The present application claims priority to Korean Patent Application No. 10-2023-0013025, filed Jan. 31, 2023, the entire contents of which is incorporated herein for all purposes by this reference.
The present disclosure relates to a system for advanced user authenticated key management for 6G-based industrial applications. More particularly, the present disclosure relates to a system for advanced user authenticated key management for 6G-based industrial applications with respect to a user authentication and management scheme to secure a 6G-enabled Network-In-a-Box (NIB).
In a 6G mobile system, the importance of security increases even more in a communication system. One of the potential technologies of 6G is a Network-In-a-Box (NIB). The 6G-enabled NIB is a multi-generational, easily and quickly installable technology used for communication.
It is based on both hardware and software. The main features of the 6G-enabled NIB include low latency and a high level of flexibility. In addition, it provides connectivity services to the applications used in unusual situations such as battlefields or natural disasters in the industry. However, most of the applications used in the 6G-enabled NIB are not appropriately secured. There are chances of several active and passive attacks due to the insecure channel.
The 21st century is the era of modern technologies and communication, with the organization of security group (SG) frameworks. On the other hand, the sixth generation (6G) architecture is under development and expected to launch in 2030.
In 6G mobile networks, the trend toward cloud and edge native infrastructures is projected to continue and require a complete 6G network security architecture design.
A new term “Network In a Box (NIB)” is a new concept refers to a unique networking assembly that may supply essential service to its neighbors and mobile objects. The NIB is able to give customers in crisis phone, SMS, and Internet access. The main characteristics of NIB are the high resilience, robustness, and dependability of the underlying network configuration. Therefore, the NIB must be a lightweight, highly portable, mobility-aware, privacy-protecting tool. Due to the presence of latency, non-cognitive behavior, and three-dimensional connectivity, 2G, 3G, 4G, and 5G may not be efficient enough to exploit massive connection-aware network service provisioning. Hence, it provides dynamic solutions for 6G mobile network as well gained enormous popularity nowadays. This multi-generational, 6G-enabled NIB can be carried in a bag.
Hence, the 6G-enabled NIB is a collection of hardware and software elements for mobile communication that are simple to set up and maintain. The fundamental concept behind the use of NIB is to provide communication services in catastrophe scenarios such as earthquakes, industrial disasters, battlefields, floods, emergency situations, etc. In addition, the concept of NIB relies on merging all types of software and hardware modules that are required by mobile networks inside a single bag that contains a small number of physical devices. Due to its high degree of customization and increased dependability, this highly adaptable 6G-enabled NIB can provide communication services for a wide variety of applications. It is important to emphasize that emergency and tactical networks are designed to be adaptable and flexible due to the fact that their deployment is not well known. They are classified as “mobile ad-hoc networks (MANETs)” in this category. Furthermore, the NIB is a portable entity by nature. As a result, it may be used in disaster management situations especially for control in industries.
Recently, specifications for disaster and mobile networking systems have been improved to allow the systems to operate with fewer physical devices while still accomplishing the primary purpose of enhancing serviceability. Many network providers have also adopted this approach in order to build these networks. The approach may be set up with a small number of physical devices or a single device. As a result, the development of NIB is a new network communication technology that meets the requirements of future-generation mobile networks, such as the use of industrial mobile communication networks. In general, the 6G-enabled NIB may be “configured to operate alone or in combination with existing legacy network elements or NIBs”. In addition, it is designed to enable access to all wireless networks in a compact, portable device. Corporate, industrial, private, public, military, and security applications, 6G-based “evolved packet core (EPC)”, “tower with antenna”, “user with a mobile device”, “IP multimedia sub-system (IMS)”, “content server”, “smart industrial devices”, and “trusted authority (TA)” are just a few of the elements constituting the 6G-enabled NIB and can be used in industrial applications.
These components help people communicate with each other and obtain important services, such as web-based information, video streaming, or information on smart industrial equipment. To monitor and control industrial equipment, intelligent industrial tools such as a programmable logic controller (PLC), a distributed control system (DCS), and SCADA, are used. Through the 6G wireless communication technology, data can be exchanged between different components and devices.
