Efficient and lightweight data streaming authentication in industrial automation and control systems

Jian Xu, Qingyu Meng, Jun Wu*, Xi Zheng, Xuyun Zhang, Suraj Sharma

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

The industrial control and automation systems have played an increasingly important role in critical manufacturing processes. In such systems, many Internet of Things devices continuously collect large number of streaming data for real-time processing. Verifiable data streaming (VDS) addresses such authenticity issue for streaming data, but most VDS schemes are not efficient and lightweight, do not support range querying, and cannot be used in practice. To improve the efficiency and achieve a verifiable range query in data streaming, we present here a new primitive, namely, a chameleon authentication tree with prefixes (PCAT), which is extended from the PBTree and chameleon authentication tree. Our scheme is not only lightweight but also supports dynamic expansion and verifiable range query in data streaming, making it more suitable for resource-constrained devices. We separate the PCAT's algorithms into the following phases: initialization, data appending, query, and verification. Our analyses prove that the PCAT satisfies all the security requirements of VDS. Moreover, an efficiency analysis and performance evaluation demonstrate that our scheme not only supports lightweight data streaming authentication but also has high efficiency, which means that the PCAT is easier to apply in the industrial control and automation systems.

Original languageEnglish
Pages (from-to)4279-4287
Number of pages9
JournalIEEE Transactions on Industrial Informatics
Volume17
Issue number6
Early online date8 Jul 2020
DOIs
Publication statusE-pub ahead of print - 8 Jul 2020

Keywords

  • Chameleon authentication tree (CAT)
  • Internet of Things (IoT)
  • integrity
  • resource-constrained devices
  • verifiable data streaming (VDS)

Fingerprint Dive into the research topics of 'Efficient and lightweight data streaming authentication in industrial automation and control systems'. Together they form a unique fingerprint.

Cite this