Skip to main content

Data Transmission Security of Identity Resolution in Industrial Internet
draft-wang-data-transmission-security-irii-05

Document Type Active Internet-Draft (individual)
Authors Bin Wang , Kezhang Lin , Chonghua Wang , Xing (Tony) Wang , HaoNan Yan , Yinghui Xie
Last updated 2024-04-16
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-wang-data-transmission-security-irii-05
Internet Engineering Task Force                             B. Wang, Ed.
Internet-Draft                                               K. Lin, Ed.
Intended status: Standards Track                               Hikvision
Expires: 18 October 2024                                    C. Wang, Ed.
                                                                IIE, CAS
                                                            X. Wang, Ed.
                                                           H.N. Yan, Ed.
                                                           Y.H. Xie, Ed.
                                                               Hikvision
                                                           16 April 2024

Data Transmission Security of Identity Resolution in Industrial Internet
             draft-wang-data-transmission-security-irii-05

Abstract

   This draft presents a comprehensive overview of the data transmission
   security within the identity resolution system for the Industrial
   Internet.  Identity resolution systems play a vital role in the
   Industrial Internet, facilitating secure sharing and intelligent
   correlation of heterogeneous information across various
   organizations.  This draft focuses on the security services that
   identity resolution systems should provide during the resolution
   process.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 18 October 2024.

Copyright Notice

   Copyright (c) 2024 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

Wang, et al.             Expires 18 October 2024                [Page 1]
Internet-Draft      Data Transmission Security of IR          April 2024

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Terms and Definitions . . . . . . . . . . . . . . . . . . . .   3
     3.1.  International Root Node . . . . . . . . . . . . . . . . .   3
     3.2.  National Root Node  . . . . . . . . . . . . . . . . . . .   4
     3.3.  Secondary Node  . . . . . . . . . . . . . . . . . . . . .   4
     3.4.  Enterprise Node . . . . . . . . . . . . . . . . . . . . .   4
     3.5.  Recursive Node  . . . . . . . . . . . . . . . . . . . . .   4
     3.6.  Transmission Security . . . . . . . . . . . . . . . . . .   4
     3.7.  Privacy . . . . . . . . . . . . . . . . . . . . . . . . .   4
     3.8.  Personal Data . . . . . . . . . . . . . . . . . . . . . .   4
   4.  Abbreviation  . . . . . . . . . . . . . . . . . . . . . . . .   5
   5.  Overview  . . . . . . . . . . . . . . . . . . . . . . . . . .   5
   6.  Security Protection Scope . . . . . . . . . . . . . . . . . .   7
   7.  Security Technical Requirements . . . . . . . . . . . . . . .   8
     7.1.  Data Transmission Integrity . . . . . . . . . . . . . . .   8
     7.2.  Data Transmission Availability  . . . . . . . . . . . . .   9
     7.3.  Data Transmission Confidentiality . . . . . . . . . . . .   9
     7.4.  Data Transmission Authentication  . . . . . . . . . . . .   9
     7.5.  Data Transmission Strategy  . . . . . . . . . . . . . . .  10
     7.6.  Data Transmission Protocol  . . . . . . . . . . . . . . .  10
     7.7.  Maintenance and Update of Transmission Protocol . . . . .  10
     7.8.  Log and Audit . . . . . . . . . . . . . . . . . . . . . .  10
   8.  Protection Dimension  . . . . . . . . . . . . . . . . . . . .  11
     8.1.  Physical Security . . . . . . . . . . . . . . . . . . . .  11
     8.2.  Authentication Mechanism  . . . . . . . . . . . . . . . .  11
     8.3.  System Security . . . . . . . . . . . . . . . . . . . . .  11
     8.4.  Transmission Security . . . . . . . . . . . . . . . . . .  11
     8.5.  Network Security  . . . . . . . . . . . . . . . . . . . .  12
     8.6.  Application Security  . . . . . . . . . . . . . . . . . .  12
     8.7.  Cloud Security  . . . . . . . . . . . . . . . . . . . . .  12
   9.  Data Full Cycle Security  . . . . . . . . . . . . . . . . . .  12
     9.1.  Data Collection Security  . . . . . . . . . . . . . . . .  12
     9.2.  Data transmission security  . . . . . . . . . . . . . . .  12
     9.3.  Data storage security . . . . . . . . . . . . . . . . . .  13
   10. Security Considerations . . . . . . . . . . . . . . . . . . .  13
   11. IANA Considerations . . . . . . . . . . . . . . . . . . . . .  13

Wang, et al.             Expires 18 October 2024                [Page 2]
Internet-Draft      Data Transmission Security of IR          April 2024

