Abstract
The application of numerical control machine tool in the Internet of things has attracted large number of attention. It is a complex network system that integrates sensor network, Internet, and mobile communication network. However, some security issues have not been solved by Internet security technology. In order to enhance the security of system, we, respectively, propose a lightweight authentication method for wireless sensor networks and an Internet data privacy protection strategy based on organizational characteristics of computerized numerical control machine tool and the numerical control information transmission mode in Internet of things. The two methods constitute a privacy protection mechanism for numerical control information in Internet of things. In order to show the effectiveness of the privacy protection mechanisms, series of analysis about safety is presented. Analysis results show that this mechanism can ensure the security of information and the privacy of the numerical control machine tool in Internet of things.
Introduction
With the rapid application of wireless sensor technology in the numerical control machine tool, it is becoming more and more important that how to transmit these numerical control information over the network. In fact, the transmission will face a lot of security problems in Internet of things (IoT), such as false routing information, replay attacks, information disclosure, tampering, and denial of service. If the information is attacked, stolen, and tampered with, it will greatly hack a computerized numerical control (CNC) machine. Moreover, it will affect the proper operation of the digital machine tools and the product production. CNC machine is mainly concentrated in the digital interface technology of encoder, the network technology of wireless sensor, the synchronization technology between threads and communications, the prediction technology of fault, health management, and so on. However, there are some factors which will affect the system, such as network structure, terminal equipment, communication mode, and application scenario. Traditional security methods cannot effectively solve the privacy protection issues of the numerical control in the IoT because there are some special features during the numerical control information transmission. Therefore, it is necessary to propose a security transmission method and the privacy protection mechanism for numerical control information transmission in the IoT.
There are several security and the privacy protection problems for numerical control information in the IoT: (1) the transmission of numerical control information is distributed transmission and (2) the transmission usually goes through wireless sensor network, terminal equipment, and server. In this situation, the confidentiality and integrity of numerical control information are facing some safety problems. In addition, as the unrelated parties of numerical control information, it can also obtain the privacy information using false routing information and replay attack. In order to solve these problems, this article presents a numerical control information protection mechanism based on IoT. In this security protection mechanism, we, respectively, propose a lightweight authentication method for wireless sensor networks and an Internet data privacy protection strategy based on organizational characteristics of CNC machine tool and the numerical control information transmission mode in IoT.
This article is organized as follows: first, we discuss the related works. In section “Privacy protection of numerical control information,” a lightweight authentication method for wireless sensor networks is described, which is followed by an Internet data privacy protection strategy. Series of analysis about safety are done in section “Security analysis.” Finally, the conclusions are drawn in section “Conclusion and future works.”
Related works
With the rapid development of electronic information, IoT technology is considered as the commanding heights of the development of electronic information industry by many countries. A lot of research has been done and some achievements are obtained by people. The contributions and the achievements are described as follows.
Yang and Fang 1 proposed the security model of IoT and a frame of security technologies in IoT. They hope the security model and the frame can guide the research direction about the key technologies of IoT security. An intelligent fault prediction system is proposed based on IoT in order to ensure the safe operation of large equipment. 2 The system is used for key mechanical equipment groups and aims at improving the working efficiency and the intelligent level of fault prediction.
A business model framework specifically for IoT applications is presented. 3 Through a literature survey, interviews, and a survey among practitioners, it identifies the building blocks that are relevant in an IoT business model, types of options that can be focused on within these building blocks, and the relative importance of these building blocks and types. A comprehensive approach is presented to privacy in this envisioned setting in order to address this critical factor and thus realize the cloud-based IoT for a variety of different application areas. 4
A secure and lightweight authenticated key agreement scheme is presented for IoT. 5 The presentation of the scheme is to combine strengthened Menezes-Qu-Vanstone with implicit certificates. Malina et al. 6 presented a detailed assessment of the performance of the most used cryptographic algorithms on constrained devices that often appear in IoT networks. In this article, they evaluate the performance of symmetric primitives, such as block ciphers, hash functions, random number generators, and asymmetric primitives.
