2017 IEEE International Conference on Industrial Technology (ICIT) 2017
DOI: 10.1109/icit.2017.7915575
|View full text |Cite
|
Sign up to set email alerts
|

Bring your own key for the industrial Internet of Things

Abstract: Abstract-High tech strategies such as Industry 4.0 and Smart Manufacturing require industrial devices to be connected to the Internet. This movement towards interconnected industrial devices poses significant security risks as confidential data must be transferred and stored using untrustworthy channels and cloud servers. End-to-end private key cryptography is suitable to protect the confidentiality, integrity, and authenticity of data. However, private key cryptography has some drawbacks such as the so-called… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 37 publications
0
9
0
Order By: Relevance
“…Obtained Results/Conclusions [41] To address the key distribution challenges of end-to-end private key cryptography using BYOK principle based on NFC technology in order to enhance the protection and confidentiality of transmitted data in IIoT environments.…”
Section: Aim Of Research Technological Approach Methodology Contributmentioning
confidence: 99%
See 2 more Smart Citations
“…Obtained Results/Conclusions [41] To address the key distribution challenges of end-to-end private key cryptography using BYOK principle based on NFC technology in order to enhance the protection and confidentiality of transmitted data in IIoT environments.…”
Section: Aim Of Research Technological Approach Methodology Contributmentioning
confidence: 99%
“…Industrial internet of things (IIoT) [38] involves the deployment of the concept of IoT and its technologies in industrial systems such as small-scale and automobile manufacturing sector, transportation, medicine, and logistics systems. Adopting the IoT concept in industries and smart factories offer several operational benefits such as test time reduction and calibration, production downtime minimization, warranty cost reduction, improved yield, quality and supply chain efficiency as well as the performance of predictive maintenance [39][40][41]. In this section, a review of IIoT is presented.…”
Section: Internet Of Things In Industrial Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Another requirement that comes from using the same authentication method throughout the entire lifecycle of the sensor, is the possibility of changing cryptographic keys, encryption parameters, usernames and passwords. This can be subsumed with the term Bring Your Own Key / Encryption (BYOK / BYOE) [13]. With the use of such methods it can be assured that the device cannot be read by anyone except the authorized persons.…”
Section: Designmentioning
confidence: 99%
“…However, due to the home automation focus, the security level provided by that approach is considered as insufficient for industrial scenarios. Ulz et al [14] present a key update process for industrial devices based on NFC. However, this approach does not allow arbitrary configuration data to be transferred.…”
Section: Background and Related Work A Device Configurationmentioning
confidence: 99%