   12. Informative References  . . . . . . . . . . . . . . . . . . .  13
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  13

1.  Introduction

   Identity resolution system is an important network infrastructure for
   the Industrial Internet.  It provides codes, registration and
   resolution services for industrial equipment, machines, materials,
   parts and products to achieve interoperability, secure sharing and
   intelligent association of heterogeneous information, which is an
   important cornerstone for the rapid development of the Industrial
   Internet.  Typical global identity resolution systems in existence
   include the Handle system [RFC3650] [RFC3651], the Object Identifier
   (OID) resolution system [OID], etc.  In order to ensure the security
   of data transmission involved in the Industrial Internet identity
   resolution systems, the security technical requirements are
   formulated to enhance the security of the entire Industrial Internet
   identity resolution system and reduce the security risk caused by
   data leakage.  The security technical requirements can be applied to
   the planning, construction, operation and management of data
   transmission security of Industrial Internet identity resolution
   systems.

2.  Scope

   This draft specifies the security technical requirements for the
   transmission of Industrial Internet identity resolution data.

   This draft applies to the planning, construction, operation and
   management of the Industrial Internet identity resolution data
   transmission security of the relevant parties.

3.  Terms and Definitions

3.1.  International Root Node

   International root nodes are the top-level service node of the
   identity resolution system.  They are not limited to specific
   countries or regions.  Their main role consists of two aspects: (1)
   to provide public root-level identity services for the global scope;
   (2) and to provide services such as data synchronization and
   registration resolution for different levels of nodes in local
   country.

Wang, et al.             Expires 18 October 2024                [Page 3]
Internet-Draft      Data Transmission Security of IR          April 2024

3.2.  National Root Node

   A national root node is the top-level node within a country or a
   region, which is connected to the international root node and
   secondary nodes, provides top-level identity resolution services for
   the whole country.

3.3.  Secondary Node

   A secondary node is a public node providing identity services for
   specific industries or multiple industries.  Secondary node is
   responsible for allocating identity and providing identity
   registration, identity resolution and identity data services for
   industrial enterprises.  Two types of secondary nodes exist, namely
   industry secondary nodes and comprehensive secondary nodes.

3.4.  Enterprise Node

   An enterprise node is an intra-enterprise identity service node which
   is able to provide identity registration, identity resolution service
   and identity data service for a specific enterprise.  An enterprise
   node should be connected to a secondary node.

3.5.  Recursive Node

   A recursive node is the key entrance facility of the identity
   resolution system, whose responsibility is to cache the resolution
   data in the process of identity resolution, in order to reduce the
   amount of resolution data processing and improve the efficiency of
   resolution services.

3.6.  Transmission Security

   Protect the confidentiality, integrity, availability and timeliness
   of data transmitted over the network.

3.7.  Privacy

   Privacy refers to the authority that individuals have to control
   their information, including who collects and stores it and who
   discloses it.

3.8.  Personal Data

   Personal Data refers to the information that a natural person can be
   identified directly through the data, or indirectly through the data
   combined with other information.

Wang, et al.             Expires 18 October 2024                [Page 4]
Internet-Draft      Data Transmission Security of IR          April 2024

4.  Abbreviation

           +==============+====================================+
           | Abbreviation |                          Full Name |
           +==============+====================================+
           | TLS          |           Transport Layer Security |
           +--------------+------------------------------------+
           | IPSec        |         Internet Protocol Security |
           +--------------+------------------------------------+
           | HTTPS        | Hypertext Transfer Protocol Secure |
           +--------------+------------------------------------+
           | OID          |                  Object Identifier |
           +--------------+------------------------------------+
           | DNS          |                 Domain Name System |
           +--------------+------------------------------------+
           | ENODE        |                    Enterprise Node |
           +--------------+------------------------------------+
           | IIP          |       Industrial Internet Platform |
           +--------------+------------------------------------+
           | HandleID     | Unique Identification of Equipment |
           +--------------+------------------------------------+

                           Table 1: Abbreviation

5.  Overview

   The Industrial Internet identity resolution and management service
   system represents a comprehensive platform that supports global
   traceability management of industrial IoT product data and enables
   dynamic sharing of information throughout the entire product
   lifecycle.  This system leverages the capabilities of security
   identity management and resolution to accomplish these objectives.
   In the context of Industrial Internet identity resolution, data
   transmission pertains to the technology employed in the Industrial
   Internet terminal to obtain and transmit information.  The security
   of this transmission involves various dimensions, including the basic
   security protection measures in network security, functional domain
   data transmission within and across domains, and the entirety of the
   system's lifecycle.

