得益於工業物聯網,智慧工廠進入繁榮期。在現代智慧製造工廠場域中,身份認證是一個重要的資訊安全議點,工控設備实现身份認證可以避免讓未授權的設備進入到場域網路而造成資安風險。因此,我們引入區塊鏈架構這一構建分散式網絡的新興方案,來重塑傳統的工業物聯網架構。在本論文中,我們引入了一個安全和隱私模型來幫助設計基於區塊鏈的架構。 在此基礎上,我們對原有的工業物聯網架構進行分解重組,形成一個新的去中心化架構。然後,我們再引用一些相關的安全演算法結合設備的不可篡改特徵與數位憑證特徵形成通用唯一辨識碼,以此来解決工控設備進入物聯網架構前的信任問題,並討論使用相關的BLAKE2b雜凑演算法之間的複雜度與能耗差異。最後,我們通過使用模擬工控網路環境進行實驗,並基於MITRE ATT CK安全框架進行模擬攻防演練,實驗結果證明我們所提出的架構比傳統架構提供了更好的安全性與隱私保護,為工業物聯網身份認證的技術發展提供了新的方向。
Thanks to the Industrial Internet of Things, smart factories have entered a period of prosperity. In the field of modern smart manufacturing factories, identity authentication is an important information security issue. Implementing identity authentication for industrial control equipment can prevent unauthorized equipment from entering the field network and causing information security risks. Therefore, we introduce blockchain architecture, an emerging solution for building decentralized networks, to reshape the traditional industrial IoT architecture. In this paper, we introduce a security and privacy model to help design blockchain-based architectures. On this basis, we decomposed and reorganized the original industrial IoT architecture to form a new decentralized architecture. Then, we will quote some relevant security algorithms to combine the non-tamperable characteristics of the device with the digital credential characteristics to form a universal unique identification code to solve the trust problem of industrial control equipment before entering the Internet of Things architecture, and discuss the use of the related BLAKE2b hash algorithm Differences in complexity and energy consumption between methods. Finally, we conducted experiments using a simulated industrial control network environment and conducted simulated attack and defense drills based on the MITER ATT CK security framework. The experimental results proved that our proposed architecture provides better security and privacy protection than traditional architectures, and provides a better foundation for the industrial Internet of Things. The technological development of identity authentication provides new directions.