Next Article in Journal
Wide Two-Degree-of-Freedom Static Laser Scanner with Miniaturized Transmission Mechanism and Piezoelectric Actuation
Previous Article in Journal
Neural-Network Based Modeling of I/O Buffer Predriver under Power/Ground Supply Voltage Variations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography

College of Electrical and Information Engineering, Anhui University of Science & Technology, Huainan 232000, China
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(18), 6084; https://doi.org/10.3390/s21186084
Submission received: 5 August 2021 / Revised: 8 September 2021 / Accepted: 8 September 2021 / Published: 10 September 2021
(This article belongs to the Section Internet of Things)

Abstract

:
The Industrial IoT is one of the key technologies to improve industrial production efficiency. The entire production process usually involves multiple production regions and numerous smart devices (sensors and actuators). The efficiency of the Industrial IoT is limited by this strong coupling relationship between the subsystem and the sensors and actuators. In this paper, to unleash the potential of Industrial IoT, a safe and reliable data sharing mechanism of sensors and actuators is proposed. We deployed distributed identity authentication and data proxy services in various regions. In the device authentication process, we used identity-based encryption algorithms, and we solved the trust problem between different regions by introducing a private blockchain. In addition, we designed the model of device capability (MDC) to describe the device, enabling it to be shared with a standard interface. Finally, we conducted many performance tests on the proposed mechanism. The test results verified the effectiveness and efficiency of the proposed mechanism.

1. Introduction

The core feature of Industry 4.0 is the information interconnection of the entire production process. Thus, the key to industry production entering the era of Industry 4.0 is to speed up the development of information physics systems. Enterprises deploy a large number of sensors and actuators in each production process, but these devices can only act on the subsystem to which they belong. The strong coupling between devices and subsystems limits the effectiveness of the Industrial Internet of Things (I-IoT).
In the engineering practice of industrial production companies represented by coal mines, we always find it difficult to call the data of the company’s existing sensors and actuators. Obviously, this restricts the efficient operation of the I-IoT.
Although terminal devices can communicate with each other from the perspective of network topology, establishing a secure communication channel with a controllable identity is one of the issues that need to be addressed.
Unprotected exposure of terminal equipment to the system will cause serious security vulnerabilities. This is because sensors and actuators can directly affect the physical world. For example, malicious people who can illegally control the actuators on the production line will cause serious accidents. It is necessary to establish a sharing mechanism for sensors and actuators. This mechanism needs to resolve these problems:
Establish a secure and reliable communication link for visitors who access the sensors and actuators.
Ensure that the identities of communication parties in the system are trusted.
Be compatible with heterogeneous devices.
To build a safe and reliable sharing mechanism of sensors and actuators in industrial IoT, we formulated the following design goals and principles:
Simple structure: To ensure the efficiency of the mechanism, the structure should be relatively simple and new entities should not be introduced unnecessarily.
Good compatibility: The mechanism should minimize the need for computing capacity of terminal devices and ensure its availability to capacity-constrained devices.
Communication link security: The mechanism should provide secure end-to-end communication and secure communication links for devices and visitors.
Controllable access permissions: The mechanism should refuse unauthorized user access and actively close the data link.
Identity privacy protection: The mechanism should ensure that the device identification information is not leaked and prevent malicious users from intercepting data packets to know what resources entities access.
Credible identity: The device should be trusted to ensure a reliable data source or control object. Visitors should be trusted to ensure that resources are not stolen by malicious third parties.
Low coupling between regions: The coupling between regions should be minimized to enhance the robustness of the entire system.
Guided by the above principles and objectives, we proposed a sharing mechanism of sensors and actuators (SMSA) based on a blockchain-assisted IBC (Identity-Based Cryptosystem). In this mechanism, terminal devices can safely and reliably share their capabilities. Through the model of device capability, visitors can call terminal devices in a standard way. Our contribution can be summarized as follows:
We proposed an efficient and secure sharing mechanism of sensors and actuators (SMSA) that can realize the ability sharing of various sensors and actuators in industrial IoT and give full play to the ability of various sensors and actuators in the network.
We constructed an identity authentication service based on blockchain-assisted IBC in SMSA to avoid maintaining many certificates in the system and improve the operation efficiency of the system.
The characteristics of sensors and actuators in mines were analyzed, and the capability description model of devices was designed to form Industrial IoT-distributed soft buses.
We conducted a safety analysis of the SMSA, then set up an experimental environment for performance evaluation. The test results showed that the performance of the SMSA computing overhead and data exchange delay met the requirements.
The rest of this paper is organized as follows. In the second section, we introduce the technical research work related to the sharing mechanism proposed in this paper. In the third section, we describe the problems to be solved and the technical background of the sharing mechanism. In Section 4, an overview of the mechanism is given, while the design details are given in Section 5. In Section 6, we describe our experiments to verify the effectiveness of the SMSA. Finally, the work is summarized in the seventh section.

2. Related Work

Sensor or actuator deployment performs fixed tasks. However, this deployment mode causes the sensors or actuators to be a specific sub-function of the Industrial IoT (I-IoT). When other tasks are needed to collect the same data, it is difficult to invoke existing sensor data, and this is often done by redeployment.
In the framework of cyber-physical convergence, industrial equipment will be generating large amounts of data for real-time control. Data in the Industrial IoT are becoming more and more important. Havlik et al. proposed simplifying service access data by building a standardized sensor data sharing platform [1]. They formatted the sensor data stream into a time series, which is convenient for visitors to call. Lim et al. pointed out that strong coupling between sensors and applications limits the availability of sensor data. To enhance the availability of sensor data, the team proposed building a flexible open platform. This platform can describe sensor capabilities and publish or subscribe to sensor data through standardized middleware [2]. To solve the problem of industrial wireless network communication data access in a multi-hop environment, Raptis et al. proposed a distributed data access method [3]. However, this model does not consider the issue of data access security. Sharing the data of various sensors in the network will challenge the security of each level of services. Malicious third parties can use tools similar to the Shodan [4] search engine to scan and obtain device control ports.
In the field of Industrial IoT security, researchers have done a lot of work. Borhani et al. summarized the security problems faced by the Industrial Internet of Things and possible solutions [5]. Gurtov and others analyzed the challenges faced by the Industrial Internet in the process of communication and data processing and proposed a secure communication architecture [6]. IoT systems already contain many kinds of authentication measures to protect communication safety. From the difference in encrypting keys, there are two categories of encryption algorithms: the symmetric encryption algorithm and the asymmetric cryptographic algorithm.

