Cross-Layer Device Authentication with Quantum Encryption for 5G Enabled IIoT in Industry 4.0
Industrial Internet of Things (IIoT), a core enabler of Industry 4.0, is evolving rapidly to tackle the challenges imposed by explosive real-time manufacturing data in the context of Internet and telecommunication industry. 5G technology is the key to addressing such challenges. This is done by bypa...
Gespeichert in:
| Veröffentlicht in: | IEEE transactions on industrial informatics Jg. 18; H. 9; S. 1 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Piscataway
IEEE
01.09.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Schlagworte: | |
| ISSN: | 1551-3203, 1941-0050 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Industrial Internet of Things (IIoT), a core enabler of Industry 4.0, is evolving rapidly to tackle the challenges imposed by explosive real-time manufacturing data in the context of Internet and telecommunication industry. 5G technology is the key to addressing such challenges. This is done by bypassing upper authentication protocols and supporting small data transmission during initial access, which however causes serious security breaches in IIoT device authentication. To solve this, we in this paper propose a secure cross-layer authentication framework based on quantum walk on circles. The system performs random hash coding on multi-domain physical-layer resources to encode and decode device identifiers securely, while using a quantum walk based privacy-preserving protocol to maintain code privacy at arbitrary high level, being controlled by the number of occupied physical resources. The upper bound of decoding errors is derived and a non-convex integer programming problem of minimizing the bound is formulated to characterize the security performance. The space of one-time keys for encryption is also derived that show how high privacy and scalability advantage is maintained against classical and quantum computers. Finally we derive novel expressions of failure probability of this new authentication system and numerically show that our scheme can bring ultra-high level of security and privacy protection with low latency despite attack. |
|---|---|
| AbstractList | Industrial Internet of Things (IIoT), a core enabler of Industry 4.0, is evolving rapidly to tackle the challenges imposed by explosive real-time manufacturing data in the context of Internet and telecommunication industry. 5G technology is the key to addressing such challenges. This is done by bypassing upper authentication protocols and supporting small data transmission during initial access, which, however, causes serious security breaches in IIoT device authentication. To solve this, in this article propose a secure cross-layer authentication framework based on quantum walk on circles. The system performs random hash coding on multidomain physical-layer resources to encode and decode device identifiers securely, while using a quantum walk based privacy-preserving protocol to maintain code privacy at arbitrary high level, being controlled by the number of occupied physical resources. The upper bound of decoding errors is derived and a nonconvex integer programming problem of minimizing the bound is formulated to characterize the security performance. The space of one-time keys for encryption is also derived that show how high privacy and scalability advantage is maintained against classical and quantum computers. Finally, we derive novel expressions of failure probability of this new authentication system and numerically show that our scheme can bring ultrahigh level of security and privacy protection with low latency despite attack. Industrial Internet of Things (IIoT), a core enabler of Industry 4.0, is evolving rapidly to tackle the challenges imposed by explosive real-time manufacturing data in the context of Internet and telecommunication industry. 