The 6G-enabled NIB can be deployed in important conditions to provide secure communication and public safety during natural disasters. The internet providers use mobile broadband (MBB) services to access the application program server via the Internet. In the RAN architecture, mobile operators employ eNB and a collection of SGW, PGW, and MME to provide public services. Consequently, the LTE-based public service strategy might be implemented inside the 6G-enabled NIB with the appropriate adjustments to 6G-oriented service protocols.
There are several benefits of using the 6G-enabled NIB compared to previous wireless communication technologies. However, there are some network security concerns regarding the forthcoming 6G-based mobile networks (i.e., NIB).
This occurs because security measures are not completely implemented in modern mobile networks, such as 6G. According to study results, there is a newly discovered capacity for third-person attacks in terahertz 6G networks that could be exploited. It is important to stress that the 6G-enabled NIB implemented for commercial implementation have various security and privacy concerns, such as exposed to many cyber-attacks. It is possible to conduct various attacks on the 6G-enabled NIB targeting industrial applications known to have significant security implications. These attacks include replaying, third-person, cloning, unauthorized access to data, unauthorized key exchange calculation, and attacks from the stolen devices. Accordingly, it is needed to develop security rules for a “6G-enabled NIB used for industrial purposes”.
In order to access real-time data, a registered user must also be authenticated with smart industrial equipment used to receive information. For example, disaster management (earthquakes and tsunamis) is one of the important applications of NIB in which a user has to be able to receive real-time information directly from smart industrial equipment installed in the 6G-based network. To alleviate the problems, authentication and key establishment with an authorized user and accessible smart industrial equipment must occur through an important intermediate node known as the content server. The content server is positioned between two units. Thus, it is necessary to develop a new and comprehensive user authentication protocol system that allows mutual authenticated key configuration between users and intelligent industrial equipment through a content server.
The implementation of NIB and portable networks seem to be very important for the future industrial revolution. Logistics, factory-floor robots, and warehouse management may demand very dense deployment of mobile-aware and adaptable services. Such use cases must be allowed by the 6G-enabled NIB to promote low latency in order to optimize performance. In the past, disaster management lacked networking plans and failed to provide better communication. Therefore, the 6G-enabled NIB is expected to play an effective role in this regard. Furthermore, the 6G-enabled NIB enables self-healing and self-organizing networking infrastructures to ensure seamless communication between the victim and rescuer during any natural or artificial disaster. However, most of the applications used in the 6G-enabled NIB are not appropriately secured. There are chances of several active and passive attacks due to the insecure channel. An authentication scheme (UAKMS-NIB) is presented in the Wazid et al.'s article. However, there is a missing step to exchange the authentication key between the content server and smart devices. The smart device directly transmits the key to the user without information on the authentication key. Therefore, there is a problem that communication is impossible without exchanging authentication key information.
The foregoing is intended merely to aid in the understanding of the background of the present disclosure, and is not intended to mean that the present disclosure falls within the purview of the related art that is already known to those skilled in the art.
The present disclosure is directed to providing a system for advanced user authenticated key management for 6G-based industrial applications with respect to a user authentication and management scheme to secure a 6G-enabled Network-In-a-Box (NIB).
According to the present disclosure, there is provided a system for advanced user authenticated key management for 6G-based industrial applications, the system including: a registration unit configured to perform registration of smart industrial device, content server, and user by using a trusted authority and an ID of the trusted authority; a user login unit configured to compute whether a Hamming distance between a biometric secret key provided to the registration unit and a currently recognized biometric secret key is equal to or less than a pre-defined error tolerance threshold; and a user authentication unit configured to perform mutual authentication among a pre-registered user Ux, a content server CSy, and an accessed smart industrial device SDz.
An embodiment of the present disclosure can provide a system for advanced user authenticated key management for 6G-based industrial applications with respect to a user authentication and management scheme to secure a 6G-enabled Network-In-a-Box (NIB).
The above and other objectives, features, and other advantages of the present disclosure will be more clearly understood from the following detailed description when taken in conjunction with the accompanying drawings, in which:
Specific structures or functions described in embodiments of the present disclosure are exemplified to illustrate embodiments according to the spirit of the present disclosure, and the embodiments according to the spirit the present disclosure can be achieved in various ways. In addition, the present disclosure should not be construed as being limited to the following embodiments and should be construed as including all changes, equivalents, and replacements included in the spirit and scope of the present disclosure.
