计算机科学
计算机网络
加密
认证(法律)
计算机安全
分布式计算
作者
Dongyang Xu,Keping Yu,J.A. Ritcey
出处
期刊:IEEE Transactions on Industrial Informatics
[Institute of Electrical and Electronics Engineers]
日期:2021-11-23
卷期号:18 (9): 6368-6378
被引量:57
标识
DOI:10.1109/tii.2021.3130163
摘要
Industrial Internet of Things (IIoT), a core enabler of Industry 4.0, is evolving rapidly to tackle the challenges imposed by explosive real-time manufacturing data in the context of Internet and telecommunication industry. 5G technology is the key to addressing such challenges. This is done by bypassing upper authentication protocols and supporting small data transmission during initial access, which, however, causes serious security breaches in IIoT device authentication. To solve this, in this article propose a secure cross-layer authentication framework based on quantum walk on circles. The system performs random hash coding on multidomain physical-layer resources to encode and decode device identifiers securely, while using a quantum walk based privacy-preserving protocol to maintain code privacy at arbitrary high level, being controlled by the number of occupied physical resources. The upper bound of decoding errors is derived and a nonconvex integer programming problem of minimizing the bound is formulated to characterize the security performance. The space of one-time keys for encryption is also derived that show how high privacy and scalability advantage is maintained against classical and quantum computers. Finally, we derive novel expressions of failure probability of this new authentication system and numerically show that our scheme can bring ultrahigh level of security and privacy protection with low latency despite attack.
科研通智能强力驱动
Strongly Powered by AbleSci AI