Journal
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume -, Issue -, Pages -Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2023.3321106
Keywords
Authentication; cryptographic negotiation; industrial Internet of Things (IIoT); physical-layer security; security zone; zero trust (ZT)
Ask authors/readers for more resources
As security concerns in the industrial Internet of Things (IIoT) continue to arise, industrial organizations are striving to improve the security system. This article presents a three-step zero trust security framework that enhances security in the wireless IIoT by leveraging the advantages of physical-layer security.
As security issues facing the industrial Internet of Things (IIoT) continue to emerge, industrial organizations are working to further improve the security system. Zero trust (ZT) is seen as the future of industrial security, with a rising voice, but currently, no concrete implementation technique is available. In this article, we start with the requirements of ZT security and attempt to design a ZT technical framework applicable to wireless IIoT. Specifically, a three-step ZT security framework is proposed that builds on the benefits of physical-layer security to enhance ZT in IIoT. Security zone formation is done first, which then facilitates a trusted environment for subsequent device authentication and cryptographic negotiation. By integrating physical-layer security, several promising techniques, including artificial noise, physical fingerprint, and key distribution, are well designed to accomplish the proposed framework. Our analysis reveals that the proposed framework and the designed particular implementation techniques are feasible to enhance ZT security in wireless IIoT.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available