Show simple item record

dc.contributor.authorBarceló, Marc
dc.contributor.authorUrbieta, Aitor
dc.contributor.authorAstorga Burgo, Jasone ORCID
dc.contributor.authorJacob, Eduardo
dc.date.accessioned2022-04-21T10:46:36Z
dc.date.available2022-04-21T10:46:36Z
dc.date.issued2022-03-27
dc.identifier.citationSensors 22(7) : (2022) // Article ID 2561es_ES
dc.identifier.issn1424-8220
dc.identifier.urihttp://hdl.handle.net/10810/56379
dc.description.abstractDigital certificates are regarded as the most secure and scalable way of implementing authentication services in the Internet today. They are used by most popular security protocols, including Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The lifecycle management of digital certificates relies on centralized Certification Authority (CA)-based Public Key Infrastructures (PKIs). However, the implementation of PKIs and certificate lifecycle management procedures in Industrial Internet of Things (IIoT) environments presents some challenges, mainly due to the high resource consumption that they imply and the lack of trust in the centralized CAs. This paper identifies and describes the main challenges to implement certificate-based public key cryptography in IIoT environments and it surveys the alternative approaches proposed so far in the literature to address these challenges. Most proposals rely on the introduction of a Trusted Third Party to aid the IIoT devices in tasks that exceed their capacity. The proposed alternatives are complementary and their application depends on the specific challenge to solve, the application scenario, and the capacities of the involved IIoT devices. This paper revisits all these alternatives in light of industrial communication models, identifying their strengths and weaknesses, and providing an in-depth comparative analysis.es_ES
dc.description.sponsorshipThis work was financially supported by the European commission through ECSEL-JU 2018 program under the COMP4DRONES project (grant agreement N∘ 826610), with national financing from France, Spain, Italy, Netherlands, Austria, Czech, Belgium and Latvia. It was also partially supported by the Ayudas Cervera para Centros Tecnológicos grant of the Spanish Centre for the Development of Industrial Technology (CDTI) under the project EGIDA (CER-20191012), and in part by the Department of Economic Development and Competitiveness of the Basque Government through the project TRUSTIND—Creating Trust in the Industrial Digital Transformation (KK-2020/00054).es_ES
dc.language.isoenges_ES
dc.publisherMDPIes_ES
dc.relationinfo:eu-repo/grantAgreement/EC/H2020/826610es_ES
dc.rightsinfo:eu-repo/semantics/openAccesses_ES
dc.rights.urihttp://creativecommons.org/licenses/by/3.0/es/
dc.subjectABEes_ES
dc.subjectblockchaines_ES
dc.subjectDTLSes_ES
dc.subjectIIoTes_ES
dc.subjectPKIes_ES
dc.subjectX.509es_ES
dc.titleRevisiting the Feasibility of Public Key Cryptography in Light of IIoT Communicationses_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.date.updated2022-04-11T13:59:32Z
dc.rights.holder2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).es_ES
dc.relation.publisherversionhttps://www.mdpi.com/1424-8220/22/7/2561/htmes_ES
dc.identifier.doi10.3390/s22072561
dc.contributor.funderEuropean Commission
dc.departamentoesIngeniería de comunicaciones
dc.departamentoeuKomunikazioen ingeniaritza


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Except where otherwise noted, this item's license is described as 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).