Bring Your Own Key for the Industrial Internet of Things

Thomas Ulz, Thomas Pieber, Christian Steger, Sarah Haas, Holger Bock, Rainer Matischek

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

Abstract

High tech strategies such as Industry 4.0 and Smart Manufacturing require industrial devices to be connected to the Internet. This movement towards interconnected industrial devices poses significant security risks as confidential data must be transferred and stored using untrustworthy channels and cloud servers. End-to-end private key cryptography is suitable to protect the confidentiality, integrity, and authenticity of data. However, private key cryptography has some drawbacks such as the so-called key distribution problem. A possible solution, factory installed keys, are untrustworthy as the two partners relying on end-to-end cryptography can not be sure that no other party is in possession of the used keys. To overcome these problems, the Bring Your Own Key (BYOK) principle based on Near Field Communication (NFC) and dedicated secured hardware is presented in this paper.
Originalspracheenglisch
TitelProceedings of the 2017 IEEE International Conference on Industrial Technology (ICIT)
Seiten1430-1435
DOIs
PublikationsstatusVeröffentlicht - 2017
VeranstaltungIEEE International Conference on Industrial Technology - Toronto, Kanada
Dauer: 22 Mär 201725 Mär 2017
http://icit2017.org/

Konferenz

KonferenzIEEE International Conference on Industrial Technology
KurztitelICIT 2017
LandKanada
OrtToronto
Zeitraum22/03/1725/03/17
Internetadresse

Fingerprint

Cryptography
Industrial plants
Servers
Internet
Hardware
Internet of things
Industry
Near field communication

Schlagwörter

    Dies zitieren

    Ulz, T., Pieber, T., Steger, C., Haas, S., Bock, H., & Matischek, R. (2017). Bring Your Own Key for the Industrial Internet of Things. in Proceedings of the 2017 IEEE International Conference on Industrial Technology (ICIT) (S. 1430-1435) https://doi.org/10.1109/ICIT.2017.7915575

    Bring Your Own Key for the Industrial Internet of Things. / Ulz, Thomas; Pieber, Thomas; Steger, Christian; Haas, Sarah; Bock, Holger; Matischek, Rainer.

    Proceedings of the 2017 IEEE International Conference on Industrial Technology (ICIT). 2017. S. 1430-1435.

    Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandForschungBegutachtung

    Ulz, T, Pieber, T, Steger, C, Haas, S, Bock, H & Matischek, R 2017, Bring Your Own Key for the Industrial Internet of Things. in Proceedings of the 2017 IEEE International Conference on Industrial Technology (ICIT). S. 1430-1435, Toronto, Kanada, 22/03/17. https://doi.org/10.1109/ICIT.2017.7915575
    Ulz T, Pieber T, Steger C, Haas S, Bock H, Matischek R. Bring Your Own Key for the Industrial Internet of Things. in Proceedings of the 2017 IEEE International Conference on Industrial Technology (ICIT). 2017. S. 1430-1435 https://doi.org/10.1109/ICIT.2017.7915575
    Ulz, Thomas ; Pieber, Thomas ; Steger, Christian ; Haas, Sarah ; Bock, Holger ; Matischek, Rainer. / Bring Your Own Key for the Industrial Internet of Things. Proceedings of the 2017 IEEE International Conference on Industrial Technology (ICIT). 2017. S. 1430-1435
    @inproceedings{8a6626f47cb2407a9150bc48120b76a4,
    title = "Bring Your Own Key for the Industrial Internet of Things",
    abstract = "High tech strategies such as Industry 4.0 and Smart Manufacturing require industrial devices to be connected to the Internet. This movement towards interconnected industrial devices poses significant security risks as confidential data must be transferred and stored using untrustworthy channels and cloud servers. End-to-end private key cryptography is suitable to protect the confidentiality, integrity, and authenticity of data. However, private key cryptography has some drawbacks such as the so-called key distribution problem. A possible solution, factory installed keys, are untrustworthy as the two partners relying on end-to-end cryptography can not be sure that no other party is in possession of the used keys. To overcome these problems, the Bring Your Own Key (BYOK) principle based on Near Field Communication (NFC) and dedicated secured hardware is presented in this paper.",
    keywords = "Near Field Communication, Industrial Internet of Things, Cryptography, Keys, Security Controller",
    author = "Thomas Ulz and Thomas Pieber and Christian Steger and Sarah Haas and Holger Bock and Rainer Matischek",
    year = "2017",
    doi = "10.1109/ICIT.2017.7915575",
    language = "English",
    pages = "1430--1435",
    booktitle = "Proceedings of the 2017 IEEE International Conference on Industrial Technology (ICIT)",

    }

    TY - GEN

    T1 - Bring Your Own Key for the Industrial Internet of Things

    AU - Ulz, Thomas

    AU - Pieber, Thomas

    AU - Steger, Christian

    AU - Haas, Sarah

    AU - Bock, Holger

    AU - Matischek, Rainer

    PY - 2017

    Y1 - 2017

    N2 - High tech strategies such as Industry 4.0 and Smart Manufacturing require industrial devices to be connected to the Internet. This movement towards interconnected industrial devices poses significant security risks as confidential data must be transferred and stored using untrustworthy channels and cloud servers. End-to-end private key cryptography is suitable to protect the confidentiality, integrity, and authenticity of data. However, private key cryptography has some drawbacks such as the so-called key distribution problem. A possible solution, factory installed keys, are untrustworthy as the two partners relying on end-to-end cryptography can not be sure that no other party is in possession of the used keys. To overcome these problems, the Bring Your Own Key (BYOK) principle based on Near Field Communication (NFC) and dedicated secured hardware is presented in this paper.

    AB - High tech strategies such as Industry 4.0 and Smart Manufacturing require industrial devices to be connected to the Internet. This movement towards interconnected industrial devices poses significant security risks as confidential data must be transferred and stored using untrustworthy channels and cloud servers. End-to-end private key cryptography is suitable to protect the confidentiality, integrity, and authenticity of data. However, private key cryptography has some drawbacks such as the so-called key distribution problem. A possible solution, factory installed keys, are untrustworthy as the two partners relying on end-to-end cryptography can not be sure that no other party is in possession of the used keys. To overcome these problems, the Bring Your Own Key (BYOK) principle based on Near Field Communication (NFC) and dedicated secured hardware is presented in this paper.

    KW - Near Field Communication

    KW - Industrial Internet of Things

    KW - Cryptography

    KW - Keys

    KW - Security Controller

    U2 - 10.1109/ICIT.2017.7915575

    DO - 10.1109/ICIT.2017.7915575

    M3 - Conference contribution

    SP - 1430

    EP - 1435

    BT - Proceedings of the 2017 IEEE International Conference on Industrial Technology (ICIT)

    ER -