2.1. Encryption Algorithm

The symmetric encryption algorithm is a commonly used encryption method. The same key is used for encryption and decryption in the symmetric encryption algorithm [7]. The key is the command to control encrypt and decrypt processes. The algorithm is a group of rules that specify how to encrypt and decrypt. The safety of encryption depends on not only the algorithm but also the security management of the key is a decisive factor. Because of the simple structure of the symmetric encryption algorithm, it can encrypt or decrypt data at a high speed. This feature makes it suitable for scenarios where large amounts of data are transmitted. However, symmetric encryption algorithms are prone to security vulnerabilities during the key exchange process.
Message authentication code (MAC) [8] is a common technology in the symmetric encryption algorithm used to verify the identity of IoT devices. Wu et al. proposed ANA-MAC based on artificial-noise-aided [9]. Bellare et al. proposed nested construction (NMAC) and hash-based MAC (HMAC) [10]. HMAC hardware is integrated as a security measure in some embedded microprocessors. The problem of the symmetric key is a way to exchange keys safely [11].
Unlike symmetric encryption, asymmetric encryption does not require the exchange of all keys. The asymmetric cryptography algorithm encrypts the public key and private key through pairs, and the public key is visible to anyone [12]. Information encrypted by a private key can only be decrypted by the corresponding public key. Similarly, information encrypted by a private key can only be decrypted by the corresponding public key. In this case, encrypted communication is realized without exchanging all the keys, and the receiver can confirm that the message was sent by the private key holder. The encryption and decryption speed of asymmetric encryption algorithms is much slower than symmetric encryption algorithms [13]. This is because the structure of the asymmetric encryption algorithm is very complicated, which makes asymmetric encryption algorithms unsuitable for the transmission of large data volumes. Our basic idea is to build a secure key exchange channel between devices through an asymmetric encryption algorithm, then use a more efficient symmetric encryption algorithm to complete normal data encryption communication.

2.2. Certificate-Based Authentication

In the I-IoT, there are a large number of devices, and how to match the relationship between the key pair and the owner is one of the issues we needed to consider. The function of the certificate is to prove the mapping relationship between the key pair and the owner so that malicious third parties cannot fake the identities of other entities [14]. KumarVerma et al. proposed a certificate-based proxy signature scheme in the Industrial IoT scenario [15]. This solution provides data integrity authentication for the I-IoT at the lowest computational cost. Park designed a certificate-based security protocol for wireless mobile communication equipment [16]. In this protocol, an off-line authentication mechanism based on a dynamic certificate is introduced to realize the end-to-end Internet identity authentication key exchange protocol.
Certificate-based authentication requires a third party trusted by all as the certification authority (CA). The CA is the core of the Public Key Infrastructure (PKI), and it is the organ responsible for issuing certificates, certification certificates, and managing issued certificates.

2.3. Identity-Based Authentication

The mapping relationship between the user and its public key is verified by a certificate. In this case, a lot of certificates are managed by the certification authority. In identity-based mechanisms, however, the identity of the users is their public key [17]. The CA is not necessary for an identity-based system.
Wang applied identity-based authentication to portable mobile cellular networks to provide secure and anonymous conference calls [18]. Based on an identity-based hierarchical model for cloud computing (IBHMCC) and corresponding encryption and signature schemes, Li designed a new cloud computing and service authentication protocol, which reduced the burden on the user side compared with SAP (SSL Authentication Protocol) [19]. However, the above work failed to optimize the design for the situation of weak terminals in I-IoT. The computing capabilities of various terminals in the I-IoT are different, and the mechanisms need to have good compatibility.

2.4. Innovation of the Paper

In this paper, we proposed a sharing mechanism of sensors and actuators (SMSA) based on blockchain and IBC. The IBC technology is used to authentication the identity of entities in the I-IoT. Our innovation can be summarized as follow:
(1)
To improve the compatibility of the mechanism to weak terminals, we reduced the encryption and calculation links that need to be performed on the terminal side in the authentication mechanism.
(2)
We designed sub-regional authentication management based on edge computing technology to provide low latency authentication services for users in each region. The authentication information of each region is synchronized by blockchain technology to ensure the independence of each region. In this structure, when a certain region is attacked, the security of other regions can be guaranteed.
(3)
We designed the model of device capability (MDC) to unify the terminal device data calling interface.

3. Overview

In this section, we describe the application background of the SMSA in detail, including the status and problems of the I-IoT.

3.1. Industrial IoT Overview

The SMSA is designed with the characteristics of the I-IoT, so we first introduce the system structure and terminal equipment of the I-IoT.

3.1.1. Industrial IoT Structure

The I-IoT is the nerve center connecting all aspects of the production site. Through the I-IoT, all kinds of equipment in the production site can work together [20]. Edge computing nodes can provide lower latency computing services because they are closer to sensors and actuators than cloud servers [21].
The I-IoT is a heterogeneous integration network, terminal devices access the network through various communication gateways [22]. The industrial network takes high-speed industrial ethernet composed of optical fiber as its backbone and follows the Open System Interconnection (OSI) network standard protocol [23,24]. There are also field buses such as RS-485 in industrial production. The I-IoT inherits web services from the architecture that represent transmission status [25]. Communication between devices uses the Constrained Application Protocol (CoAP) [26], Message Queuing Telemetry Transport (MQTT) [27], and other protocols designed for the IoT environment.

