Light-Weight Secure IoT Key Generator and Management- juniper Publishers

Juniper Publishers- Journal of Robotics


Abstract

Security is a critical element for IoT deployment that affects the adoption rate of IoT applications. This paper presents a Light-Weight Secure IoT Key Generator and Management Solution(LKGM) for industry automation and applications. Our solution uses minimum computing and memory resources that can be installed on half-credit-card-size embedded systems that enhances the securityof end-to-end communications for IoT nodes. A frequently changed randomly generated passphrase isused to authenticate each IoT node that is embedded with an encrypted unique authentication key. Fieldtest results were presented for an advanced manufacturing application that will only be activated whentwo authenticated IoT nodes are within the vicinity.
Keywords: Authentication; Authority; Secure key; IoT; Security; Industry automation


Introduction

Internet of Things (IoT) is a network of physical objects that have unique identifiers capable ofproducing and transmitting data across a network seamlessly. IoT system refers to a loosely coupled,decentralized system of devices augmented with sensing, processing, and network capabilities [1,2].IoT is projected to be one of the fastest growing technology segments in the next 3 to 5 years [3]. IoTapplications are being developed and deployed in an exponentially increase manner in many smart city’s initiatives around the world. Gartner Group has estimated that there will be 25 billion connectedIoT devices by 2020, and that IoT services will constitute a total spending of $263 billion.Unfortunately, this growth in connected devices brings increased security risks [4]. As indicated byFrost & Sullivan[5]; Miorandi et al., and Weber[6,7], security is the major hindrance for the wide scale adoption of IoT. Inaddition, the increasing use of multi-vendors IoT nodes which are often only have minimum securityprotection that resulted in more complex security scenarios and threats beyond the current Internet iswill arise.Constant sharing of information between “things” and users can occur without proper authentication and authorization. Currently, there are no trustworthy platforms that provide access control andpersonalized security policy based on users’ needs and contexts across different types of “things”.The “things” in any IoT network are often unattended; therefore, they are vulnerable to attacks.Moreover, most IoT communications are wireless that make eavesdropping easy [6,8]. The futurewidespread adoption of IoT will extend the information security risks far more widely than the Internethas to date [9].
In an ad-hoc IoT network where IoT nodes are localized and self-organized, network infrastructureis not required. Security of the IoT nodes that operate in such ad-hoc peer-to-peer networks areincreasingly becoming an important and critical challenge to solve as many applications in such IoTnetwork becomes commercially viable. As ad-hoc IoT network has a frequently changing networktopology, and the IoT nodes have limited processor power, memory size and battery power, acentralized security authentication server/node becomes impractical to be implemented.


Methods

In our applied research work, “KeyThings” was developed as part of the project title “Collaborative Cross-Layer Secure IoT Gateways” funded by the Singapore NRF-TRD. Our solution consisted of two main systems, namely the Security Key Generation System (SKG) and Security Key Management System (SKM). The objective of our project is to allow an IoT application (e.g. a web service, etc.) to be activated only when a pre-determined number of authenticated IoT nodes are within the vicinity. This enhances the security of the IoT application by authenticating the hardware (i.e. IoT nodes) instead of just authenticating based on the usual usernames and passwords. The authentication process is done in the system’s background without the need for human intervention which is critical in some operation environment (e.g. manufacturing, production, remote sites, etc.) where not all staff are given access to the sensors’ readings due to security issues. The staff are categorized into “non-authorized”, “operator” and “supervisor”.

Below are the features of our Solution

a. “Non-authorized” personnel who are not issued with the authenticated IoT node will not have 60 access to the sensors’ readings.
b. Only authorized “operator” who has an authenticated IoT node is able to view the sensors’ 62 readings only when the “operator” is in the vicinity.
c. The authorized “supervisor” with an authenticated IoT node that is with higher access rights, 64 can view the sensors’ readings and the summary report. If the “supervisor” leaves the vicinity, 65 the summary report will no longer be available.
d. All authentications are done in the solution’s background without the need for human 67 intervention.


Solution Setup

Equipment (Figure 1)

A. The setup consists of the following equipment
a. Authentication Server
b. Client device 1
c. Client device 2
d. Application Server
e. Tablet
Authentication server (KeyThings-Server): The authentication server is the “brain” of the security key management. It has the following 92 responsibilities:
A. Access point: Serves as the access point to the entire system.
B. Generate random passphrase periodically
i. If there is no authenticated device, the passphrase will remain the same.
ii. If there is one or more authenticated device, a new random passphrase will be generated at 98the end of each time interval (after every 5 MQTT broadcasts).
C. MQTT Server: It will broadcast the generated passphrase via MQTT to all subscribedKeyThings-Clients.
i. Once every 2 seconds.
ii. MQTT topic: authentication/challenge
D. Web Server via REST API.
E. For KeyThings
i. -clients to submit their encrypted passphrase.
ii. For application server to query the number of authenticated devices.
F. Authentication: The server stores the encrypted credentials and MD5 of the KeyThings-Clients that were generated from the Security Key Generation System.
Client devices (KeyThings-Client): Each client device contains the unique security key that is used for authentication to gain access to 113 different web services. The key must be generated from the Security Key Generation System. Thedevice has the following responsibilities:
A) MQTT client. Registers and listens to the broadcasted passphrase.
B) Encryption. Encrypts the passphrase that was received via MQTT.
a. If the received passphrase is the same as previous passphrase, the device will just ignorethepassphrase and does nothing.
b. If the received passphrase is different from the previous passphrase, then the passphrase will be encrypted.
c. HTTP Request / Response. Send the encrypted passphrase to the authentication server(KeyThings- Server) once the encryption has been completed.
Application server: The application server hosts the production webpage (i.e. the machine readings and summary report). It is currently running on Raspberry Pi, but it can be hosted on any environment (i.e., Windows or Linux) that has network connectivity to the Access Point. The application server has the following responsibilities:
a) HTTP Request / Response: Host the webpage that can be access via the tablet.
Tablet: The tablet is used to view the web page that contains the manufacturing data (machine readings andsummary report) from the application server.

Result

Below is what you will see when different numbers of devices have been authenticated Figure 2.


Discussion

The test was conducted successfully with results indicated that a light-weight security key generation and authentication method can be easily implemented in a distributed manner for a self-organizingnetwork to enhance IoT nodes and service level security in an industry automation environment. The method and the solution can be applied to provide features such as multi-level security for different stake holders in an advanced manufacturing environment, multi-factor security keys, user definable security- based services and policy, etc. The solutions can easily be scaled and adapted to suite various industry needs and expectation in enhancing the security of IoT nodes, sensors, PLC controllers, robots, etc. to meet their business needs.


Conclusion


In this paper, a Light-Weight Secure IoT Key Generator and Management Solution (LKGM) for industry automation and applications for enhancing the security of peer-to-peer communications among IoT nodes is presented. The LKGM is integrated to half-credit-card-size embedded systems. Our experimental results showed that the solution enhances secured peer-to-peer IoT communications amongst the IoT node. Field tests were conducted successfully for a manufacturing application that uses web services.

For More Open Access Journals Please Click on: Juniper Publishers
Fore More Articles Please Visit: Robotics & Automation Engineering Journal

Comments

Popular posts from this blog

Geometric Simulation for 3D-Printed Soft Robots- Juniper Publishers

Industry 4.0`S Product Development Process Aided by Robotic Process Automation- Juniper Publishers

Research on Electromagnetic Driving Robot Fish-Juniper Publishers