In the meantime, terms “first” and/or “second” used in the present disclosure can be used to describe various elements, but the elements are not to be construed as being limited to the terms. The terms are used to distinguish one element from another element, and for instance, a first element may be referred to as a second element, and similarly, a second element may be referred to as a first element without departing from the scope according to the spirit of the present disclosure.
A system for advanced user authenticated key management for 6G-based industrial applications according to an embodiment of the present disclosure proposes a new remote user authentication and key management technique. This scheme is a modified and improved version of UAKMS-NIB and is renamed as an improved user authentication and management scheme to secure the 6G-enabled NIB (iUAKMS-NIB) that can be used in industrial applications. Hence, the proposed method provides the best security solution against the possible attacks on the 6G communication system. As an analysis result, the proposed technique shows better performance than the existing techniques.
In order to counter the incorrectness mentioned above, the present disclosure proposes an improved method based on an elliptic curve, which provides user authentication and better security.
The present disclosure proposes an advanced user authentication and management scheme for secure communication in the 6G-enabled NIB (iUAKMS-NIB). The proposed method verifies an authentication process between a user and a smart industrial device through a verification key.
The present disclosure provides various analyses to ensure security and verify authentication between a user and a smart industrial device. An experiment is conducted by using Raspberry-Pi, iphone Xs Max, and Dell Ultrabook 8757P. It is demonstrated that the iUAKMS-NIB is resilient to various possible attacks required in a 6G-enabled NIB environment.
Testbed studies on different authenticated key methods are conducted using Burrows Abadi and Needham Logic (BAN Logic) widely used in both the server and user environments, and the results are presented.
Finally, a comparative analysis of computation and communication costs is presented and discussed. The results show that the improved iUAKMS-NIB method verifies authentication and exchanges a verified key between a user and a smart industrial device through the content server during user authentication.
The proposed method, that is, iUAKMS-NIB, will be described using the following two models.
The overall network model is as shown in
The MME server also manages encryption and integrity projection for non-access stratum (NAS) signals, as well as security key management. The HSS is also an important element of the NIB system. The HSS is a master user database (that is, device) only kept on a single node in a cluster. Communications service providers may manage consumers in real time and at a reasonable cost as a result of this technology.
Information on subscribers (that is, users) is stored in the HSS database in order to assist with authorization as well as user location and other associated service information and specifications for devices.
In addition, connection between a user's request and the IP Multimedia Subsystem (IMS) is set. In an integrated network of communications service providers, an IMS provides telephony, fax, e-mail, Internet access, web services, and voice over IP (VOIP) in wired or wireless communication.
The content server, which serves as a link between a user and a smart industrial device, is also an essential node in the network.
A smart industrial device network has been built on this network to monitor and control industrial machinery. Each intelligent industrial device has a particular goal to achieve. Users of an industrial facility may sometimes be interested in gaining access to real-time data collected by smart industrial equipment. Users and smart industrial devices must go through authentication and key setting methods to share information in a secure manner with each other.
A scheme named UAKMS-NIB in the present disclosure will be described. Several phases used in a UAKMS-NIB method will be described in detail.
This phase is executed by a TA and for the TA selects an elliptic curve Ep(xx,xy): y2=x3+xx+xy(modp) and a base point P over GF(p). Next, the TA selects a one-way hash function h(⋅).
The TA registers a smart industrial device (SDz) through execution of the following steps.
The content server is registered in this phase. This task is executed by the TA in the following steps.
dTA
x
= d
P,
indicates data missing or illegible when filed
Table 1 shows symbols and notation used in the iUAKMS-NIB.
This phase provides user registration. To perform this phase, a user Ux interested in registering and the TA communicate with each other over a secure channel through execution of the following steps.
The TA places Qx over a public space and any intended identity has access to the Qx.
The Ux updates Dx with the tuple RIDx*, TIDx*, RDTA*, TCx*, dx*, Qx, τx, LVx*, h(⋅), Gen(⋅), Rep(⋅), t, Ep(a,b).
A registered user Ux initiates this phase to obtain NIB services, and for this, the Ux performs the following login and authentication steps.
The following is the details of ULA-1.
The Ux submits the tuple {IDx, PWx′, BOx′} consisting of its ID, password, and biometric information. The Dx checks the relation of BOx′ with the user biometric information imprinted during the registration phase, and when two pieces of biometric information match, the Dx computes d′x=RepB(BO′x, τx).
