholar 

  2. Al-Aqrabi, H., Liu, L., Xu, J., Hill, R., Antonopoulos, N., Zhan, Y.: Investigation of IT security and compliance challenges in security-as-a-service for cloud computing. In: Proceedings of 15th IEEE International Symposium on ISORC 2012, Shenzhen, China, 11–13 April, pp. 124–129. IEEE (2012)

    Google Scholar 

  3. Al Aqrabi, H., Liu, L., Hill, R., Antonopoulos, N.: A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service. In: Proceedings of 6th International Symposium on (CSS) and IEEE 11th International Conference on (ESS), France, Paris, 20–22 March, pp. 137–144. IEEE (2014)

    Google Scholar 

  4. Al-Aqrabi, H., Liu, L., Hill, R., Antonopoulos, N.: Cloud BI: future of business intelligence in the Cloud. J. Comput. Syst. Sci. 81, 85–96 (2015)

    Article  MathSciNet  Google Scholar 

  5. Al-Aqrabi, H., Hill, R.: Dynamic multiparty authentication of data analytics services within cloud environments. In: 20th IEEE International Conference on High Performance Computing and Communications, HPCC-2018, 28-30 Exeter (2018)

    Google Scholar 

  6. AlAlawi, K., Al-Aqrabi, H.: Quality of service evaluation of VoIP over wireless networks. In: 2015 IEEE 8th GCC Conference and Exhibition (GCCCE), pp. 1–6 (2015)

    Google Scholar 

  7. Panian, Z.: How to make business intelligence actionable through service-oriented architectures. WSEAS Trans. Bus. Econ. 5(5), 210–221 (2008)

    Google Scholar 

  8. NIST: US Government Cloud Computing Technology Roadmap. Special Publication 500-293. Cloud Computing Program, National Institute of Standards and Technology (NIST), US Department of Commerce, pp. 13–78 (2011)

    Google Scholar 

  9. Mell, P., Grance, T.: The NIST definition of cloud computing, Computer Security Division, Information Technology Laboratory, NIST (2011)

    Google Scholar 

  10. Demchenko, Y., Ngo, C., de Laat, C., Lopez, D.R., Morales, A., García-Espín, J.A.: Security infrastructure for dynamically provisioned cloud infrastructure services. In: Pearson, S., Yee, G. (eds.) Privacy and Security for Cloud Computing. CCN, pp. 167–210. Springer, London (2013). https://doi.org/10.1007/978-1-4471-4189-1_5

    Chapter  Google Scholar 

  11. Carvalho, M.: SECaaS-security as a service. ISSA J. 20–24 (2011)

    Google Scholar 

  12. Luo, S., et al.: Virtualization security for Cloud computing service. In: Proceedings of 4th International Symposium on Cloud and Service Computing, Hong Kong, 12–14 December 2011, pp. 174–179. IEEE (2011)

    Google Scholar 

  13. Semenko, Y., Saucez, D.: Distributed privacy preserving platform for ridesharing services. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11611, pp. 1–14. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24907-6_1

    Chapter  Google Scholar 

  14. Kumar, N., DuPree, L.: Protection and privacy of information assets in the cloud. In: Halpert, B. (ed.) Auditing Cloud Computing: A Security and Privacy Guide. Wiley, New York (2011)

    Google Scholar 

  15. Pearson, S.: Taking account of privacy when designing cloud computing services. In: Proceedings of International Symposium on Software Engineering Challenges of Cloud Computing, Vancouver, Canada, 23 May 2009, pp. 1–9. IEEE (2009)

    Google Scholar 

  16. Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Computer 44(9), 51–58 (2011)

    Article  Google Scholar 

  17. Li, J., Zhang, Y., Chen, Y.F., Nagaraja, K.: A mobile phone based WSN infrastructure for IoT over future internet architecture. In: Proceedings of IEEE International Conference on Cyber, Physical and Social Green Computing and Communications (GreenCom), pp. 426–433 (2013)

    Google Scholar 

  18. Diaz-Sanchez, D., et al.: Media gateway: bringing privacy to private multimedia cloud connections. Telecommun. Syst. 2013, 1–16 (2013)

    Google Scholar 

  19. Pervez, Z., Khattak, A.M., Lee, S., Lee, Y.: SAPDS: self-healing attribute-based privacy aware data sharing in Cloud. J. Supercomput. 62, 431–460 (2012)

    Article  Google Scholar 

  20. Chadwick, D.W., Fatema, K.: A privacy preserving authorisation system for the Cloud. J. Comput. Syst. Sci. 78, 1359–1373 (2012)

    Article  Google Scholar 

  21. Johnson, A.P., Chakraborty, R., Mukhopadhyay, D.: A PUF-enabled secure architecture for FPGA-based IoT applications. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 110–122 (2015)

    Article  Google Scholar 

  22. Tobisch, J., Becker, G.T.: On the scaling of machine learning attacks on PUFs with application to noise bifurcation. In: Mangard, S., Schaumont, P. (eds.) RFIDSec 2015. LNCS, vol. 9440, pp. 17–31. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24837-0_2

    Chapter  Google Scholar 

  23. Seetharam, N., et al.: Hardware Trojan detection by multiple-parameter side-channel analysis. IEEE Trans. Comput. 62(11), 2183–2195 (2012)

    MathSciNet  MATH  Google Scholar 

  24. ISE Design Suite Overview, Xilinx Inc. https://www.xilinx.com/support/documentation/sw_manuals/xilinx11/ise_c_overview.htm. Accessed 21 May 2019

  25. Digilent Nexys 4 Artix-7 FPGA Trainer Board, Xilinx Inc. https://www.xilinx.com/products/boards-and-kits/1-3yznp5.html. Accessed 21 May 2019

  26. Xilinx Power Estimator User Guide, Xilinx Inc. (2018). https://www.xilinx.com/support/documentation/sw_manuals/xilinx2018_3/ug440-xilinx-power-estimator.pdf. Accessed 21 May 2019

  27. ChipScope Pro Software and Cores, Xilinx Inc. (2012). https://www.xilinx.com/support/documentation/sw_manuals/xilinx14_7/chipscope_pro_sw_cores_ug029.pdf. Accessed 21 May 2019

  28. Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026–2030 (2002). https://doi.org/10.1126/science.1074376. Bibcode:2002Sci...297.2026P. hdl:1721.1/45499. PMID 12242435

    Article  Google Scholar 

  29. Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Silicon physical random functions. In: Proceedings of the Computer and Communications Security Conference, November 2002

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hussain Al-Aqrabi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al-Aqrabi, H., Johnson, A.P., Hill, R., Lane, P., Liu, L. (2019). A Multi-layer Security Model for 5G-Enabled Industrial Internet of Things. In: Wang, G., El Saddik, A., Lai, X., Martinez Perez, G., Choo, KK. (eds) Smart City and Informatization. iSCI 2019. Communications in Computer and Information Science, vol 1122. Springer, Singapore. https://doi.org/10.1007/978-981-15-1301-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1301-5_23

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1300-8

  • Online ISBN: 978-981-15-1301-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics