AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (4.3 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Endogenous Security Formal Definition, Innovation Mechanisms, and Experiment Research in Industrial Internet

School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China
Show Author Information

Abstract

With the rapid development of information technologies, industrial Internet has become more open, and security issues have become more challenging. The endogenous security mechanism can achieve the autonomous immune mechanism without prior knowledge. However, endogenous security lacks a scientific and formal definition in industrial Internet. Therefore, firstly we give a formal definition of endogenous security in industrial Internet and propose a new industrial Internet endogenous security architecture with cost analysis. Secondly, the endogenous security innovation mechanism is clearly defined. Thirdly, an improved clone selection algorithm based on federated learning is proposed. Then, we analyze the threat model of the industrial Internet identity authentication scenario, and propose cross-domain authentication mechanism based on endogenous key and zero-knowledge proof. We conduct identity authentication experiments based on two types of blockchains and compare their experimental results. Based on the experimental analysis, Ethereum alliance blockchain can be used to provide the identity resolution services on the industrial Internet. Internet of Things Application (IOTA) public blockchain can be used for data aggregation analysis of Internet of Things (IoT) edge nodes. Finally, we propose three core challenges and solutions of endogenous security in industrial Internet and give future development directions.

References

[1]
H. Song, J. Bai, Y. Yi, J. Wu, and L. Liu, Artificial intelligence enabled Internet of Things: Network architecture and spectrum access, IEEE Comput. Intell. Mag., vol. 15, no. 1, pp. 4451, 2020.
[2]
F. Foukalas and A. Tziouvaras, Edge artificial intelligence for industrial Internet of Things applications: An industrial edge intelligence solution, IEEE Ind. Electron. Mag., vol. 15, no. 2, pp. 2836, 2021.
[3]
D. Wei, H. Ning, F. Shi, Y. Wan, J. Xu, S. Yang, and L. Zhu, Dataflow management in the Internet of Things: Sensing, control, and security, Tsinghua Science and Technology, vol. 26, no. 6, pp. 918930, 2021.
[4]
Y. Liu and M. Peng, 6G endogenous security: Architecture and key technologies, (in Chinese), Telecommunications Science, vol. 36, no. 1, pp. 1120, 2020.
[5]
A. Hu, L. Fang, and T. Li, Research on bionic mechanism based endogenous security defense system, (in Chinese), Chinese Journal of Network and Information Security, vol. 7, no. 1, pp. 1119, 2021.
[6]
X. Ji, J. Wu, L. Jin, K. Huang, Y. Chen, X. Sun, W. You, S. Huo, and J. Yang, Discussion on a new paradigm of endogenous security towards 6G networks, Front. Inf. Technol. Electron. Eng., vol. 23, no. 10, pp. 14211450, 2022.
[7]
G. Wei, H. Li, Y. Bai, G. Li, and K. Xing, Space-terrestrial integrated multi-identifier network with endogenous security, (in Chinese), Space-Integrated-Ground Information Networks, vol. 1, no. 2, pp. 6672, 2020.
[8]
S. Guo, Y. Qi, M. Dai, X. Qiu, F. Qi, and P. Zhang, Endogenous trusted network architecture for intelligent sharing, (in Chinese), Journal on Communications, vol. 41, no. 11, pp. 8698, 2020.
[9]
Z. Jiang, T. Li, and A. Hu, Research on endogenous security methods of embedded system, in Proc. 2020 IEEE 6th Int. Conf. Computer and Communications (ICCC), Chengdu, China, 2020, pp. 19461950.
[10]
Z. Zhou, X. Kuang, L. Sun, L. Zhong, and C. Xu, Endogenous security defense against deductive attack: When artificial intelligence meets active defense for online service, IEEE Commun. Mag., vol. 58, no. 6, pp. 5864, 2020.
[11]
Alliance of industrial Internet, The architecture of industrial Internet of Things v2.0, http://www.aii-alliance.org/upload/202004/0430_162140_875.pdf, 2020.
[12]
Alliance of industrial Internet, Security framework of industrial Internet of Things, http://www.aii-alliance.org/upload/202002/0228_140108_424.pdf, 2018.
[13]
Information Technology—Security Techniques—Encryption Algorithms—Part 5: Identity-Based Ciphers—Amendment 1: SM9 Mechanism, ISO/IEC 18033-5:2015/Amd 1:2021, 2021-02.
[14]
L. N. D. Castro and F. J. V. Zuben, Learning and optimization using the clonal selection principle, IEEE Trans. Evol. Comput., vol. 6, no. 3, pp. 239251, 2002.
[15]
J. Pang, Y. Huang, Z. Xie, J. Li, and Z. Cai, Collaborative city digital twin for the COVID-19 pandemic: A federated learning solution, Tsinghua Science and Technology, vol. 26, no. 5, pp. 759771, 2021.
[16]
S. Popov, The tangle, http://iotatoken.com/IOTA_Whitepaper.pdf, 2016.
Tsinghua Science and Technology
Pages 492-505
Cite this article:
Chen H, Han X, Zhang Y. Endogenous Security Formal Definition, Innovation Mechanisms, and Experiment Research in Industrial Internet. Tsinghua Science and Technology, 2024, 29(2): 492-505. https://doi.org/10.26599/TST.2023.9010034

533

Views

26

Downloads

2

Crossref

1

Web of Science

1

Scopus

0

CSCD

Altmetrics

Received: 07 December 2022
Revised: 21 March 2023
Accepted: 26 April 2023
Published: 22 September 2023
© The author(s) 2024.

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return