The user side computes the following.
and a′dx=dx⊕h(IDx∥a′x).
The Dx confirms the authenticity of the Ux if LV=h(IDx)∥RPW′x∥TCx∥dx∥a′x), and furthers the process by generating the timestamp and random number pair {T1, rx}.
The user device computes M1=h(rx∥T1)⊕(RDTA∥RDx∥dx·Qy∥T1), MM1=h(h(rx∥T1)∥TCx∥T1∥RDx∥RDTA)⊕h(h(rx∥T1)∥RDTA∥T1), Mx=h(RDx)∥RDTA), M2=Mx·P, M3=Mx+h(rx∥T1)·dx and selects the smart device with RDz as a pseudo ID. The Ux completes this step by transmitting Msg1={TIDx, RDz, M1, MM1, M2, M3, T1} to the CSy via an open channel.
The following is the details of ULA-2.
The CSy transmits Msg2={RDz, M4, MM2, M5, M6, MT, T1, T2} to the SDz.
The following is the details of ULA-3.
When the previous condition holds, the SDz further computes Xs=h(h(rx∥T1)∥TCx∥T1∥RDx∥RDTA). The SDz further the process by generating the timestamp and random number pair {T3, rz}, and computes M7=h(rz∥T3)⊕h(T1∥T3∥dz·Qx), Mx=h(RDz∥TCz)⊕h(h(rz∥T3)∥T1), Mz=h(h(RDz∥TCz)∥T1∥T3), M8=Mz·P and session key SKSDz, Ux=h(Xs∥h(rz∥T3)∥T1∥T2∥T3∥Mz).
The SDz generates a signature M9=Mz+h(SKz, Ux∥MT∥T1∥T3)·dz and transmits Msg3={M7, Mx, M8, M9, MT, T3, T2} to the Ux.
The Ux verifies the equality M9·P=M8+h(SKUx, SDz∥MT∥T1∥T3)·Qz, and after successful verification, the Ux computes TIDxnew=MT⊕h(h(rx∥T1)∥RDTA∥T2) and replaces TIDx with TIDxnew.
Referring to the Wazid et al.'s method shown in
The incorrectness in relation to
The authentication phase of the Wazid et al.'s method is incorrect and cannot be completed. As a severe consequence, a user and a smart industrial device may not share a key at all. Precisely, a user initiates a request by computing Msg1={TIDx, RDz, M1, MM1, M2, M3, T1} and transmitting the same to the CSy and the CSy further processes the request, verifies the legitimacy of the user, and then says the Ux. The message Msg2={RDz, M4, MM2, M5, M6, MT, T1, T2} is transmitted to the SDz. The SDz processes the message and verifies the legitimacy of the CSy. Next, the SDz computes Msg3={M7, Mx, M8, M9, MT, T3, T2} and transmits the same to the Ux. In this whole process, the SDz does not verify the legitimacy of the user Ux and the SDz does not know the real or pseudo ID of the user Ux, and the message Msg2 received from the CSy does not contain any tangible information on the ID of the Ux. Therefore, the step to send Msg3 from the SDz to the Ux is out of question. Thus, the scheme Wazid et al. is incorrect and due to this incorrectness, the scheme fails to complete a round of authentication process.
In addition, regarding ID de-synchronization shown in
If any of the message Msg2 or Msg3 is blocked by an attacker controlling the public communication channel as per CK attack model adopted herein, the Ux is unable to update the temporary TIDx, but the CSy has already updated the TIDx with TIDxnew after receiving Msg1. Both entities Ux and CSy have mismatched IDs. Therefore, ID de-synchronization occurs, and the next login by the Ux fails.
The present disclosure describes the details of an improved iUAKMS-NIB method proposed as shown in
An embodiment proposed in the present disclosure is described as follows.
This phase uses a fully TA (trusted authority and its identity, respectively) that selects a “non-singular elliptic curve Ep(a,b)” and forms “y2=x3+ax+b(mod p)” over a Galois (finite) field GF(p). Herein, p is a large prime such that the “Elliptic Curve Discrete Logarithm Problem (ECDLP)” is intractable with “a base point P in Ep(a, b)” of which the order is as big as p.
