Journal Home > Volume 29 , Issue 2

With the rapid development of information technologies, industrial Internet has become more open, and security issues have become more challenging. The endogenous security mechanism can achieve the autonomous immune mechanism without prior knowledge. However, endogenous security lacks a scientific and formal definition in industrial Internet. Therefore, firstly we give a formal definition of endogenous security in industrial Internet and propose a new industrial Internet endogenous security architecture with cost analysis. Secondly, the endogenous security innovation mechanism is clearly defined. Thirdly, an improved clone selection algorithm based on federated learning is proposed. Then, we analyze the threat model of the industrial Internet identity authentication scenario, and propose cross-domain authentication mechanism based on endogenous key and zero-knowledge proof. We conduct identity authentication experiments based on two types of blockchains and compare their experimental results. Based on the experimental analysis, Ethereum alliance blockchain can be used to provide the identity resolution services on the industrial Internet. Internet of Things Application (IOTA) public blockchain can be used for data aggregation analysis of Internet of Things (IoT) edge nodes. Finally, we propose three core challenges and solutions of endogenous security in industrial Internet and give future development directions.


menu
Abstract
Full text
Outline
About this article

Endogenous Security Formal Definition, Innovation Mechanisms, and Experiment Research in Industrial Internet

Show Author's information Hongsong Chen1( )Xintong Han1Yiying Zhang1
School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China

Abstract

With the rapid development of information technologies, industrial Internet has become more open, and security issues have become more challenging. The endogenous security mechanism can achieve the autonomous immune mechanism without prior knowledge. However, endogenous security lacks a scientific and formal definition in industrial Internet. Therefore, firstly we give a formal definition of endogenous security in industrial Internet and propose a new industrial Internet endogenous security architecture with cost analysis. Secondly, the endogenous security innovation mechanism is clearly defined. Thirdly, an improved clone selection algorithm based on federated learning is proposed. Then, we analyze the threat model of the industrial Internet identity authentication scenario, and propose cross-domain authentication mechanism based on endogenous key and zero-knowledge proof. We conduct identity authentication experiments based on two types of blockchains and compare their experimental results. Based on the experimental analysis, Ethereum alliance blockchain can be used to provide the identity resolution services on the industrial Internet. Internet of Things Application (IOTA) public blockchain can be used for data aggregation analysis of Internet of Things (IoT) edge nodes. Finally, we propose three core challenges and solutions of endogenous security in industrial Internet and give future development directions.

Keywords: blockchain, federated learning, industrial Internet, endogenous security architecture

References(16)

[1]
H. Song, J. Bai, Y. Yi, J. Wu, and L. Liu, Artificial intelligence enabled Internet of Things: Network architecture and spectrum access, IEEE Comput. Intell. Mag., vol. 15, no. 1, pp. 44–51, 2020.
[2]
F. Foukalas and A. Tziouvaras, Edge artificial intelligence for industrial Internet of Things applications: An industrial edge intelligence solution, IEEE Ind. Electron. Mag., vol. 15, no. 2, pp. 28–36, 2021.
[3]
D. Wei, H. Ning, F. Shi, Y. Wan, J. Xu, S. Yang, and L. Zhu, Dataflow management in the Internet of Things: Sensing, control, and security, Tsinghua Science and Technology, vol. 26, no. 6, pp. 918–930, 2021.
[4]
Y. Liu and M. Peng, 6G endogenous security: Architecture and key technologies, (in Chinese), Telecommunications Science, vol. 36, no. 1, pp. 11–20, 2020.
[5]
A. Hu, L. Fang, and T. Li, Research on bionic mechanism based endogenous security defense system, (in Chinese), Chinese Journal of Network and Information Security, vol. 7, no. 1, pp. 11–19, 2021.
[6]
X. Ji, J. Wu, L. Jin, K. Huang, Y. Chen, X. Sun, W. You, S. Huo, and J. Yang, Discussion on a new paradigm of endogenous security towards 6G networks, Front. Inf. Technol. Electron. Eng., vol. 23, no. 10, pp. 1421–1450, 2022.
[7]
G. Wei, H. Li, Y. Bai, G. Li, and K. Xing, Space-terrestrial integrated multi-identifier network with endogenous security, (in Chinese), Space-Integrated-Ground Information Networks, vol. 1, no. 2, pp. 66–72, 2020.
[8]
S. Guo, Y. Qi, M. Dai, X. Qiu, F. Qi, and P. Zhang, Endogenous trusted network architecture for intelligent sharing, (in Chinese), Journal on Communications, vol. 41, no. 11, pp. 86–98, 2020.
[9]
Z. Jiang, T. Li, and A. Hu, Research on endogenous security methods of embedded system, in Proc. 2020 IEEE 6th Int. Conf. Computer and Communications (ICCC), Chengdu, China, 2020, pp. 1946–1950.
[10]
Z. Zhou, X. Kuang, L. Sun, L. Zhong, and C. Xu, Endogenous security defense against deductive attack: When artificial intelligence meets active defense for online service, IEEE Commun. Mag., vol. 58, no. 6, pp. 58–64, 2020.
[11]
Alliance of industrial Internet, The architecture of industrial Internet of Things v2.0, http://www.aii-alliance.org/upload/202004/0430_162140_875.pdf, 2020.
[12]
Alliance of industrial Internet, Security framework of industrial Internet of Things, http://www.aii-alliance.org/upload/202002/0228_140108_424.pdf, 2018.
[13]
Information Technology—Security Techniques—Encryption Algorithms—Part 5: Identity-Based Ciphers—Amendment 1: SM9 Mechanism, ISO/IEC 18033-5:2015/Amd 1:2021, 2021-02.
[14]
L. N. D. Castro and F. J. V. Zuben, Learning and optimization using the clonal selection principle, IEEE Trans. Evol. Comput., vol. 6, no. 3, pp. 239–251, 2002.
[15]
J. Pang, Y. Huang, Z. Xie, J. Li, and Z. Cai, Collaborative city digital twin for the COVID-19 pandemic: A federated learning solution, Tsinghua Science and Technology, vol. 26, no. 5, pp. 759–771, 2021.
[16]
S. Popov, The tangle, http://iotatoken.com/IOTA_Whitepaper.pdf, 2016.
Publication history
Copyright
Acknowledgements
Rights and permissions

Publication history

Received: 07 December 2022
Revised: 21 March 2023
Accepted: 26 April 2023
Published: 22 September 2023
Issue date: April 2024

Copyright

© The author(s) 2024.

Acknowledgements

This work was supported by the National Key Research and Development Program of China (No. 2018YFB0803403) and Fundamental Research Funds for the Central Universities (Nos. FRF-AT-19-009Z and FRF-AT-20-11) from the Ministry of Education of China.

Rights and permissions

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return