Combining System Integrity Verification with Identity and Access Management

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review


Digital transformation and the utilization of Industrial IoT (IIoT) introduces numerous interconnected devices to factories increasing among others the challenge of managing their software versions and giving attackers new possibilities to exploit various software vulnerabilities.

Factory networks were earlier isolated from the Internet. However, this separation is no longer valid and there can be connections that allow intruders to penetrate into information systems of factories. Another issue is that although factories typically are physically isolated, it is not necessarily safe to assume that physical security is in good shape as the novel supply networks comprise subcontracted activities and temporary work force. Another threat can also arise from unauthorized monitoring of devices and the unauthorized replacement of existing ones.

Based on the previous, it is crucial that IIoT security should be built into factories of the future (FoF) right from the design phase and even low-end devices need to be supported. Trusted computing concept called remote attestation should be used. Remote attestation allows remote parties to verify the integrity of each system component. System components should include trusted hardware components that can be used to measure executable software. The term measurement means calculating the cryptographic hash of the binary component before passing control to it. Trusted hardware components should also have a mechanism to protect the integrity of the measurement list and cryptographic keys that can be used to sign integrity assertions. The verifier part should have a storage of reference integrity metrics identifying the expected values of these measurements.

Deploying trusted computing and remote attestation concepts to industrial automation is not straightforward. Even if it is possible to use remote attestation with suitable hardware components, it is not clear how remote attestation should be integrated with various operational technology (OT) industrial automation protocols. Approaches to use remote attestation with existing industrial automation protocols (e.g., OPC UA) is discussed. Advanced identity and access management (e.g., OAuth2, OpenID Connect) can be used to combine integrity measurements with device identity information so that the remote attestation process is triggered by authentication during the first transaction. The focus is on machine-to-machine (M2M) communications with immutable device identities and integrity evidence transfer.
Original languageEnglish
Title of host publication Proceedings of the 21st European Conference on Cyber Warfare and Security
PublisherAcademic Conferences International (ACI)
Number of pages10
ISBN (Electronic)978-1-914587-41-2
ISBN (Print)978-1-914587-40-5
Publication statusPublished - 16 Jun 2022
MoE publication typeA4 Article in a conference publication
Event21st European Conference on Cyber Warfare and Security, ECCWS 2022 - University of Chester UK, Chester, United Kingdom
Duration: 16 Jun 202217 Jun 2022

Publication series

SeriesEuropean conference on cyber warfare and security (ECCWS)


Conference21st European Conference on Cyber Warfare and Security, ECCWS 2022
Country/TerritoryUnited Kingdom


  • industrial IoT
  • ;Remote attestation
  • OT protocols
  • Factory of the future
  • IAM
  • Trusted computing


Dive into the research topics of 'Combining System Integrity Verification with Identity and Access Management'. Together they form a unique fingerprint.

Cite this