Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things

As the number of controllers and devices increases in Industrial Internet of Things (IIoT) applications, it is essential to provide a secure and usable user authentication system for human operators who have to manage tens or hundreds of controllers and devices with his/her password. In this paper,...

Full description

Bibliographic Details
Main Authors: Jusop Choi, Junsung Cho, Hyoungshick Kim, Sangwon Hyun
Format: Article
Language:English
Published: MDPI AG 2020-03-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/10/6/1962
id doaj-1edd3619751a4349adbe7503dcb49473
record_format Article
spelling doaj-1edd3619751a4349adbe7503dcb494732020-11-25T01:37:46ZengMDPI AGApplied Sciences2076-34172020-03-01106196210.3390/app10061962app10061962Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of ThingsJusop Choi0Junsung Cho1Hyoungshick Kim2Sangwon Hyun3Department of Computer Science and Engineering, Sungkyunkwan University, Suwon, Gyeonggi-do 16419, KoreaDepartment of Computer Science and Engineering, Sungkyunkwan University, Suwon, Gyeonggi-do 16419, KoreaDepartment of Computer Science and Engineering, Sungkyunkwan University, Suwon, Gyeonggi-do 16419, KoreaDepartment of Computer Engineering, Myongji University, Yongin, Gyeonggi-do 17058, KoreaAs the number of controllers and devices increases in Industrial Internet of Things (IIoT) applications, it is essential to provide a secure and usable user authentication system for human operators who have to manage tens or hundreds of controllers and devices with his/her password. In this paper, we propose a <i>formally verified</i> certificate-based authentication system using a secondary network device for such IIoT applications. In the proposed system, a user&#8217;s sign key is encrypted with a secret key that can be computed with his/her password and a secret parameter in a secondary device to securely protect the sign key. To demonstrate the feasibility of the proposed system, we implemented a prototype with standard cryptographic algorithms (AES-256, RSA-3072, and ECDSA-256). The experiment results demonstrated that the execution time overhead of the sign key recovery process was 0.039 and 0.073 s, respectively, for RSA-3072 and ECDSA-256, which was marginal compared with the total execution time (0.383 s for RSA-3072 and 0.319 s for ECDSA-256) of the conventional system. We also verified the security of the proposed protocol using a formal verification tool called ProVerif.https://www.mdpi.com/2076-3417/10/6/1962industrial controllerkey managementkey protectionuser authentication
collection DOAJ
language English
format Article
sources DOAJ
author Jusop Choi
Junsung Cho
Hyoungshick Kim
Sangwon Hyun
spellingShingle Jusop Choi
Junsung Cho
Hyoungshick Kim
Sangwon Hyun
Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things
Applied Sciences
industrial controller
key management
key protection
user authentication
author_facet Jusop Choi
Junsung Cho
Hyoungshick Kim
Sangwon Hyun
author_sort Jusop Choi
title Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things
title_short Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things
title_full Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things
title_fullStr Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things
title_full_unstemmed Towards Secure and Usable Certificate-Based Authentication System Using a Secondary Device for an Industrial Internet of Things
title_sort towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things
publisher MDPI AG
series Applied Sciences
issn 2076-3417
publishDate 2020-03-01
description As the number of controllers and devices increases in Industrial Internet of Things (IIoT) applications, it is essential to provide a secure and usable user authentication system for human operators who have to manage tens or hundreds of controllers and devices with his/her password. In this paper, we propose a <i>formally verified</i> certificate-based authentication system using a secondary network device for such IIoT applications. In the proposed system, a user&#8217;s sign key is encrypted with a secret key that can be computed with his/her password and a secret parameter in a secondary device to securely protect the sign key. To demonstrate the feasibility of the proposed system, we implemented a prototype with standard cryptographic algorithms (AES-256, RSA-3072, and ECDSA-256). The experiment results demonstrated that the execution time overhead of the sign key recovery process was 0.039 and 0.073 s, respectively, for RSA-3072 and ECDSA-256, which was marginal compared with the total execution time (0.383 s for RSA-3072 and 0.319 s for ECDSA-256) of the conventional system. We also verified the security of the proposed protocol using a formal verification tool called ProVerif.
topic industrial controller
key management
key protection
user authentication
url https://www.mdpi.com/2076-3417/10/6/1962
work_keys_str_mv AT jusopchoi towardssecureandusablecertificatebasedauthenticationsystemusingasecondarydeviceforanindustrialinternetofthings
AT junsungcho towardssecureandusablecertificatebasedauthenticationsystemusingasecondarydeviceforanindustrialinternetofthings
AT hyoungshickkim towardssecureandusablecertificatebasedauthenticationsystemusingasecondarydeviceforanindustrialinternetofthings
AT sangwonhyun towardssecureandusablecertificatebasedauthenticationsystemusingasecondarydeviceforanindustrialinternetofthings
_version_ 1725057464616878080