3.1.2. Overview of Inductive Equipment for the Industrial IoT

In industrial production, a large number of sensors are needed to obtain the parameters of the environment and electromechanical equipment. As Table 1 shows, in the industrial production is represented by mines, and these sensors belong to different professional departments. The sensing devices include the time-driven sensor and the event-triggered sensor.
These sensors output signals through different interfaces, and some devices directly output analog signals without basic digital interfaces. For devices that do not have network communication capabilities, it is necessary to design heterogeneous fusion gateways to enable them to have secure communication capabilities.
Most I-IoT actuators are driven by Programmable Logic Controllers (PLCs). In addition to autonomous control based on sensor data, PLCs can also receive remote control commands via ethernet to drive the execution device.

3.2. Security Threat

There are a lot of security threats in the process of sharing sensors and actuators. These security threats are what we need to guard against in the process of designing the sharing mechanism.

3.2.1. Safety Capability of Sensors and Actuators

Sensors and actuators of the industrial IoT are not all driven by powerful SoCs (systems on chip). Manufacturers use low-power microprocessors to save production costs and reduce power consumption. The ESP32 series of SoC launched by Espressif has WiFi and Bluetooth 5.0. It is often used as the main control chip for wireless sensors and actuators. ESP32 has built-in hardware encryption accelerators (such as AES-128/192/256, HMAC, Digital Signature, etc.). It has basic security protection capabilities. However, due to the limitations of hardware resources, it is difficult to implement more flexible security policies. Therefore, in the sharing mechanism, sensors and actuators only complete basic security protection operations, and more complex security strategies are completed by agent devices.

3.2.2. Security Threat of the Industrial IoT

In the architecture of the I-IoT shown in Figure 1, if the sensors and actuators are directly shared within the network, this will cause serious security threats.
(1)
Privacy threat: Sensors and actuators are weak terminals. They cannot cope with sophisticated attack methods [28]. This means that if the interface of the terminal is directly exposed to the network, it will break the last layer of defense measures for the device. Attackers can get the privacy data by sniffer [29].
(2)
Impersonate identity: A malicious third party will pretend to be an authorized user to gain control of the terminal device [30]. These devices are difficult to find within a short time of being hijacked because of their unattended features.
(3)
Information congestion: To paralyze the industrial communication network, a malicious third party will use DDOS to attack key equipment in the network, causing information congestion [31]. This forms a distributed attack of denial service by infecting a large number of hosts with bot viruses [32].
(4)
CAs compromised: In traditional identity authentication methods, a trusted third party will be introduced (such as a CA). However, a CA is vulnerable to attacks, and there is no way to ensure that a CA will not be tempted by huge profits to cause corruption.

4. Overview of the SMSA

In this section, we will introduce the solution of the SMSA and describe the main structure.
A.
Structure of the SMSA
We designed the SMSA based on edge computing architecture to reduce latency in each region. As shown in Figure 2, the SMSA can be divided into four layers. The blockchain agent server (BAS), region key generate center (R-KGC), and identity management server (IMS) are all services running on edge computing facilities in each region. The data agent gateway (DAG) provides data agent services for various sensors and actuators in the region. The DAG and IMS of each region synchronize information through the BAS to help entity cross-region authentication.
The main private key of each R-KGC is independent. In this way, even if some R-KGCs’ main private keys are leaked, others’ main private keys are safe. In the SMSA, we chose to use identity-based signature (IBS) and the ephemeral elliptic curve Diffie–Hellman key exchange algorithm to construct the authentication and key agreement process.
B.
Blockchain Storage Layer
The blockchain storage layer is a distributed ledger composed of blockchain agent servers (BASs) in each region. The BAS needs to maintain three chains, namely, the identity management chain (I-Chain), the visa management chain (V-Chain), and the devices management chain (D-Chain).
The BAS encrypts the data that need to be shared and stores it in the storage area of the BAS. Then it generates an index to point to the locations of these data, which will be written into the blockchain. In this way, the safe sharing of data between each region is realized, and the problem of slow blockchain IO speed is avoided. As shown in Figure 3, transaction data is written into blockchain with the format of key-value. The key is the identification of the region. Devices in other regions can quickly query data from the BAS by index I D R e g i o n . The value includes two parts; one is the URL (Uniform Resource Locator) that points to where the data body is stored and the other is the MD5 value used to validate the data body.
By using the method of writing only index information in the blockchain without writing the data body, the amount of data that needs to be written to the blockchain can be effectively reduced. This data sharing method can shorten the time required for the BAS to write data.
C.
IBC Service Layer
The IBC service layer includes the IMS and R-KGC of each region.
(1)
Identity management server (IMS): IMS is the facility that is used to manage the entity’s identity of each region. The entity sends the identity information form and the expected validity time to the IMS. The IMS generates a unique identification code (ID) for it. The ID is the identification of an entity in the system, and it is also the public key of the entity. The IMS stores and manages the identity information of entities and provides services for proxy verification of entity identities. After the IMS verifies the identity of the entity through the public key, it digitally signs the information sent outside the region to provide a credit guarantee. This process is called visa application. In this way, cross-region authentication is realized.
(2)
Region key generate center (R-KGC): The R-KGC is a virtual server running on edge computing facilities. The entity sends the ID obtained from the IMS to the R-KGC to request the generation of a private key. The R-KGC, IMS, and BAS of each region form a high-level region, and they share the same system parameters.
D.
Data Agent Layer
The data agent layer is composed of each DAG. The DAG is the core of data interaction in the SMSA mechanism, mainly used to help sensors and actuators send and receive data safely. The DAG distributes sensor data to all authorized demanders. At the same time, the instructions of the authorized visitors are passed to the executor. In this way, weak terminals such as sensors and actuators are not directly exposed to the network.
E.
Terminal Device Layer
The terminal device is composed of various underlying devices in the I-IoT, including sensors, actuators, and various smart devices.

5. Mechanism Details

In this section, we will introduce the proposed SMSA mechanism in detail.