Furthermore, the TA selects a collision-resistant one-way cryptographic hash function h(⋅) with a private key dTA of the trusted authority.
The TA performs the following steps for registration of the deployment of a smart industrial device. To perform this, PRS-1 and PRS-2 are included.
In addition, the RI dz may be transmitted to the CSy by the TA in a secure way.
The content server CSy is registered in this phase. This task is executed by the TA in the following steps. To perform this, PRC-1 and PRC-2 are included.
The RDx and TIDx related to a registered user Ux are generated in the user registration phase as described below. In addition, the Qy is published publicly to other network entities.
In this phase, the registration of a user Ux is performed by the TA through a secure channel (e.g., in person) using the following steps.
To perform this, PRU-1 to PRU-4 are included.
The Qx is published publicly to other network entities.
Finally, RID*x, TID*x, RD*TA, TC*x, d*x, Qx, t x, LVx*, h(⋅), Gen(⋅), Rep(⋅), t, Ep(a,b), P are stored in the memory of the Dx. a′x, x, IDx, RPW′x, RDx, TIDx, RDTA, TCx, TCx, and dx are deleted from the memory of the Dx to protect against stolen verifier, privileged insider attack, unauthorized session key computation, illegal user's password guessing, and user impersonation attacks.
To access the services of the NIB, a legitimate user Ux needs to first login into the system. For such propose, the following steps are required. To perform such login, PLU-1 to PLU-3 are included.
Next, the Ux selects an accessed smart device SDz with a pseudo ID RDz and transmits a login message Msg1={TIDx, RDz, M1, MM1, M2, M3, T1} to the CSy via an open channel.
This phase is required for mutual authentication among a registered user Ux, a content server CSy, and an accessed smart industrial device SDz. After the successful completion of the following steps, both the Ux and the SDz establish a session key for secure communication via the CSy. To perform these functions, PKM-1 to PKM-6 are included.
It is valid, the SDz computes h(ry∥T2∥RDy)=M4⊕h(RDz∥dz·Qy∥T2), h(h(rx∥T1)∥TCx∥T1∥RDx∥RDTA)=MM2⊕h(h(rx∥T1)∥RDTA∥T1)⊕h(h(rx∥T1)∥RDTA∥T1)⊕h(h(ry∥T2∥RDy)∥T2∥RDz), My=h(RDz∥T2), and checks M6·P=M5+h(ry∥T2∥RDy)·Qy. If the SDz finds this condition true, the CSy is authenticated by the SDz and the SDz sets Xs=h(h(rx∥T1)∥TCx∥T1∥RDx∥RDTA).
In addition, if the above condition is true, the Ux replaces TIDx with TIDxnew in the memory database to be used in the upcoming sessions.
Performance analysis according to the present disclosure will be described as follows.
The present disclosure evaluates the performance of the proposed technique in terms of computation cost and communication cost of the proposed technique with the existing techniques.
The present disclosure set a real-time environment in which an experiment was conducted using the MIRACL Library on a smartphone, iphone Xs Max, which has 8 GB of RAM and a Dual Core+1.6 GHZ Quad-Core Processor. The underlying IOS operating system version is version 15.1. That is, iphone Xs Max was used and represented a user/mobile device in this experiment.
The Dell Ultrabook 8757P with an Intel Core i5-6300C processor and 8 GB of RAM was used as a content server, with the Windows 10 Pro operating system running on top of the system. In a similar way, Raspberry Pi 3 BC with Cortex-A53 (ARMv8) 64-bit SoC running at 1.4 GHZ and 1 GB of LPDDR2 SDRAM RAM was used to simulate a smart device. Table 2 contains the simulation results for each device. In addition, Tf≈Te is considered. Herein, Tf is the running time of executing a fuzzy extractor and Te is the time used to compute the results. According to the experimental results, the proposed technique may complete the authentication process in about 59.00 milliseconds at a cost of 40 Th+16Te+3Ta+3Tr.
The existing methods Wazid et al., Hussain et al., Jia et al., Chang et al., and Challa et al., complete authentication processes in about 60.428, 32.929, 58.561, 14.339, and 12.574 milliseconds, respectively. According to the computational cost, the Challa et al. performs the best, but the proposed method according to the present disclosure is significantly more secure than the rest of the methods. The comparison for each entity is shown in Table 3.