5G technology is the key to addressing such challenges. This is done by bypassing upper authentication protocols and supporting small data transmission during initial access, which however causes serious security breaches in IIoT device authentication. To solve this, we in this paper propose a secure cross-layer authentication framework based on quantum walk on circles. The system performs random hash coding on multi-domain physical-layer resources to encode and decode device identifiers securely, while using a quantum walk based privacy-preserving protocol to maintain code privacy at arbitrary high level, being controlled by the number of occupied physical resources. The upper bound of decoding errors is derived and a non-convex integer programming problem of minimizing the bound is formulated to characterize the security performance. The space of one-time keys for encryption is also derived that show how high privacy and scalability advantage is maintained against classical and quantum computers. Finally we derive novel expressions of failure probability of this new authentication system and numerically show that our scheme can bring ultra-high level of security and privacy protection with low latency despite attack. |
| Author | Ritcey, James A. Yu, Keping Xu, Dongyang |
| Author_xml | – sequence: 1 givenname: Dongyang surname: Xu fullname: Xu, Dongyang email: xudongyang@xjtu.edu.cn organization: Xi'an, China, 710049 (e-mail: xudongyang@xjtu.edu.cn) – sequence: 2 givenname: Keping surname: Yu fullname: Yu, Keping email: keping.yu@ieee.org organization: Global Information and Telecommunication Institute, Waseda University, 13148 Shinjuku-ku, Tokyo, Japan, 169-8050 (e-mail: keping.yu@ieee.org) – sequence: 3 givenname: James A. surname: Ritcey fullname: Ritcey, James A. email: ritcey@ee.washington.edu organization: University of Washington, 7284 Seattle, Washington, United States, 98195-0005 (e-mail: ritcey@ee.washington.edu) |
| BookMark | eNp9kM1LwzAYxoNMcE7vgpeA59Y3SZssxzHnLAxEmEcJWZqyjC2daar0v7f7wIMHT-_Lw_O8H79rNPC1twjdEUgJAfm4LIqUAiUpIwwIZxdoSGRGEoAcBn2f5yRhFNgVum6aDQATwOQQfUxD3TTJQnc24Cf75YzFkzaurY_O6Ohqj79dXOO3VvvY7vDMm9Dtj3pVB5zPe0WvtrbERVEvsfO48GXbxNDhLIUbdFnpbWNvz3WE3p9ny-lLsnidF9PJIjFUkpjoKiNalEAoCM2NzseMSmq1IDQrpSxXxELFGZS61FpyOmYVLanlFXChGTFshB5Oc_eh_mxtE9WmboPvVyrKBRciy8ayd8HJZQ4_B1upfXA7HTpFQB0gqh6iOkBUZ4h9hP-JGBePWGLQbvtf8P4UdNba3z397fk44-wHfTZ_Ow |
| CODEN | ITIICH |
| CitedBy_id | crossref_primary_10_1109_JIOT_2024_3355228 crossref_primary_10_1109_TII_2022_3183221 crossref_primary_10_1145_3582556 crossref_primary_10_1109_ACCESS_2023_3247627 crossref_primary_10_1109_JIOT_2024_3376547 crossref_primary_10_1155_2022_3227712 crossref_primary_10_1109_TIE_2024_3429660 crossref_primary_10_1109_ACCESS_2023_3250251 crossref_primary_10_1155_2022_6951849 crossref_primary_10_1109_JIOT_2024_3367791 crossref_primary_10_1109_TITS_2022_3225709 crossref_primary_10_1109_COMST_2022_3224279 crossref_primary_10_3390_s23052686 crossref_primary_10_1016_j_adhoc_2025_103843 crossref_primary_10_32604_cmes_2022_021783 crossref_primary_10_3390_bdcc9020044 crossref_primary_10_1016_j_measurement_2024_115384 crossref_primary_10_1155_2022_3222979 crossref_primary_10_1016_j_iotcps_2022_09_001 crossref_primary_10_3390_s24227405 crossref_primary_10_3390_s24227209 crossref_primary_10_1109_ACCESS_2023_3253379 crossref_primary_10_1109_TWC_2022_3195234 crossref_primary_10_1109_TCE_2023_3339818 crossref_primary_10_1109_JIOT_2022_3160737 crossref_primary_10_1109_JPROC_2024_3420127 crossref_primary_10_1007_s10207_024_00951_8 crossref_primary_10_1186_s13677_023_00472_0 crossref_primary_10_1109_JIOT_2024_3492532 crossref_primary_10_1109_TCE_2025_3572058 crossref_primary_10_1016_j_compeleceng_2025_110143 crossref_primary_10_1109_TGCN_2024_3492258 crossref_primary_10_1007_s11280_022_01090_7 crossref_primary_10_3390_su151511487 crossref_primary_10_1016_j_compeleceng_2025_110524 |