Wang, et al.             Expires 18 October 2024                [Page 5]
Internet-Draft      Data Transmission Security of IR          April 2024

                            +---------------+
              +-------------+ DNS Root Node +----------------+
              |             +---------------+                |
        +-----+-------+                             +--------+------+
        |OID Root Node|  International Root Node    |Ecode Root Node|
        +-----+-------+                             +--------+------+
              |                                              |
              |         +---------------------+              |
              +---------+                     +--------------+
                        |  Handle Root Node   |
            +----------->                     <----------------+
            |           +---------------------+                |
            |                                                  |
            |                                       +----------v---+
            |                                       |Secondary Node|
      +-----+--------+          +---------+         +------+-------+
      |Recursive Node+----+----->National |                |
      +-----^--------+    |     |Top Level|        +-------+--------+
            |             |     |Node     |        |                |
            |             |     +---------+   +----+------+ +-------+--+
            |             |                   | Enterprise| |Enterprise|
            |             |                   | Node      | |Node      |
            |             |                   +-----------+ +----------+
            |             |
+-----------+---------+   |    +--------------+
|Identity Resolution  |   +---->Secondary Node|
|Data and Application |        +------+-------+
| +------------+      |               |
| |Industry App|      |       +-------+--------+
| +------------+      |       |                |
| +-----------+       |  +----+------+ +-------+--+
| |Enterprise |       |  | Enterprise| |Enterprise|
| |Information|       |  | Node      | |Node      |
| |System     |       |  +-----------+ +----------+
| +-----------+       |
| +-----------+       |
| |Industrial |       |
| |Internet   |       |
| |Platform   |       |
+-------------+-------+

   Figure 1: Industrial Internet Identity Resolution and Management
                            Service System

Wang, et al.             Expires 18 October 2024                [Page 6]
Internet-Draft      Data Transmission Security of IR          April 2024

6.  Security Protection Scope

   The security protection scope of the Industrial Internet identity
   resolution and management service system proposed in this draft
   mainly means that the identity is written into the device and is
   responsible for collecting product information, including device
   model, device type, generation batch, generation date, generation
   site, device production information link, device description data
   link, etc., integrate this information into identity data, and then
   publish it to the data exchange system for access by identity
   resolution enterprise nodes.  Among the identity resolution
   enterprise node, the identity resolution secondary node, and the
   identity resolution root node, the process of data synchronization
   between the application scenarios, the collection of data
   transmission technologies used, is used to provide security assurance
   and security support for the Industrial Internet identity data
   transmission.

   The scope of Industrial Internet identity data transmission security
   protection specifically includes the security and the security
   support of the data transmission interface within and between the
   functional domains of the Industrial Internet identity resolution
   system.  Its role is in the whole life cycle of the system (planning
   and design, development and construction, operation and maintenance ,
   abandonment and exit).

Wang, et al.             Expires 18 October 2024                [Page 7]
Internet-Draft      Data Transmission Security of IR          April 2024

            +--------------------------------------------------------+
            |          Identity Resolution Root Node                 |
            +-------------------------^------------------------------+
                                      |
            +-------------------------v------------------------------+
            |        Identity Resolution Secondary Node              |
            +-------------------------^------------------------------+
 +------------------------------------|--------------------------------+
 |                                    |                                |
 |          +-------------------------v------------------------------+ |
 |          |        Identity Resolution Enterprise Node             | |
 |          +-------------------------^------------------------------+ |
 |Demilitarized                       |                                |
 |   Zone   +-------------------------v------------------------------+ |
 |          |                Data Exchange System                    | |
 |          +-------------------------^------------------------------+ |
 |                                    |                                |
 +------------------------------------|--------------------------------+
 |          +-------------------------|------------------------------+ |
 |          |      Identity Generation and Management System         | |
 |          +------^------------------------------------------^------+ |
 |Enterprise       |                                          |        |
 | Intranet +------v-------+  Enterprise Products ------------v------+ |
 |          |              |  | +-----------------+ +--------------+ | |
 |          |              |  | |Network Hard Disk| |Access Control| | |
 |          |  Enterprise  |  | |Video Recorder   | |    Device    | | |
 |          | Information  |  | +-----------------+ +--------------+ | |
 |          |    System    |  | +------+    +----------+     +---+   | |
 |          |              |  | |Video |    |Industrial|     |...|   | |
 |          |              |  | |Camera|    |   Robot  |     |...|   | |
 |          |              |  | +------+    +----------+     +---+   | |
 |          +--------------+  +--------------------------------------+ |
 +---------------------------------------------------------------------+

   Figure 2: Industrial Internet Identity Resolution and Management
                            Service System

7.  Security Technical Requirements

7.1.  Data Transmission Integrity

   Data transmission should comply with the following common
   requirements:

Wang, et al.             Expires 18 October 2024                [Page 8]
Internet-Draft      Data Transmission Security of IR          April 2024

   1) Support the information integrity check mechanism during
   transmission to realize the transmission integrity protection of
   management data, authentication information, sensitive information,
   important business data and other data (such as: check code, message
   abstract, digital signature, etc.).