: Bi-linear Pairing
: Point Multiplication
: Point Addition
: Symmetric Key Operations
indicates data missing or illegible when filed
+ 6T
+
+ 6T
+
+ 5T
+
+ T
+ T
+ T
+ 2T
+
+ T
+ 4T
+
+ 2T
+
+ 3T
+
+ 2T
+
+ T
+ T
+ T
+ 2T
+
+ 2T
+
+ T
+
+ T
+
+ 6T
+
+ 5T
+
+ 5T
+
+ T
+ 2T
+ T
+ T
indicates data missing or illegible when filed
In the present disclosure, the communication cost of the proposed method is calculated and compared with the existing methods. Table 4 shows the sizes of different metric entities used in the proposed technique. For comparison and simplicity, the size of a user ID is 64 bits, the timestamp is 32 bits, the hash function is 160 bits, the random number is 64 bits, encryption (AES) is 128 bits, the size of ECC operation is fixed at 320 bits to maintain a comparable security level with 1024-bit RSA. Table 5 shows a detailed comparison among the suggested methods with regard to the bits transferred. However, the proposed method provides better security than all the above mentioned methods.
Security analysis according to the present disclosure will be described as follows.
To describe the security of the proposed scheme, the scheme was scrutinized through formal and informal security analyses below.
The security of the proposed method is formally analyzed in the standard model using the widely accepted Burrows-Abadi-Needham logic.
As assumptions for BAN logic, Table 6 shows some of the logical postulates of BAN logic and the meaning related to the postulates.
In setting security goals, Table 7 shows established security goals and logical notations of BAN logic.
The idealized form of the proposed scheme will be described as follows.
Table 4 shows the sizes of different metric entities used in the proposed technique.
Table 5 shows communication cost analysis.
Table 6 shows some of the logical postulates of BAN logic and the meaning related to the postulates.
Table 7 shows established security goals and logical notations of BAN logic.
Assuming the following,
Step 2—According to P1, Assumptions 1, 2, 3, and message meaning rule, the following are obtained.
Step 3—According to P2 and message belief rule, nonce verification and freshness rule, the following are obtained.
Step 4—According to S3, Assumptions A2 and A13, and jurisdiction rule, the following are obtained.
Step 5—According to P4 and P3, Assumptions A2, A13, A14, and belief rule, the following are obtained.
As shown in
The registration unit performs registration by selecting a private key dTA of the trusted authority with a collision-resistant one-way cryptographic hash function h(⋅).
In addition, the registration unit includes: a smart industrial device registration module 110 configured to select a unique ID and a random secret key for a smart device, compute a pseudo ID of the smart device, a public key of the random secret key, and a temporary credential according to a registration timestamp, and transmit a result of computation to the content server for registration; a content server registration module 120 configured to select a unique ID and a secret key to compute a pseudo ID of the content server, and compute and store a public key and a pseudo random number in a secure/tamper-resistant database to register the content server; and a user registration module 130 configured to select a user unique ID, a password, and a long-term random password to compute a masked password through a secure channel, and compute a pseudo ID and generate a temporary ID to compute and transmit a secret key for the user and a temporary credential to a user mobile device to perform user registration.
The user login unit 200 is configured to compute whether the Hamming distance between the biometric secret key and the currently recognized biometric secret key is equal to or less than the pre-defined error tolerance threshold, and imprint the biometric secret key at a sensor of a user mobile device, and select an accessed smart device with a pseudo ID RDz, and transmit a login message to the content server via an open channel.
The user authentication unit 300 receives a message from a user mobile device and perform authentication by the content server when a set condition is true. The content server transmits a message Msg2={RDz, M4, MM2, M5, M6, T1, T2} to the smart industrial device SDz via an open channel, and according to a set condition of message reception time, the content server is authenticated by the smart industrial device. The smart industrial device computes and transmits a session key and a signature to a user mobile Ux via an open channel. When messages are received from the smart industrial device and the content server and a session key and a set condition are satisfied, authentication is performed.
The present disclosure described above is not limited by the above-described embodiment and the accompanying drawings, and those skilled in the art will appreciate that various substitutions, modifications, and changes are possible without departing from the technical spirit of the present disclosure.
| Number | Date | Country | Kind |
|---|---|---|---|
| 10-2023-0013025 | Jan 2023 | KR | national |