5.1. Entity Identity Authorization

The IBC is composed of four random algorithms, namely, Setup, Extract, Encrypt, and Decrypt. Before the system runs, running the setup algorithm first is necessary. After the setup algorithm runs, the system will be initialized, and the public parameters and main key will be returned. The public parameters will be made public, and the main private key is kept by the R-KGC.
Safety parameter k should be entered into the setup algorithm first. The cyclic addition group G 1 and cyclic multiplication group G 2 with order q are determined, and there is a bilinear map e : G 1 × G 1 G 2 . g is randomly generated as the generator of G 1 . The R-KGC randomly selects a s Z q * ( Z q * = 0 , 1 , 2 , , q 1 ) as the main private key, and the main public key is stated as P p u b = s g .
Two strong collision-resistant hash functions are defined: H 1 : 0 , 1 n G 1 ,   H 2 : G 1 × 0 , 1 * Z q * . The function H 1 is used for mapping the ID to the cyclic addition group G 1 . 0 , 1 n represents a set of binary sequence combinations of length n. The function H 2 is used to map a message of any length to an integer. 0 , 1 * is a set of sequence combinations of an arbitrary length. The public parameters of the system are: p a r a m s = k , q , G 1 , G 2 , g , e , H 1 , H 2 , P p u b .

5.1.1. Identity Management

In the IBC system, the public key of an entity is its identification. This avoids the CA managing a large number of certificates. In the SMSA, to protect device identity information privacy, entities do not directly use their identity information as a public key but use the ID generated by the IMS as a public key. The process of entity requesting ID is shown in Figure 4.
The entity sends the ID request to the IMS. The request information includes the entity’s attribute, expire-time, and a random number. The attribute is the identity characteristics of the entity, such as the MAC address, manufacturer, serial number, etc. Expire-time is the valid period of the ID generated by the IMS. The random number is generated randomly by entities to mark request information.
After receiving the request, the IMS first stores the information in the database and updates the index stored in the identity management chain through the BAS. The IMS uses private keys to digitally sign MD5, expire-time, and current timestamps for request information. Finally, the signature result is returned to the entity as the ID.
The random number in the request is very important; even though a malicious third party can obtain various attributes of entities by illegal means, it is difficult to obtain the randomly generated verification code of entities. Therefore, when sending requests to the IMS and R-KGC for authentication, the entity needs to attach the random number of ID acquisitions as the security check code.

5.1.2. Authentication Process

(1)
Request Private Key
An entity needs to send a request to the R-KGC after obtaining an ID to get a private key. The process of entity requesting private keys is shown in Figure 5.
After receiving the request of entities, The R-KGC should first verify whether the ID was issued by the IMS through the IMS public key and check whether it is within the validity period. If the check is ok, the R-KGC will generate a private key for the entity. The entity’s private key generated by the R-KGC is p k = s H 1 I D , the public key of the entity is p k = H 1 I D .
(2)
Local–Regional Authentication
Local–regional authentication is initiated by the party e i who claims its identity and verified by another part e j . The authentication information of e i is named T o k e n i j . The format of T o k e n i j is as follows:
T o k e n i j = D S p k i I D i R i T i | | T e x t I D i R i T i T e x t
where D S p k i X is e i using its private key p k i to sign message X . The digital signature algorithm is shown as Algorithm 1. I D i is the identity of entity e i , and it is also the public key of the entity. R i is a random number. T i is the timestamp when the token was generated. T e x t is the message that entity e i needs to pass to entity e j through T o k e n i j , and this field is not necessary.
Algorithm 1. IBC Digital Signature Algorithm
Input: System parameters of the region i-th entity’s key pair p k i , s k i , j-th entity’s public key s k j , message m.
1 :   Random   selection   r 1 , r 2 Z q * ;
2 :   Compute   R 1 = r 1 g ,   R 2 = r 2 s k i ;
3 :   Compute   W 1 = e p k i , r 2 s k j ;
4 :   Compute   S = r 1 s k i + p k i H 2 W 1 , m ;
Output:   Signature   σ = R 1 , R 2 , S .
After entity e i sends the T o k e n i j to verifier e j , e j uses the I D i in the T o k e n i j as the public key to verify the digital signature and compare the information in the digital signature. The IBC digital signature verification algorithm is shown in Algorithm 2.
Algorithm 2. IBC Digital Signature Verification Algorithm
Input: System parameters of the region j-th entity’s key pair p k j , s k j , i-th entity’s public key s k i ,   T o k e n i j .
1 :   Compute   W 2 = e s k i p k j , r 2 P p u b ;
2 :   Compute   h = H 2 W 2 , m
3 :   if   e S , g = e R 1 + h P p u b , s k i :
4: Verify correct;
5: else:
6: Verify error;
Because both authentication parties are entities in the same region, they have the same set of system parameters. In this case, the authentication operation can be completed without going through the IBC service layer.
(3)
Cross-Regional Authentication
If the two parties are in different regions, they cannot share the same set of system parameters. Therefore, the signature and verification work cannot be completed directly, and the IBC service layer is required to participate in the completion. The cross-regional authentication is shown in Figure 6.
The entity e i A in region A sends a token to I M S A , and writes visa information into the Text field. I M S A will verify the token after receiving it. The signature algorithm and verify algorithm are the same as algorithms of local–regional authentication. When the verification is correct, I M S A issues a visa for the entity e i A . After that, I M S A requests B A S A to synchronize the visa to V-Chain. The format of the visa is:
v i s a i A = E s k I M S B D S p k I M S A MD 5 I D i R i T i | | k e y | | I D i R i T i | | k e y
where E s k D M S B X means that I M S B uses its public key s k D M S B to encrypt message X. D S p k D M S A X means that I M S A signs message X. MD 5 X generates the MD5 summary of message X. K e y is the communication key after the entity e i A is successfully authenticated. After the authentication is successful, the communication parties use symmetric encryption algorithms to ensure communication security and avoid the low throughput rate of asymmetric encryption. Finally, I M S A returns the index of the visa in V-Chain to entity e i A .

5.2. Entity Data Agent Process

To reduce the computing pressure on the terminal equipment, we used DAG to proxy the data transmission and reception of the terminal. In this section we will introduce the process of entity data agency.

