Risk Analysis of Industrial Internet Identity System

Risk Analysis of Industrial Internet Identity System

Risk Analysis of Industrial Internet Identity System TANG Kai (ZTE Corporation, Shenzhen, Guangdong 518057, China) Abstract : The risks of the current identity system represented by Domain Name System (DNS) and Object Identifier (OID) are studied. According to the characteristics of the industri⁃ al Internet Identity (III) system, four open ecosystem planes are divided, and a corresponding DOI: 10.12142/ZTECOM.202001007 risk analysis view is established to analyze risks for various planes. This paper uses Isaiah ’ Berlin s definition of liberty to more generally express the concept of security as positive http://kns.cnki.net/kcms/detail/34.1294. TN.20200316.1140.004.html, published rights and negative rights. In the risk analysis view, the target system is modeled from four di⁃ , online March 16, 2020 mensions: stakeholders, framework, architecture, and capability delivery. At last three defen⁃ sive lines are proposed to establish the identity credit system. Manuscript received: 2019-12-10 Keywords : industrial Internet; identity credit system; risk analysis view; right framework; security attribute Citation “ ”ZTE Communications – (IEEE Format): K. Tang, Risk analysis of industrial internet identity system, , vol. 18, no. 1, pp. 44 48, Mar. 2020. doi: 10.12142/ZTECOM.202001007. 1 Introduction 2 Risks of Traditional Industrial Identity he traditional Internet identity system is based on Systems Domain Name System (DNS) and Public Key Infra⁃ Traditional industrial identity systems are dedicated identi⁃ Tstructure (PKI) technologies, with which the Inter⁃ ty systems for different industries. Object Identifier (OID) is a net Corporation for Assigned Names and Numbers typical one, jointly proposed by International Organization for (ICANN)/Certificate Authority (CA) and other institutions ’ - Standardization/International Electrotechnical Commission- maintain the Internet s root of trust and facilitate host ori⁃ (ISO/IEC) and International Telecommunications- Union Tele⁃ ented addressing and authentication to meet the identity re⁃ communication Standardization Sector (ITU T) [1]. An OID quirements of massive asymmetric web computing models. consists of identifier system, registration system and resolu⁃ As the Internet economy penetrates into all areas of soci⁃ tion system. Its resolution system makes use of the ubiquitous ety, infrastructure maintainers and industry regulators resolution capabilities of DNS. have full credit to provide diversified identity endorsement ’ As an important part of the Internet infrastructure, DNS is capabilities without relying on the Internet s root of trust. designed just like the Internet at the beginning, without securi⁃ For the sake of security and controllability, independent ty considerations, which has made it a main target and means identity systems have been proposed in the industrial Inter⁃ for various network attacks, such as: net field. 1) Distributed Denial of Service (DDoS) attacks against ZTE COMMUNICATIONS 44 March 2020 Vol. 18 No. 1 Risk Analysis of Industrial Internet Identity System Special Topic TANG Kai - Fig. 1 DNS servers: including host exhaustion based DNS- query de⁃ ness plane, according to [2]. As shown in , the III eco⁃ nial of service attacks and bandwidth exhaustion based DNS system combines new security characteristics at different reflector denial of service attacks (also known as DNS amplifi⁃ planes to facilitate risk analysis. cation attacks). 2) DNS hijacking against users: including DNS server ad⁃ 4 Risk Analysis Process, View and Imple⁃ dress hijacking, hosts file hijacking, cache poisoning, Kamin⁃ mentation sky cache poisoning, hacking DNS servers, etc. Generally speaking, the traditional industrial identity sys⁃ 4.1 Risk Management Processes tems· have several risks as follows. Lack of authentication: Traditional DNS based industry In order to manage risks, each III ecosystem plane needs to identity systems need to be combined with other technologies support risk management processes, which are based on the to provide authentication capabilities. Due to the diversifica⁃ ISO series of risk management guidelines, including risk anal⁃ tion of industry authentication scenarios, unified authentica⁃ ysis, risk evaluation, risk treatment, risk monitoring, etc. This tion mechanism cannot be specified from top design of the article focuses on risk analysis (including risk identification). ISO 31000: 2018 [3] and ISO 27005: 2018 [4] define gener⁃ identity· system. - Lack of permission control: Finer grained permission con⁃ al risk management guidelines and information security risk trol is not available to meet the higher security requirements management guidelines, which can be used to guide the con⁃ struction of a risk management