   2) Should have transmission delay and interrupt handling capabilities
   to ensure the integrity of the data.

   3) Cryptographic technology should be used to protect the integrity
   of important data in transmit.

   4) Measures should be taken to recover the data when data integrity
   is compromised.

7.2.  Data Transmission Availability

   The timeliness and accuracy of the data should be guaranteed during
   data transmission.  Specifically:

   1) Timeliness: the feature of identifying historical data received or
   data beyond the time limit.  Specifically, the data comes from the
   system using a unified time allocation/correction mechanism, and the
   data should include time stamps, etc.

   2) Accuracy: When there is an acceptable error in the data, there is
   an overload to ensure the normal acquisition of the data in time.

7.3.  Data Transmission Confidentiality

   When transferring data, it is necessary to ensure the confidentiality
   of the data, including:

   1) For important data, authenticate information and important
   business data such as user passwords, biometrics, private keys,
   symmetric keys, product order information, and unique identity of a
   device (Handle ID), a certain strength encryption algorithm or other
   effective measures should be used to guarantee confidentiality.

   2) Appropriate security protocols (such as HTTPS, SSH, IPSec, TLS,
   etc.) should be used to safeguard the data being transmitted.

7.4.  Data Transmission Authentication

   Ensure the legitimacy of the identities of both parties in the data
   transmission, which means, ensure the identity authentication of the
   subject to the object before the interaction, and establish a trusted
   transmission path.

Wang, et al.             Expires 18 October 2024                [Page 9]
Internet-Draft      Data Transmission Security of IR          April 2024

7.5.  Data Transmission Strategy

   Establish a formal transmission strategy to protect the security of
   all types of information transmitted through communication
   facilities, and meet:

   1) Clarify the type and scope of information that can be transmitted
   in plain text.

   2) For sensitive data, such as user passwords, biometrics, private
   keys, symmetric keys, etc., an encrypted transmission strategy is
   required.

7.6.  Data Transmission Protocol

   The protocol should address the safe transmission of internal and
   external business, and meet:

   Cryptographic algorithms such as data abstract, signature, and
   authentication shall use the cryptographic algorithms and
   combinations of abstract, signature, and authentication required by
   national regulations or national mandatory standards.

7.7.  Maintenance and Update of Transmission Protocol

   The confidentiality protocol for data transmission should be
   regularly maintained and updated so that the procotol should reflect
   the requirements for data transmission security protection and meet:

   1) The transmission security protocol needs to be reviewed every year
   to ensure that the agreement should reflect the requirements for data
   transmission security protection

   2) When new services are launched or existing services are changed,
   the transmission security protocol needs to be audited and updated if
   necessary

7.8.  Log and Audit

   The transmission system shall log and audit the following security
   failure events.  The content of the log shall at least contains date/
   time, event type, event subject, event description, event result
   information, and meet the following requirements:

   1) The results of data transmission channel creation

   2) Transmission device online monitoring abnormalities and alarm
   events

Wang, et al.             Expires 18 October 2024               [Page 10]
Internet-Draft      Data Transmission Security of IR          April 2024

   3) Malicious program intrusion alert event

   4) Configuration modification operations caused by administrators/
   non-administrators

8.  Protection Dimension

   From the perspective of security requirement analysis and protection
   scheme design, the following implementable protection solutions can
   be considered.

8.1.  Physical Security

   Ensuring physical security encompasses device hardware security,
   anti-interference measures, and prevention of transmission
   interception.  Qualified devices may also incorporate security chips,
   encryption, key storage, and device identity authentication
   capabilities.  Without robust physical security measures in place,
   implementing other security measures becomes challenging.

8.2.  Authentication Mechanism

   This involves incorporating multiple authentication and access
   control mechanisms, such as dual-factor authentication and
   fingerprint scanners, suitable for IoT devices.  Enhancing the
   security of human-machine interaction and machine-machine interface
   ensures the overall data security.

8.3.  System Security

   It involves reinforcing the security of the operating system,
   including digitally signing the operating system code to prevent
   tampering.  Additionally, the access interfaces (APIs) provided by
   the system externally need to be secured.  Data transmission
   interfaces should be analyzed to provide encryption and integrity
   protection functions.