5.2.1. Device Capability Description Model

It is not only the security issue that hinders the sharing of sensors and actuators in the I-IoT, but the inconsistent data access interface is also one of the issues. Sensors and actuators in the Industrial IoT come from different manufacturers and belong to different departments. To reduce the complexity of data sharing caused by equipment diversity, the model of device capability (MDC) is established. The MDC summarizes and classifies sensors and actuators, and then abstracts a set of standard data structures and interfaces. The Industrial IoT can be regarded as a macro system composed of multiple distributed soft buses. These buses are divided according to the department to which the equipment belongs, and the visitor’s calling of data is simplified to read and write to the equipment on the soft bus.
As shown in Figure 7, the MDC describes the capabilities of the device from four aspects. It is similar to the device model of the Linux operating system.
The device part describes the basic information of the device, including fields such as the name, category, and attributes of the device. The bus part indicates on which soft bus the device is mounted. The driver part is a unified device abstract interface function. The device can implement a subset of the interface specified by the driver according to its capabilities. In this way, users can similarly access different devices. The profile part describes the function of the device, for example, what data the device can provide and the format of these data, what control commands the device supports and the format of the control commands.

5.2.2. Push Resource to DAG

If new equipment wants to share its resources in the mine IoT, it must first push its own MDC model to the DAG in its region. After the DAG receives the MDC model of the device, it first verifies the device according to the driver information described by the model. After the verification is passed, the device is mounted on the corresponding soft bus according to the bus information in the model. The mounting process is to insert the device model into the D-Chain according to the tree structure of “Bus→Region→DAG→Device.” Through this tree structure, visitors can quickly retrieve the device and obtain access information.

5.2.3. Request DAG Authorization to Access a Resource

When a visitor in the I-IoT needs to call a device, it must first send a device retrieval request to the DAG in its region. After receiving the request, the DAG accesses the D-Chain through the BAS and retrieves the target device from the bus information according to the tree structure of “Bus→Region→DAG→Device.” The DAG returns the MDC model of the target device to the visitor. The visitor then applies for the access right of the target device corresponding to the DAG according to the information in the MDC model. If the visitor cannot complete the above operations independently, it can be handed over to the superior DAG agent.
After the visitor is authorized, it can receive real-time sensing device data pushed by the DAG and can also send control commands to a device through the DAG.

6. Performance Evaluation

Due to the different design ideas and applicable scenarios, the SMSA mechanism designed in this article is difficult to directly compare with other existing mechanisms. Therefore, in this section, we mainly focus on testing the security, computing performance, communication overhead, etc., of the proposed mechanism, and analyze the data to evaluate the feasibility.
In the system, the devices that need to perform secure operations include the DAG, IMS, R-KGC, and various entities. We implemented the IBC certification in the sharing mechanism based on the SM9 (national standard of China) issued by the State Cryptography Administration Office of Security Commercial Code Administration. The SM9 has been proven to be sufficiently safe for commercial use.

6.1. Experimental Setup

In the experimental setup, we imitated the actual network environment of the mine and simulated an industrial IoT with two regions. The topology of the experimental network is shown in Figure 8. In each region, we deployed one desktop computer as an edge computing facility. The IMS, R-KGC and BAS, were all hosted on desktop computers as virtual machines using VMware Workstation 15 Pro. The hardware parameters of the desktop computer were AMD Ryzen7 5800X 3.8 GHz and 32 GB DDR4-3200 MHz RAM. The DAG was executed on a laptop with Intel Core i7-8550U and 8 G DDR4-2400 MHz RAM. The IoT devices were executed on a low-power industrial computer with Intel N3700 and 2 GB DDR3-1600 MHz RAM. The specific parameters of the IMS, R-KGC, BAS, DAG, and IoT devices are shown in Table 2. All virtual machines were enabled with Intel VT-x/AMD-V and connected to the LAN in bridge mode.
The communication between each device was based on CoAP (Constrained Application Protocol) [33]. CoAP was in binary format, HTTP was in text format, and CoAP was more compact than HTTP.

6.2. Performance Evaluation

We mainly evaluated the performance of the SMSA from two aspects, encryption operation and data interaction, and verified its feasibility. At the same time, the performance was compared with other existing mechanisms.

6.2.1. The Performance of the Encryption Operation

At first, we conducted a theoretical analysis of the encryption operation of each process in the SMSA and evaluated the computational cost. The SMSA included the IMS, R-KGC, BAS, DAG, and IoT devices in each region. They cooperated to realize the safe sharing of sensors and actuators. Various types of devices performed different types of encryption operations in different workflows. As shown in Table 3, we sorted out the various encryption algorithms. Among them, xor means exclusive OR operation, pair means bilinear operation, hash means hash operation, and exp means exponential power operation.
It should be noted that the calculation process shown in Table 3 was only the signature and encryption scheme used in this experiment, and the SMSA mechanism did not force the use of a certain IBC scheme. Therefore, the performance evaluation results only carried out a feasibility analysis of the scheme used in the experiment. The encryption operation test program was based on the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++ Library) function library [34] written in C++, and the gcc version of the Ubuntu operating system was 9.3.0. Table 4 shows the time taken by various facilities to execute each encryption algorithm. The length of the test message was 10,000 bytes, and the test was performed 1000 times to get the average value. From the test results, for IoT devices with weaker performance, the encryption algorithm took a long time to run. Therefore, the IBE (identity-based encryption) algorithm was required only in the authentication phase, and the symmetric encryption algorithm was used in the normal data communication phase to reduce the computational pressure.
As the size of the message increased, the time of the encrypting algorithm execution increased, too. Figure 9 shows the time cost change trend of different encryption algorithm executions with the different message sizes. It should be noted that because the Linux system dynamically scheduled each thread and adjusted the CPU operating frequency, the time cost of the encrypting algorithm execution did not strictly increase with the increase in data size.
To further reflect the advantages of the SMSA in terms of computational overhead, we compared the SMSA with the mechanisms IBE-BCIOT [35] under the same experimental settings. Since there are weak terminals in the I-IoT, we mainly compared the computing overhead of the terminal equipment during an authentication process. Initiator and authenticator were both IoT devices. Figure 10 shows the terminal CPU load during a single authentication process. Whether it was the initiator or the identity verifier, the computing performance requirements of the SMSA for the terminal equipment were lower than those of IBE-BCIOT. The test programs were all single-threaded, and the data were single-core CPU load.
Because we allocated most of the encryption calculations to the edge server for execution, the terminal and the server only needed to exchange symmetric encryption keys during the initial authentication process. Table 5 shows the encryption operations that the initiator and authenticator needed to perform during the test. Where SM1 was a symmetric encryption process, the operation speed of its encryption algorithm was much higher than that of the IBE encryption algorithm.