| Cites_doi | 10.1145/3339252.3341481 10.1109/COMST.2020.3011208 10.1109/TII.2021.3116132 10.1016/j.comnet.2013.09.003 10.1016/j.promfg.2017.09.047 10.1080/23742917.2016.1252211 10.1109/JSAC.2013.130914 10.1109/TII.2018.2841049 10.1109/TIFS.2018.2850334 10.1109/ICC.2012.6364173 10.1155/2017/6562953 10.1109/TII.2018.2808190 10.1142/S0218127406015970 10.1109/JIOT.2020.2972915 10.1109/INFOCOMWKSHPS50562.2020.9162893 10.1109/TII.2018.2852491 10.1109/TMSCS.2016.2569446 10.1109/JSAC.2020.3018828 10.1109/EuroSP.2019.00041 10.1109/JIOT.2020.3048992 10.1109/ACCESS.2020.3033562 10.1038/srep19788 10.1109/JIOT.2020.3001597 10.1109/SP.2019.00038 10.3390/app10010217 10.1109/TIFS.2007.916273 10.1109/MCOM.101.2001126 10.1109/JBHI.2021.3112693 10.1109/TIFS.2020.2998947 10.1007/s11128-012-0421-8 10.1109/TIFS.2016.2552146 10.1109/JIOT.2021.3113321 10.3390/electronics9101746 10.3390/app10217670 10.1109/MCE.2021.3081874 10.1109/TII.2018.2834351 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/TII.2021.3130163 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore : IEEE Electronic Library (IEL) [unlimited simultaenous users] CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore : IEEE Electronic Library (IEL) [unlimited simultaenous users] url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1941-0050 |
| EndPage | 1 |
| ExternalDocumentID | 10_1109_TII_2021_3130163 9625846 |
| Genre | orig-research |
| GroupedDBID | 0R~ 29I 4.4 5GY 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AENEX AGQYO AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS 5VS AAYXX AETIX AGSQL CITATION EJD 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c291t-af41a7d01207a6ca583292ea7124d99db1e0f630dadaa96283f2d2e6f067a31c3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 72 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000811603400068&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1551-3203 |
| IngestDate | Tue Sep 23 17:40:57 EDT 2025 Sat Nov 29 04:16:59 EST 2025 Tue Nov 18 22:32:50 EST 2025 Wed Aug 27 02:26:40 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 9 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c291t-af41a7d01207a6ca583292ea7124d99db1e0f630dadaa96283f2d2e6f067a31c3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-6401-0545 0000-0001-5735-2507 |
| PQID | 2676774489 |
| PQPubID | 85507 |
| PageCount | 1 |
| ParticipantIDs | proquest_journals_2676774489 crossref_primary_10_1109_TII_2021_3130163 crossref_citationtrail_10_1109_TII_2021_3130163 ieee_primary_9625846 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-09-01 |
| PublicationDateYYYYMMDD | 2022-09-01 |
| PublicationDate_xml | – month: 09 year: 2022 text: 2022-09-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE transactions on industrial informatics |
| PublicationTitleAbbrev | TII |
| PublicationYear | 2022 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref35 ref34 ref12 ref37 ref15 ref36 ref31 ref30 ref33 ref11 ref32 ref10 ref2 ref39 ref17 ref38 ref16 ref19 ref18 (ref13) 2017 ref24 ref23 ref25 ref20 ref22 ref21 zhang (ref26) 2020; 9 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 clancy (ref14) 0 daugherty (ref1) 2015 |
| References_xml | – ident: ref2 doi: 10.1145/3339252.3341481 – ident: ref21 doi: 10.1109/COMST.2020.3011208 – ident: ref23 doi: 10.1109/TII.2021.3116132 – ident: ref39 doi: 10.1016/j.comnet.2013.09.003 – ident: ref18 doi: 10.1016/j.promfg.2017.09.047 – ident: ref17 doi: 10.1080/23742917.2016.1252211 – ident: ref32 doi: 10.1109/JSAC.2013.130914 – ident: ref25 doi: 10.1109/TII.2018.2841049 – ident: ref16 doi: 10.1109/TIFS.2018.2850334 – year: 2017 ident: ref13 article-title: UL grant-free transmission for URLLC – ident: ref15 doi: 10.1109/ICC.2012.6364173 – ident: ref7 doi: 10.1155/2017/6562953 – ident: ref5 doi: 10.1109/TII.2018.2808190 – ident: ref37 doi: 10.1142/S0218127406015970 – ident: ref33 doi: 10.1109/JIOT.2020.2972915 – ident: ref35 doi: 10.1109/INFOCOMWKSHPS50562.2020.9162893 – ident: ref20 doi: 10.1109/TII.2018.2852491 – ident: ref11 doi: 10.1109/TMSCS.2016.2569446 – ident: ref6 doi: 10.1109/JSAC.2020.3018828 – ident: ref9 doi: 10.1109/EuroSP.2019.00041 – ident: ref22 doi: 10.1109/JIOT.2020.3048992 – ident: ref34 doi: 10.1109/ACCESS.2020.3033562 – ident: ref38 doi: 10.1038/srep19788 – ident: ref30 doi: 