Two-Factor Device DNA-Based Fuzzy Vault for Industrial IoT Device Security

The benefit of a smart manufacturing Industrial Internet of Things (IIoT) platform is that it can provide real-time monitoring, accurate analysis, and reporting for equipment by collecting data throughout the whole manufacturing facility. However, the increased internet connectivity of manufacturing...

Full description

Bibliographic Details
Main Authors: Eungi Hong, Sangjae Lee, Mi-Kyung Oh, Seung-Hyun Seo
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9476034/
id doaj-f3e96937dd2941e198558e780203a6e5
record_format Article
spelling doaj-f3e96937dd2941e198558e780203a6e52021-07-19T23:00:09ZengIEEEIEEE Access2169-35362021-01-019990099902310.1109/ACCESS.2021.30953489476034Two-Factor Device DNA-Based Fuzzy Vault for Industrial IoT Device SecurityEungi Hong0https://orcid.org/0000-0003-0903-5659Sangjae Lee1Mi-Kyung Oh2https://orcid.org/0000-0002-5712-8625Seung-Hyun Seo3https://orcid.org/0000-0002-1150-7080Division of Electrical Engineering, Hanyang University at ERICA, Ansan, Republic of KoreaElectronics and Telecommunications Research Institute, Daejeon, Republic of KoreaElectronics and Telecommunications Research Institute, Daejeon, Republic of KoreaDivision of Electrical Engineering, Hanyang University at ERICA, Ansan, Republic of KoreaThe benefit of a smart manufacturing Industrial Internet of Things (IIoT) platform is that it can provide real-time monitoring, accurate analysis, and reporting for equipment by collecting data throughout the whole manufacturing facility. However, the increased internet connectivity of manufacturing machines or devices leads to various security vulnerabilities. In order to securely operate smart manufacturing IIoT systems in unmanned environments, it is necessary to establish a cryptographic key for protecting exchanged data between IIoT devices and stored data in the devices by using cryptographic algorithms. Especially, since the IIoT system is in an unmanned environment, the following two challenges must be solved: 1) The IIoT device must recover its own secret key without user interaction. 2) The IIoT device must prevent secret key recovery when anomaly situations such as unauthorized physical access occur. In this paper, we present a novel method to protect an IIoT device’s secret key in unmanned smart manufacturing environments, called Two-Factor Device DNA-based Fuzzy Vault scheme. To satisfy the two challenges, our proposed method generates a specific two-factor device DNA through the combination of the IIoT device’s intrinsic factor and its surrounding environments and then creates a vault set to conceal the secret key based on the two-factor device DNA. We also implement a prototype for ensuring the feasibility of our method by utilizing an EPUF and IEEE 802.15.4g receiver in a Raspberry Pi and a laptop, respectively, and then measure their performance. We then conduct experiments in an unmanned environment at the Smart Manufacturing Learning Center at Hanyang University by considering various normal and abnormal situations. Our experiment results show that the proposed method quickly extracts the secret key stored in the device in normal cases, but fails at key extraction in abnormal cases.https://ieeexplore.ieee.org/document/9476034/Received signal strength (RSS)device DNAphysical unclonable function (PUF)fuzzy vault
collection DOAJ
language English
format Article
sources DOAJ
author Eungi Hong
Sangjae Lee
Mi-Kyung Oh
Seung-Hyun Seo
spellingShingle Eungi Hong
Sangjae Lee
Mi-Kyung Oh
Seung-Hyun Seo
Two-Factor Device DNA-Based Fuzzy Vault for Industrial IoT Device Security
IEEE Access
Received signal strength (RSS)
device DNA
physical unclonable function (PUF)
fuzzy vault
author_facet Eungi Hong
Sangjae Lee
Mi-Kyung Oh
Seung-Hyun Seo
author_sort Eungi Hong
title Two-Factor Device DNA-Based Fuzzy Vault for Industrial IoT Device Security
title_short Two-Factor Device DNA-Based Fuzzy Vault for Industrial IoT Device Security
title_full Two-Factor Device DNA-Based Fuzzy Vault for Industrial IoT Device Security
title_fullStr Two-Factor Device DNA-Based Fuzzy Vault for Industrial IoT Device Security
title_full_unstemmed Two-Factor Device DNA-Based Fuzzy Vault for Industrial IoT Device Security
title_sort two-factor device dna-based fuzzy vault for industrial iot device security
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2021-01-01
description The benefit of a smart manufacturing Industrial Internet of Things (IIoT) platform is that it can provide real-time monitoring, accurate analysis, and reporting for equipment by collecting data throughout the whole manufacturing facility. However, the increased internet connectivity of manufacturing machines or devices leads to various security vulnerabilities. In order to securely operate smart manufacturing IIoT systems in unmanned environments, it is necessary to establish a cryptographic key for protecting exchanged data between IIoT devices and stored data in the devices by using cryptographic algorithms. Especially, since the IIoT system is in an unmanned environment, the following two challenges must be solved: 1) The IIoT device must recover its own secret key without user interaction. 2) The IIoT device must prevent secret key recovery when anomaly situations such as unauthorized physical access occur. In this paper, we present a novel method to protect an IIoT device’s secret key in unmanned smart manufacturing environments, called Two-Factor Device DNA-based Fuzzy Vault scheme. To satisfy the two challenges, our proposed method generates a specific two-factor device DNA through the combination of the IIoT device’s intrinsic factor and its surrounding environments and then creates a vault set to conceal the secret key based on the two-factor device DNA. We also implement a prototype for ensuring the feasibility of our method by utilizing an EPUF and IEEE 802.15.4g receiver in a Raspberry Pi and a laptop, respectively, and then measure their performance. We then conduct experiments in an unmanned environment at the Smart Manufacturing Learning Center at Hanyang University by considering various normal and abnormal situations. Our experiment results show that the proposed method quickly extracts the secret key stored in the device in normal cases, but fails at key extraction in abnormal cases.
topic Received signal strength (RSS)
device DNA
physical unclonable function (PUF)
fuzzy vault
url https://ieeexplore.ieee.org/document/9476034/
work_keys_str_mv AT eungihong twofactordevicednabasedfuzzyvaultforindustrialiotdevicesecurity
AT sangjaelee twofactordevicednabasedfuzzyvaultforindustrialiotdevicesecurity
AT mikyungoh twofactordevicednabasedfuzzyvaultforindustrialiotdevicesecurity
AT seunghyunseo twofactordevicednabasedfuzzyvaultforindustrialiotdevicesecurity
_version_ 1721294490856062976