Mashal et al. 7 first introduced the concept of service recommender systems in IoT by a formal model. Then, they proposed a hyper-graph model for IoT recommender system in which each hyper-edge connects users, objects, and services. Finally, they studied the usefulness of traditional recommendation schemes and their hybrid approaches on IoT service recommendation based on existing well-known metrics. A lightweight and cross-domain prototype of a distributed architecture is presented for IoT. 8 In order to provide minimum data caching functionality and in-memory data processing, a number of supporting algorithms for the assessment of data quality and security are described.
PAgIoT is proposed, which is a privacy-preserving aggregation protocol. 9 In PAgIoT, data are decomposed into a set of attributes which are aggregated separately. A central node (sink) queries for the value of certain attributes, and remainder nodes respond depending on whether they possess or not these attributes.
A heterogeneous sign and encryption scheme is proposed to control the access behavior of the users in IoT. 10 The important characteristic of the scheme is to allow a user in a certificateless cryptography environment to send a message to a sensor node in an identity-based cryptography environment.
A knowledge-driven approach called context-aware sensor configuration model is proposed to simplify the process of configuring IoT middleware platforms. 11 To demonstrate the feasibility and the usability of the approach, a prototype implementation based on an IoT middleware called global sensor networks is shown. A lifetime balanced data aggregation scheme is proposed for the IoT under an application-specified end-to-end delay requirement. 12 The aims that they proposed the scheme are to prolong the IoT network lifetime under network heterogeneity and dynamics while ensuring the required data delivery delay.
A novel distributed secure data management with keyword search system is proposed for health IoT. 13 The system uses lightweight data encryption, lightweight keyword trapdoor generation, and lightweight data recovery, which leaves very few computations to user’s terminal. An end-to-end security scheme is proposed for mobility enabled healthcare IoT. 14 The scheme includes three parts. The first part is a secure and efficient end-user authentication and authorization architecture based on the certificate-based DTLS handshake. The second part is about secure end-to-end communication based on session resumption. The third part is about robust mobility based on interconnected smart gateways.
A novel real-time hybrid intrusion detection framework is proposed that consists of anomaly-based and specification-based intrusion detection modules for detecting two well-known routing attacks in IoT called sinkhole and selective-forwarding attacks. 15 Nair et al. 16 studied the use of co-operative relays for improving the performance of secure wireless communications in the presence of one or more eavesdroppers. In order to enhance the secrecy rate of physical layer via co-operative communication, two heuristic algorithms are used.
A secure publish/subscribe system is presented extending the message queue telemetry transport by means of a key management framework and a policy enforcement one. 17 In the secure publish/subscribe system, a lightweight publish/subscribe messaging protocol is designed for working with constrained devices. Ouaddah et al. described some different access control solutions in IoT and analyzed the security and privacy requirements for the most dominant IoT application domains, first. Then, they proposed a qualitative and a quantitative evaluation of the most relevant IoT. 18 Finally, they defined potential challenges and future research directions. A framework is proposed for IoT for building locally operating self-organizing and self-adaptive systems. 19 The framework is based on multi-agent systems and machine learning techniques, such as neural networks and evolutionary algorithms.
Based on the above description, we can draw this conclusion that people have achieved a series of achievements in IoT. However, there are a lot of difficulty problems needed to be resolved, especially in the case of the privacy protection of numerical control information. The main reason generating this state is mobile characteristic of terminals in wireless sensor network of numerical control machine and the unlimited characteristic of the Internet network for users. Meanwhile, the existing security risks of the wireless sensor network of numerical control machine and the Internet can also cause harm to the IoT. In fact, the security protection of privacy of numerical control information is one of the most important aspects to guarantee the normal operation of CNC machine tools. Therefore, we present a numerical control information protection mechanism based on IoT.