6.2.2. The Performance of Data Exchange

Before the experiment started, we tested the delay between each device in the experimental network with Packet Internet Groper. The test result is shown in Table 6. From the results, since the device was in the local area network, the inherent network delay between each device was at a relatively low level.
We used Python to write a private chain code and deployed it on the BAS in various regions. The private chain used a PoW consensus mechanism. The rule of PoW was to find a number P, and the hash value of the combination of this number and the previous block’s proof would start with four zeros. At the same time, we built a private chain interaction API based on the Flask framework.
At the beginning of the data agent service session, the DAG will authenticate the device, and it will randomly request the device to prove its identity while the session remains connected. Because the times of these authentication operations are limited, it will not be influenced by the normal data exchange between the DAG and entity.
In this case, we mainly focused not only on the time cost of the authentication process. In cross-regional authentication, data reading and writing through blockchain are necessary. Thus, the performance of data reading and writing of the BAS is very important. We recorded the data write delay and data query delay of the BAS in the test. To evaluate the performance of data writing and reading under the different number of BAS nodes, we expanded the number of regions to 10.
From the query delay shown in Figure 11a, the number of BAS nodes basically did not affect the data query time. This is because every BAS in the system will maintain a copy of blockchain data locally. In this case, the data query was executed in the local database without network data exchange.
When the BAS writes data, the delay will increase from low to high as the number of concurrent increases. The more BASs involved, the faster the rise. This phenomenon occurs because the greater the number of BASs, the longer it takes for them to reach a consensus. This problem can be alleviated by optimizing the consensus mechanism. On the other hand, from the combined results in Figure 11a,b, and Table 5, the network delay had a small effect on the performance of entities reading and writing data through the BAS.

7. Conclusions

In this paper, to free the sensors and actuators from the various subsystems, we built the sharing mechanism of sensors and actuators for the I-IoT based on the IBC encryption algorithm and combined it with the blockchain. The SMSA deployed the DAG in each region to realize distributed data agency service and through the IMS, R-KGC, and BAS to achieve blockchain-assisted identity-controllable cross-regional secure access. Our contribution can be summarized as follows:
(1)
System structure: By deploying the DAG, IMS, and BAS servers in each work region, a safe and reliable distributed sensor and actuator data sharing mechanism was constructed.
(2)
Cross-region authentication: The blockchain assisted the IBE to achieve cross-region authentication and maintained the relative independence of the regions.
(3)
Standardized interface: by establishing a model of device capability (MDC) we realized standardized access to terminal equipment. This makes it convenient for other users or devices to call the data of the terminal.
(4)
Performance evaluation: By setting up a simulation experiment environment, the key technical indicators (communication overhead, computing overhead, etc.) of the proposed mechanism were tested and verified. The experimental evaluation results showed that the communication, computing, and other aspects of the mechanism were within the tolerance of the Industrial IoT.
The SMSA can break the barriers between devices and effectively unearth the potential performance of the Industrial IoT with acceptable computational overhead. In the next phase of research, we will further enhance the security protection capabilities of the SMSA and assist identity authentication by analyzing the data interaction behavior pattern of the entity.

Author Contributions

Y.M. conceived and conducted the experiments, J.L. analyzed the results. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by The National Natural Science Foundation of China, grant number No.51874010; the Key Technology Research & Innovation Team Project, grant number No. 201950ZX003.