10.1109/JIOT.2020.3001597 – ident: ref12 doi: 10.1109/SP.2019.00038 – ident: ref28 doi: 10.3390/app10010217 – ident: ref10 doi: 10.1109/TIFS.2007.916273 – ident: ref19 doi: 10.1109/MCOM.101.2001126 – year: 2015 ident: ref1 article-title: Winning with the industrial Internet of Things: How to accelerate the journey to productivity and growth – ident: ref3 doi: 10.1109/JBHI.2021.3112693 – ident: ref29 doi: 10.1109/TIFS.2020.2998947 – ident: ref36 doi: 10.1007/s11128-012-0421-8 – ident: ref31 doi: 10.1109/TIFS.2016.2552146 – ident: ref8 doi: 10.1109/JIOT.2021.3113321 – volume: 9 start-page: 1746 year: 2020 ident: ref26 article-title: Blockchain use in IoT for privacy-preserving anti-pandemic home quarantine publication-title: Electronics doi: 10.3390/electronics9101746 – ident: ref4 doi: 10.3390/app10217670 – start-page: 1 year: 0 ident: ref14 article-title: Efficient OFDM denial: Preamble jamming and preamble nulling publication-title: Proc IEEE Int Conf Commun – ident: ref27 doi: 10.1109/MCE.2021.3081874 – ident: ref24 doi: 10.1109/TII.2018.2834351 |
| SSID | ssj0037039 |
| Score | 2.573704 |
| Snippet | Industrial Internet of Things (IIoT), a core enabler of Industry 4.0, is evolving rapidly to tackle the challenges imposed by explosive real-time manufacturing... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | 5G mobile communication Authentication Communication system security Data transmission Decoding IIoT Industrial applications Industrial Internet of Things initial access Integer programming Privacy Protocols Quantum computers Quantum encryption Security Upper bounds Wireless communication |
| Title | Cross-Layer Device Authentication with Quantum Encryption for 5G Enabled IIoT in Industry 4.0 |
| URI | https://ieeexplore.ieee.org/document/9625846 https://www.proquest.com/docview/2676774489 |
| Volume | 18 |
| WOSCitedRecordID | wos000811603400068&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Xplore : IEEE Electronic Library (IEL) [unlimited simultaenous users] customDbUrl: eissn: 1941-0050 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0037039 issn: 1551-3203 databaseCode: RIE dateStart: 20050101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5q8aAHX1WsVsnBi2DabPaR5ig-C0UUKniRJa8FQbdSW8F_7yS7LYoieFuWhOzOJPPKzDcAR0Ua2aRfaKq44TQRJqXKFBFFzZlpo1NmK8j8obi56T88yNsGnCxqYZxzIfnMdf1juMu3YzPzobKeRGMd9eUSLAmRVbVac6kb486VARs1jWjMWTy_kmSyNxoM0BHkEfqnuJ2z-JsKCj1VfgjioF0u1__3XRuwVluR5LRi-yY0XLkFq1-wBVvweOYXp0OFNjU5d14gEB8P89lBVZiO-BgsuZshbWcv5KI0k48gPwjasSS9wje-rMqSwWA8Ik8lqbt8fJCky7bh_vJidHZN614K1HAZTakqkkgJ60tlhcqMSvEkS-6UQP1upbQ6cqzIYmaVVQr_px8X3HKXFajNVByZeAea5bh0u0CEYNpqi5aJ0R4-UDlvhWjJNDpvOknb0JuTNzc10Ljvd_GcB4eDyRwZknuG5DVD2nC8mPFagWz8MbblGbAYV9O-DZ05B_P6FL7l3KPRCXRA5d7vs_ZhhftyhpAz1oHmdDJzB7Bs3qdPb5PDsME-AZOtzE8 |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1ZSxxBEC48AuqDmqi4XumHvATSbk_Ptf0onkPWJYEN-BKGvgYEnZV1V_DfW9Uzu0Qigm_D0E3PVHXX1VVfAXyr0sglvcpwLa3kSW5Trm0VcdScmbEmFa6BzO_ng0Hv5kb9WoAf81oY731IPvPH9Bju8t3ITilU1lVorKO-XIRl6pyVNtVaM7kb495VAR01jXgsRTy7lBSqOywKdAVlhB4qbugsfqWEQleV_0Rx0C8XGx_7sk1Yb-1IdtIw_jMs-PoLrP2DLrgFf09pcd7XaFWzM08igVFEjPKDmkAdoygs-z1F6k7v2Xltx89BgjC0ZFl6iW-osMqxohgN2W3N2j4fzyw5Ftvw5-J8eHrF224K3EoVTbiukkjnjoplc51ZneJZVtLrHDW8U8qZyIsqi4XTTmv8n15cSSd9VqE-03Fk4x1Yqke13wWW58I449A2sYYABLUnO8QoYdB9M0nage6MvKVtocap48VdGVwOoUpkSEkMKVuGdOD7fMZDA7PxztgtYsB8XEv7DhzMOFi25_CxlIRHl6MLqvbenvUVVq6G1_2yXwx-7sOqpOKGkEF2AEuT8dQfwif7NLl9HB-FzfYCafDPmg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cross-Layer+Device+Authentication+with+Quantum+Encryption+for+5G+Enabled+IIoT+in+Industry+4.0&rft.jtitle=IEEE+transactions+on+industrial+informatics&rft.au=Xu%2C+Dongyang&rft.au=Yu%2C+Keping&rft.au=Ritcey%2C+James+A.&rft.date=2022-09-01&rft.pub=IEEE&rft.issn=1551-3203&rft.spage=1&rft.epage=1&rft_id=info:doi/10.1109%2FTII.2021.3130163&rft.externalDocID=9625846 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1551-3203&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1551-3203&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1551-3203&client=summon |