Privacy protection of numerical control information
In the IoT, the whole architecture of CNC machine system includes a variety of different functions of wireless sensor nodes (namely sensor nodes), wireless sensor networks, sinks (namely base stations or central controllers), local numerical control monitoring centers (LNCMC), CNC machine tools, cloud server, and so on. The basic implementation process is that the wireless sensor node and the CNC machine tool collect different data and sent them to corresponding sink by the wireless sensor networks. The sink connects the wireless sensor networks to an existing infrastructure where the user can access the collected data. The LNCMC can also access the collected data and can send these data to corresponding distal cloud server. Moreover, The LNCMC can also send some commands to the corresponding CNC machine tool, the wireless sensor nodes, and the sinks. The distal cloud server can receive the collected data and send some commands to corresponding local numerical control monitoring. Therefore, the architecture of CNC machine in the IoT can be shown as Figure 1.

The architecture of CNC machine in the IoT.
In the architecture, there are two types of networks. One is the CNC machine wireless sensor network and the other is the wired network. In the CNC machine wireless sensor network, there are a variety of different functions of wireless sensor nodes, sinks, and corresponding wireless ad hoc network. In the CNC machine wireless sensor network, the processing power of the chip of each sensor node is relatively weak which is not suitable for computing the complex encryption and decryption algorithm. This chip is only suitable for computing simple encryption and decryption algorithm in order to protect the security of the collected data. However, in the wired network, there are corresponding LNCMCs, CNC machine tool and cloud server, and so on. In the wired network, the processing power of the chip of CNC machine tool, the LNCMC, and the cloud server is relatively strong which is suitable for computing the complex encryption and decryption algorithm.
Based on the above analysis, we, respectively, propose a lightweight authentication method for CNC machine wireless sensor networks and an Internet data privacy protection strategy for wired network based on the organizational characteristics of CNC machine tool and the numerical control information transmission mode in IoT.
Lightweight authentication method
In the lightweight authentication method, we built a lightweight authentication protocol. The protocol includes five parts, namely, system setup phase, sensor node registration phase, user node registration phase, login phase, and authentication and session key agreement phases. We will describe these phases as follows, respectively. In order to describe the lightweight authentication method conveniently, all the notation and definitions used in the rest of this article are summarized in Table 1, respectively.
The notation and definitions used in this article.
System setup phase
In this protocol, there is a LNCMC that is fully trusted. This phase is done by the LNCMC in terms of the following steps. The pseudo-code of these steps can be described as follows:
The above steps can be described in detail as follows:
Step 1. The LNCMC chooses a unique identity
Step 2. The LNCMC chooses a master key
Step 3. The LNCMC selects a random number
Sensor node registration phase
The pseudo-code of this phase can be described as follows:
The above steps can be described in detail as follows:
Step 1. The sensor node
Step 2. Receiving the message
Step 3. Receiving the message
Step 4. Receiving the message
Step 5. Finally, the sensor node
User node registration phase
In this phase, if a user
The above steps can be described in detail as follows:
Step 1.
Step 2. Receiving the message of
Step 3. The user
Login phase
In this phase, it is necessary that the user
The smartcard
The above steps can be described in detail as follows:
Step 1. The user
Step 2. The smartcard computes
Authentication and session key agreement phase
In this phase, the user
The above steps can be described in detail as follows:
Step 1. The user
Step 2. Receiving the request message of the user
Step 3. Receiving the message of the sink, the user
Step 4. The user
Step 5. The sink first computes
Step 6. When the sensor node
Step 7. Upon receiving the message
Step 8. Upon receiving the message
Internet data privacy protection strategy
During the Internet data privacy protection, it involves sink, CNC machine tool, LNCMC, cloud server, and user. In order to realize the privacy protection of data in wired network, we propose an Internet data privacy protection strategy. Using the protection strategy, we can determine whether the privacy of data obtain security protection. The whole protection processes of data privacy are shown in Figure 2.

The whole protection processes of data privacy in wired network of IoT.
In the Internet data privacy protection strategy, we assume that the sink, the CNC machine tool, the LNCMC, the cloud server, and the user are loaded a public key in advance. During the whole processes that data are processed which include data upload, data storage, and data access, the system does not distribute the public key for them again. In the strategy, we propose two algorithms. One is the algorithm about the security storage of collected data and another is the algorithm about the security access of stored data in cloud server. The two algorithms are described as follows, respectively.