Data Availability Statement

Correspondence and requests for materials should be addressed to J.L.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Havlik, D.; Bleier, T.; Schimak, G. Sharing Sensor Data with SensorSA and Cascading Sensor Observation Service. Sensors 2009, 9, 5493–5502. [Google Scholar] [CrossRef] [PubMed]
  2. Lim, Y.; Park, J. Sensor Resource Sharing Approaches in Sensor-Cloud Infrastructure. Int. J. Distrib. Sens. Netw. 2014, 10, 476090. [Google Scholar] [CrossRef]
  3. Raptis, T.P.; Passarella, A.; Conti, M. Distributed Data Access in Industrial Edge Networks. IEEE J. Sel. Areas Commun. 2020, 38, 915–927. [Google Scholar] [CrossRef]
  4. Hasselquist, D.; Rawat, A.; Gurtov, A. Trends and Detection Avoidance of Internet-Connected Industrial Control Systems. IEEE Access 2019, 7, 155504–155512. [Google Scholar] [CrossRef]
  5. Borhani, M.; Liyanage, M.; Sodhro, A.H.; Kumar, P.; Jurcut, A.D.; Gurtov, A. Secure and Resilient Communications in the Industrial Internet. In Guide to Disaster-Resilient Communication Networks. Computer Communications and Networks; Rak, J., Hutchison, D., Eds.; Springer: Cham, Switzerland, 2020; pp. 219–242. [Google Scholar] [CrossRef]
  6. Gurtov, A.; Liyanage, M.; Korzun, D. Secure Communication and Data Processing Challenges in the Industrial Internet. Balt. J. Mod. Comput. 2016, 4, 1058–1073. [Google Scholar] [CrossRef]
  7. Amerimehr, A.; Dehkordi, M.H. Quantum Symmetric Cryptosystem Based on Algebraic Codes. IEEE Commun. Lett. 2018, 22, 1746–1749. [Google Scholar] [CrossRef]
  8. Zivic, N. Security Aspects of Soft Verified Messages Protected by Message Authentication Codes. In Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, 25–27 June 2012; pp. 1316–1322. [Google Scholar] [CrossRef]
  9. Wu, X.; Yang, Z.; Ling, C.; Xia, X.-G. Artificial-Noise-Aided Message Authentication Codes with Information-Theoretic Security. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1278–1290. [Google Scholar] [CrossRef] [Green Version]
  10. Bellare, M.; Canetti, R.; Krawczyk, H. Keying Hash Functions for Message Authentication. In Annual International Cryptology Conference; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1996; pp. 1–15. [Google Scholar]
  11. Dauty, M.; Menu, P.; Borel, J.-L.; Dubois, C. Dynamic Symmetric Key Provisioning Protocol (DSKPP). Ann. Phys. Rehabil. Med. 2011, 54, 81. [Google Scholar] [CrossRef] [Green Version]
  12. Wu, C.; Wang, Y.; Chen, Y.; Wang, J.; Wang, Q.-H. Asymmetric encryption of multiple-image based on compressed sensing and phase-truncation in cylindrical diffraction domain. Opt. Commun. 2019, 431, 203–209. [Google Scholar] [CrossRef]
  13. Gordon, A.D.; Jeffrey, A. Types and effects for asymmetric cryptographic protocols. J. Comput. Secur. 2004, 12, 435–483. [Google Scholar] [CrossRef]
  14. Lu, Y.; Li, J. A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model. Inf. Sci. 2016, 372, 745–757. [Google Scholar] [CrossRef]
  15. Verma, G.K.; Singh, B.; Kumar, N.; Obaidat, M.S.; He, D.; Singh, H. An efficient and provable certificate-based proxy signature scheme for IIoT environment. Inf. Sci. 2020, 518, 142–156. [Google Scholar] [CrossRef]
  16. Park, C.-S. On certificate-based security protocols for wireless mobile communication systems. IEEE Netw. 1997, 11, 50–55. [Google Scholar] [CrossRef]
  17. Lin, J.-F. An analysis on the weakness of Das et al.’s remote user authentication scheme. Far East J. 2009, 37, 121–227. [Google Scholar] [CrossRef]
  18. Wang, S.-J. Anonymous wireless authentication on a portable cellular mobile system. IEEE Trans. Comput. 2004, 53, 1317–1329. [Google Scholar] [CrossRef]
  19. Zhang, Z.-H.; Xue-Feng, J.; Li, J.-J.; Jiang, W. Identity-Based Authentication for Cloud Computing. In IEEE International Conference on Cloud Computing; Springer: Berlin/Heidelberg, Germany, 2009. [Google Scholar] [CrossRef]
  20. Wang, K.; Wang, Y.; Sun, Y.; Guo, S.; Wu, J. Green Industrial Internet of Things Architecture: An Energy-Efficient Perspective. IEEE Commun. Mag. 2016, 54, 48–54. [Google Scholar] [CrossRef]
  21. Pop, P.; Zarrin, B.; Barzegaran, M.; Schulte, S.; Punnekkat, S.; Ruh, J.; Steiner, W. The FORA Fog Computing Platform for Industrial IoT. Inf. Syst. 2021, 98, 101727. [Google Scholar] [CrossRef]
  22. Narayanan, R.; Murthy, C.S.R. A Probabilistic Framework for Protocol Conversions in IIoT Networks with Heterogeneous Gateways. IEEE Commun. Lett. 2017, 21, 2456–2459. [Google Scholar] [CrossRef]
  23. Hargrave, C.O.; Ralston, J.C.; Hainsworth, D.W. Optimizing Wireless LAN for Longwall Coal Mine Automation. IEEE Trans. Ind. Appl. 2007, 43, 111–117. [Google Scholar] [CrossRef]
  24. Liu, T.; Wei, Y.; Song, G.; Li, Y.; Wang, J.; Ning, Y.; Lu, Y. Advances of optical fiber sensors for coal mine safety monitoring applications. In Proceedings of the 2013 International Conference on Microwave and Photonics (ICMAP), Dhanbad, India, 13–15 December 2013. [Google Scholar] [CrossRef]
  25. Yan, H.; Zhang, Y.; Pang, Z.; Da Xu, L. Superframe Planning and Access Latency of Slotted MAC for Industrial WSN in IoT Environment. IEEE Trans. Ind. Inform. 2014, 10, 1242–1251. [Google Scholar] [CrossRef]
  26. Son, S.-C.; Kim, N.-W.; Lee, B.-T.; Cho, C.H.; Chong, J.W. A time synchronization technique for coap-based home automation systems. IEEE Trans. Consum. Electron. 2016, 62, 10–16. [Google Scholar] [CrossRef]
  27. Tivani, A.E.A.; Murdocca, R.M.; Paez, C.F.S.; Gazzano, J.D.D. Didactic Prototype for Teaching the MQTT Protocol Based on Free Hardware Boards and Node-RED. IEEE Lat. Am. Trans. 2020, 18, 376–382. [Google Scholar] [CrossRef]
  28. Yu, S.; Wang, G.; Liu, X.; Niu, J. Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective. IEEE Commun. Mag. 2018, 56, 14–18. [Google Scholar] [CrossRef]
  29. Li, X.; Xu, J.; Dai, H.-N.; Zhao, Q.; Cheang, C.F.; Wang, Q. On modeling eavesdropping attacks in wireless networks. J. Comput. Sci. 2015, 11, 196–204. [Google Scholar] [CrossRef]