system. in· some special scenarios. Lack of credible endorsement for identity: Authorized 4.2 Building an III Oriented Risk Analysis View identity organizations do not have strong credit themselves, and often require third parties (such as regulatory authorities) The view of risk analysis is important for risk analysis and to endorse in order to provide sufficient credit to the public even risk management. As required by the principles in [3], and industry chain. However, the establishment and maturity risk management should be structured, comprehensive, cus⁃ tomized and inclusive. It is necessary for III risk analysis to of· the identity credit system takes time. Interoperability risks with international roots: Not all root study the scope and open ecosystem characteristics of III nodes of the identity system have backup in every country. system, conduct a comprehensive analysis based on a struc⁃ tured plane, and fully consider the demands of different Therefore· , when interworking occurs, risks arise. Long authorization chain that leads to the dilution of stakeholders. credit: The superior nodes to inferior nodes lacks visibility In order to analyze risks of different identity ecosystem and controllability from management to technology. As the planes, this paper builds a risk analysis view oriented to the authorization chain grows longer, the trust relationship weak⁃ characteristics of III system, based on mature methods and ens rapidly. practice in the field of risk management and threat modeling. · This is a more structured view of risk analysis for more logical Inadequate business admittance and certification: Lack of Fig. 2 . a mature certification standard and practice in the industry processes and results ( ) The following is the analysis process with the proposed view. identity system is not conducive- to the establishment of an identity credit system and long term healthy development. 1) Determining the scope and boundaries of the target sys⁃ tem. When using the risk analysis view, one first needs to deter⁃ 3 Ecosystem Planes of Industrial Internet mine the scope and boundaries of the target system and identi⁃ Identity In the 5G era, the Industrial Internet Identity (III) system is emerging with important meaning and rich connotation, cover⁃ ing all aspects of the industrial Internet in a broad sense. Its Credit, brand Assets related management and Business compliance, contractual, essence is an open identity system with a series of ecosystem services, etc. Plane and maturity, etc. characteristics. First of all, in an open Internet environment, the asset and value are the main characteristics of an identity ecosystem; secondly, the industrial Internet is based on the in⁃ Related to the field use of the identity, involving Asset Plane Service identity tegration of Information Technology (IT) and Operational Tech⁃ the medium, device, and related applica⁃ nology (OT), and the identity has the characteristics of field reader, etc. tions data Environment Service Plane and environmental relevance. The last, with strong industrial⁃ Plane ization, vertical regulation and control are often necessary. In this paper, the III ecosystem is divided into four planes: Figure 1. Industrial Internet Identity (III) ecosystem. the environment plane, service plane, asset plane, and busi⁃ ZTE COMMUNICATIONS March 2020 Vol. 18 No. 1 45 Special Topic Risk Analysis of Industrial Internet Identity System TANG Kai Risk Communication Risk Management ·Stakeholders Rights Positive Right Negative Right ·Regulator ·Management Authority ·Authorized Organization Value Concepts ·Architecture Owner ·Framework Owner Collaborator/Partner Credit Asset Application Identifier Medium · Brand Service Data Identity Device ·Medium/Device Vendor ·Customer/End User ⁃ ·Service Provider Risk Controls Trust Relationships Vulnerabilities Architecture (Cross Domain Object Collaboration) ·Application Developer etc. Target System Framework (Heterogeneous System Interconnection) Capability Delivery Organizational & Technical Risk Events Risk Sources Risk analysis, evaluation, treatment and monitoring Figure 2. Proposed view of the Industrial Internet Identity (III) risk analysis. ▲ fy III related objects. Different ecosystem planes have differ⁃ tivity of different stakeholders to different rights. ent scopes and objects. It is not appropriate to extend the The rights of different stakeholders may conflict, especially scope and boundaries outside the III ecosystem. The main ob⁃ with the rights of regulators or decision makers. At this time, jects related to identity include identity related organizations the use of a right framework can more clearly express this con⁃ and individuals, identified equipment or assets, various identi⁃ flict relationship and help to form a balanced solution.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us