The algorithm about the security storage of collected data is as follows:
Step 1. The sink and the CNC machine tool first check the privacy of collected data. Then, the sink and the CNC machine tool register to the LNCMC. Moreover, the sink sends the data which are collected by corresponding sensor nodes to the LNCMC using our proposed lightweight authentication protocol. The CNC machine tool sends the collected data using the SSL technology. The transformation form of the collected data is
Step 2. The LNCMC authenticates the received data which are sent by the sink using our proposed lightweight authentication protocol and authenticate the received data which are sent by the CNC machine tool using the symmetric key. If the sink and the CNC machine tool are authenticated to be legal, the received data can be receipted. Otherwise, the received data will be rejected.
Step 3. The LNCMC decrypts the receipted data and stores them into itself storage spaces.
Step 4. The LNCMC registers to the cloud server and encrypts the stored data
Step 5. The cloud server authenticates the received data which are sent by the LNCMC using the symmetric key. If the LNCMC is authenticated to be legal, the received data can be receipted by the cloud server. Otherwise, the received data will be rejected.
Step 6. The cloud server decrypts the receipted data. After that, it encrypts the decrypted data using the XOR encryption technology.
Step 7. The cloud server stores these encrypted data.
Step 8. Judgment whether the LNCMC and the cloud server receiving data is end or not. If it is end, then go to Step 9. Otherwise, go to Step 1.
Step 9. End
The algorithm about the security access of stored data in cloud server is as follows:
Step 1. The user sends an access application to the cloud server. Before the access application is sent, it is encrypted by the symmetric encryption method, namely
Step 2. These encrypted data are sent to the cloud server using the SSL technology.
Step 3. The cloud server authenticates the received data which are sent by the user using the symmetric key. Then, it decrypts the encrypted data which are certified and get the source data, namely
Step 4. Based on the application and the types of data needed by the user, the cloud server send a transmission application to itself storage spaces and the LNCMC, respectively.
Step 5. According to the application of user, the cloud server sends corresponding encrypted data to the user, namely
Step 6. After receiving the transmission application of user, the LNCMC verifies whether the user is legal or not. If it is legal, the LNCMC receives the encrypted data sent by the user, namely
Step 7. After receiving the encrypted data sent by the user, the LNCMC checks whether there are the data which are needed by the user or not. If there are the data, the application of user is valid and the system goes to Step 8. Otherwise, the application of user is invalid and the system goes to Step 1.
Step 8. The LNCMC sends the encrypted data to the user according to the requirement of the user, namely,
Step 9. After receiving the encrypted data sent by the cloud server, the user decrypts these encrypted data using the public key of the cloud server and the private key of the user. On this basis, the user uses the symmetric key
Step 10. After receiving the encrypted data sent by the LNCMC, the user decrypts these encrypted data using the public key of the LNCMC and the private key of the user. On this basis, the user uses the symmetric key
Step 11. The user checks whether the data
Step 12. End
Security analysis
In this section, we first analyze the security of our proposed lightweight authentication protocol. Then, we analyze the security of our proposed Internet data privacy protection strategy. The analysis process of the two parts is described as follows, respectively.
Lightweight authentication protocol
We will analyze the security of the proposed protocol when the CNC machine wireless sensor networks confronts different attacks in this section. The analyzing process is described as follows.
Resistance against replay attack
Let an adversary eavesdrop the message
Resistance against DoS attack
Let an adversary eavesdrop the message
Resistance against the sink impersonation attack
In this attack, an adversary wants to compute
Resistance against sensor node impersonation attack
Even if an adversary eavesdrops
Resistance against user impersonation attack
The adversary must compute
Resistance against intractability attack
Let an adversary eavesdrops two messages from two different sessions and if they are the same, the adversary want to trace the user
Internet data privacy protection strategy
The security analysis of the protection processes of this strategy is needed in order to illustrate the effectiveness of our proposed Internet data privacy protection strategy. Therefore, we will mainly analyze the security in terms of the confidentiality, authentication, integrity, and anti-hammering performance of our proposed strategy. The analysis processes can be described as follows.
Confidentiality analysis
Our proposed Internet data privacy protection strategy begins the collected data of the sink and the CNC machine tool. The protection processes involve the transmission of data, the storage of data, the application of data, the delivery of data, and so on. These processes are carried out under the condition of encryption. These processes can effectively defense some illegal users to steal the collected data. At the same time, in order to verify the validity of the collected data of the sink and the CNC machine tool, the LNCMC authenticates these collected data using our proposed lightweight authentication protocol and the symmetric key. This authentication can effectively prevent the invasion of illegal users. In order to prevent the information from being tampered in the storage process, the XOR encryption technique is used which can effectively prevent the loss and the tampered of the stored data. In order to verify the feasibility and effectiveness of the user receiving storage data, the user receives the storage data from the LNCMC and the cloud server, respectively. After that, the user decrypts and verifies corresponding received data, respectively. These steps can effectively protect the integrity and the credibility of data which are received by the user. Therefore, the protection strategy can effectively protect the confidentiality of data in wired network.
Identity authentication analysis
Before the collected data are sent by the sink to the LNCMC, the data are used by our proposed lightweight authentication protocol. At the same time, the encryption method and the SSL technology are used for their transmission before the collected data are sent by the CNC machine tool. These steps can ensure the legitimacy of the collected data, respectively. Moreover, the cloud server will authenticate the identity of user using SSL technology in order to ensure the legitimacy of the data transmission during the user apply for data source from the cloud server. In general, in whole IoT, identity authentication is used in various activities which include data collection, data transmission, user login, and data application. Therefore, the privacy protection strategy of data can effectively protect the legitimacy of the user’s identity.
Integrity analysis
In the algorithm about the security storage of collected data and the algorithm about the security access of storage data in cloud server, the LNCMC and the cloud server are used the encrypted method and the SSL technology which can authenticate the integrity of the collected data of the sink and the CNC machine tool and the integrity of the application message of the user. At the same time, the user also used the encrypted method and the SSL technology which can authenticate the integrity of the data of the LNCMC and the cloud server.
Anti-hammering performance analysis
In our proposed Internet data privacy protection strategy, the double encryption method is used which can effectively increase the length of key and prevent the key being brute force. Thus, it will be very difficult that any illegal user wants code-cracking. Moreover, the XOR encryption technology and the SSL technology are used in our proposed Internet data privacy protection strategy. The two technologies have two obvious characteristics: (1) The two technologies can effectively detect the invasion behavior of illegal users. Thus, all kinds of malicious activities can be effectively detected and analyzed. Based on the results of detection and analysis, the system can effectively prevent various attacks. (2) The two technologies can effectively prevent middle attack because they can detect whether the data are modified, whether the key is tampering, and so on. In addition, the encryption mode is used during the cloud server storage data which can effectively prevent the attack using internal channel.
Conclusion and future works
Aiming at the difficult question of the privacy protection for numerical control information in IoT, we propose a privacy protection mechanism. In this mechanism, we, respectively, propose a lightweight authentication method for wireless sensor networks and an Internet data privacy protection strategy based on the organizational characteristics of CNC tool and the numerical control information transmission mode in IoT. In the lightweight authentication method, we built a lightweight authentication protocol. The protocol includes five parts, namely, system setup phase, sensor node registration phase, user node registration phase, login phase, and authentication and session key agreement phases. In the Internet data privacy protection strategy, it involves sink, CNC machine tool, LNCMC, cloud server, and user. In order to prove the effectiveness of the protection mechanism, this article analyzes a series of its safety performance. Analysis results show that in the cloud computing, use this mechanism to ensure the security of data privacy.
Although this mechanism can effectively protect the security of data privacy, it also increases the length of key in the Internet data privacy protection strategy because it uses double encryption method. Thus, it also brings certain impact to data transmission and storage. Therefore, it is needed to consider the optimization scheme of the two algorithms in the future works. Moreover, we need to consider the specific influence on the bandwidth, memory, and transmission channel for the data privacy protection mechanism for numerical control information in IoT.
Footnotes
Academic Editor: Kim-Kwang R Choo
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the National Natural Science Foundation of China (no. 61472112).