8.4.  Transmission Security

   The protocol design at the transport layer should systematically
   analyze security and privacy threats and risks, ensuring the
   derivation of appropriate safety requirements.  Preventing privacy
   violations should also be considered as one of its primary
   considerations.

Wang, et al.             Expires 18 October 2024               [Page 11]
Internet-Draft      Data Transmission Security of IR          April 2024

8.5.  Network Security

   Traditional network security devices and functions can still serve as
   means or supplements to Perimeter Security in the Industial Internet.
   Examples include gateway security, firewalls, antivirus and anti-
   malware products, intrusion detection systems (IDS), and intrusion
   prevention systems (IPS).

8.6.  Application Security

   IoT application developers must prioritize the security and privacy
   protection of their applications.  When designing IoT systems, a
   comprehensive analysis of security should be conducted, finding a
   suitable tradeoff between user experience and protection.

8.7.  Cloud Security

   Considering the constrained processing power of IoT devices, security
   solutions for cloud data in the Industrial Internet should take into
   account the distinctive characteristics of IoT data, including its
   high volume endpoints and rapid flow.

9.  Data Full Cycle Security

9.1.  Data Collection Security

   When collecting data, it is necessary to comply with relevant laws
   and regulations, especially when it comes to personal data, so that
   users are informed, and must follow the principles of user consent,
   minimize collection, collect the required data according to need, and
   clearly set out the scope of collection and the purpose of use in the
   privacy policy.

9.2.  Data transmission security

   When transmitting the collected data, the identity of the two
   communicating parties is identified to ensure that the entity
   receiving or sending the data is a legitimate user, at which time
   digital signatures and other cryptographic techniques are mainly used
   to realize identity authentication.  During transmission, it must be
   ensured that the data content will not be leaked and the data can be
   perceived after being tampered with, i.e., the confidentiality and
   integrity of the transmitted data must be ensured, which can be
   realized by using traditional cryptographic algorithms, such as
   encryption, hash, digital signature, and so on.

Wang, et al.             Expires 18 October 2024               [Page 12]
Internet-Draft      Data Transmission Security of IR          April 2024

9.3.  Data storage security

   When storing data, the data should be stored in hierarchical
   isolation, according to the sensitive level of the data, and the data
   of different levels can be stored in different hard disks by using
   physical isolation, or by using logical isolation, using
   virtualization and other related technologies to achieve isolation
   between the areas where the data of different levels are located.

10.  Security Considerations

   This entire memo deals with security issues.

11.  IANA Considerations

   This documents has no IANA actions.

12.  Informative References

   [OID]      "Introduction to OIDs and the OID Resolution System
              (ORS)", May 2020,
              <http://www.oid-info.com/introduction.htm>.

   [RFC3650]  Sun, S., Lannom, L., and B. Boesch, "Handle System
              Overview", DOI 10.17487/RFC3650, November 2003,
              <https://www.rfc-editor.org/info/rfc3650>.

   [RFC3651]  Sun, S., Reilly, S., and L. Lannom, "Handle System
              Namespace and Service Definition", DOI 10.17487/RFC3651,
              November 2003, <https://www.rfc-editor.org/info/rfc3651>.

Authors' Addresses

   Bin Wang (editor)
   Hikvision
   555 Qianmo Road, Binjiang District
   Hangzhou
   310051
   China
   Phone: +86 571 8847 3644
   Email: wbin2006@gmail.com

Wang, et al.             Expires 18 October 2024               [Page 13]
Internet-Draft      Data Transmission Security of IR          April 2024

   Kezhang Lin (editor)
   Hikvision
   555 Qianmo Road, Binjiang District
   Hangzhou
   310051
   China
   Phone: +86 571 8847 3644
   Email: lkz_wz98@163.com

   Chonghua Wang (editor)
   IIE, CAS
   Beijing
   100093
   China
   Phone: +86 185 1894 5987
   Email: chonghuaw@live.com

   Xing Wang (editor)
   Hikvision
   555 Qianmo Road, Binjiang District
   Hangzhou
   310051
   China
   Phone: +86 571 8847 3644
   Email: xing.wang.email@gmail.com

   HaoNan Yan (editor)
   Hikvision
   555 Qianmo Road, Binjiang District
   Hangzhou
   310051
   China
   Phone: +86 571 8847 3644
   Email: yanhaonan@hikvision.com

   Yinghui Xie (editor)
   Hikvision
   555 Qianmo Road, Binjiang District
   Hangzhou
   310051
   China
   Phone: +86 571 8847 3644
   Email: xieyinghui@hikvision.com

Wang, et al.             Expires 18 October 2024               [Page 14]