  30. Hwang, J.; Lim, J.; Lee, D. Impersonation Attack on a Strong ID-Based Key Distribution. IEICE Trans. Commun. 2008, 91, 2702–2703. [Google Scholar] [CrossRef]
  31. Chen, Y.; Ma, X.; Wu, X. DDoS Detection Algorithm Based on Preprocessing Network Traffic Predicted Method and Chaos Theory. IEEE Commun. Lett. 2013, 17, 1052–1054. [Google Scholar] [CrossRef]
  32. Jang, D.-I.; Kim, M.; Jung, H.-C.; Noh, B.-N. Analysis of HTTP2P botnet: Case study waledac. In Proceedings of the 2009 IEEE 9th Malaysia International Conference on Communications (MICC), Kuala Lumpur, Malaysia, 15–17 December 2009; pp. 409–412. [Google Scholar] [CrossRef]
  33. Bormann, C.; Castellani, A.P.; Shelby, Z. CoAP: An Application Protocol for Billions of Tiny Internet Nodes. IEEE Internet Comput. 2012, 16, 62–67. [Google Scholar] [CrossRef]
  34. Bera, B.; Das, A.K.; Sutrala, A.K. Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment. Comput. Commun. 2021, 166, 91–109. [Google Scholar] [CrossRef]
  35. Sisi, S.; Fei, C.; Xiaoying, X.; Weiheng, G.; Yicheng, L.; Shu, W.; Wen, T.; Shangdong, L.; Fei, W.; Jing, H.; et al. IBE-BCIOT: An IBE based cross-chain communication mechanism of blockchain in IoT. World Wide Web 2021, 1–26. [Google Scholar] [CrossRef]
Figure 1. Typical architecture of the Industrial IoT.
Figure 1. Typical architecture of the Industrial IoT.
Sensors 21 06084 g001
Figure 2. Structural diagram of the SMSA.
Figure 2. Structural diagram of the SMSA.
Sensors 21 06084 g002
Figure 3. Format of the data written to the blockchain.
Figure 3. Format of the data written to the blockchain.
Sensors 21 06084 g003
Figure 4. The process of entity requesting ID.
Figure 4. The process of entity requesting ID.
Sensors 21 06084 g004
Figure 5. The process of entity requesting identity code and private key.
Figure 5. The process of entity requesting identity code and private key.
Sensors 21 06084 g005
Figure 6. Cross-regional authentication process.
Figure 6. Cross-regional authentication process.
Sensors 21 06084 g006
Figure 7. Structural diagram of the device capability description model.
Figure 7. Structural diagram of the device capability description model.
Sensors 21 06084 g007
Figure 8. An illustration of the network topology in experiments.
Figure 8. An illustration of the network topology in experiments.
Sensors 21 06084 g008
Figure 9. The changes in the running time of each encryption algorithm with different message sizes.
Figure 9. The changes in the running time of each encryption algorithm with different message sizes.
Sensors 21 06084 g009
Figure 10. The CPU load of both parties during the identity authentication process.
Figure 10. The CPU load of both parties during the identity authentication process.
Sensors 21 06084 g010
Figure 11. Time consumption of the SMSA data exchange.
Figure 11. Time consumption of the SMSA data exchange.
Sensors 21 06084 g011
Table 1. Classification of mine sensors.
Table 1. Classification of mine sensors.
NumSensorSub-systemInterface
1Wind speed sensorVentilationRS-485/232
2Wind pressure sensorVentilationRS-485/232, Analog signal
3Temperature sensorVentilationAnalog signal
4Carbon monoxide sensorVentilationRS-485/232, Analog signal
5Bolt stress sensorGeological surveyingRS-485/232
6Borehole stress sensorGeological surveyingRS-485/232
7RFID personnel positioningGeological surveyingRS-485/232, Ethernet, WiFi
8Fire sensorMonitoringRS-485/232
9Infrared cameraMonitoringEthernet, WiFi
10Level sensorElectromechanicalRS-485/232, Analog signal
11
Table 2. The parameters of the IMS, R-KGC, BAS, and DAG.
Table 2. The parameters of the IMS, R-KGC, BAS, and DAG.
EquipmentVirtual/PhysicalParametersValue
IMSVirtualCPU Cores4/AMD Zen3
CPU Threads8
RAM4 GB
OSUbuntu 20.04
R-KGCVirtualCPU Cores2/AMD Zen3
CPU Threads4
RAM8 GB
OSUbuntu 20.04
BASVirtualCPU Cores2/AMD Zen3
CPU Threads4
RAM8 GB
OSUbuntu 20.04
DAGPhysicalCPU Intel i7-8550U
CPU Cores4/Intel Kaby Lake
CPU Threads8
RAM8 GB
OSUbuntu 20.04
IoT DevicePhysicalCPUIntel N3700
CPU Cores4/Intel Braswell
CPU Threads4
RAM2 GB
OSUbuntu 18.04.5
Table 3. Operational process of encryption algorithms.
Table 3. Operational process of encryption algorithms.
AlgorithmOperation Process
Sign1pair + 1hash
Verify3pair + 1hash + 1exp
Encrypt4hash + 2xor + 1pair
Decrypt2xor + 3hash + 1pair
Table 4. Execution time of SMSA on Each entity (unit: s).
Table 4. Execution time of SMSA on Each entity (unit: s).
EntityKeygenSignVerifyEncryptDecrypt
IMS-0.0099150.0173330.0104680.006609
R-KGC0.0003590.0101520.0178050.0107380.006800
DAG-0.0210910.0327030.0161390.011292
IoT Device-0.0503240.0878900.0531900.033821
Table 5. Comparison of encryption operations in the identity authentication process.
Table 5. Comparison of encryption operations in the identity authentication process.
MechanismsInitiatorAuthenticator
SMSA2pair + 2hash + 2SM12SM1
IBE-BCIOT4pair + 9hash + 4xor5pair + 5hash + 1exp + 2xor
Table 6. Communication delay of each device between Region A and Region B (unit: ms).
Table 6. Communication delay of each device between Region A and Region B (unit: ms).
Entity I M S B B A S B D A G B R K G C B I M S B I o T B
I M S A 3.103.293.043.253.094.28
B A S A 2.954.223.374.063.135.29
D A G A 2.581.912.152.241.864.34
R K G C A 2.743.813.665.964.445.06
I M S A 3.474.985.313.834.575.51
I o T A 5.055.735.145.605.556.21
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Meng, Y.; Li, J. Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography. Sensors 2021, 21, 6084. https://doi.org/10.3390/s21186084

AMA Style

Meng Y, Li J. Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography. Sensors. 2021; 21(18):6084. https://doi.org/10.3390/s21186084

Chicago/Turabian Style

Meng, Yifan, and Jingzhao Li. 2021. "Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography" Sensors 21, no. 18: 6084. https://doi.org/10.3390/s21186084

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop