Internet-Draft Data Transmission Security of IR April 2021
Wang, et al. Expires 18 October 2021 [Page]
Internet Engineering Task Force
Intended Status:
Standards Track
B. Wang, Ed.
K. Lin, Ed.
C. Wang, Ed.
X. Wang, Ed.

Data Transmission Security of Identity Resolution in Industrial Internet


This draft provides an overview of the security of data transmission in the identity resolution system for the Industrial Internet. Identity resolution systems play a vital role in the Industrial Internet by providing secure sharing and intelligent association of heterogeneous information among different organizations. This draft focuses on the security services that identity resolution systems should provide for resolution data transmission.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 18 October 2021.

Table of Contents

1. Introduction

Identity resolution system is an important network infrastructure for the Industrial Internet. It provides codes, registration and resolution services for industrial equipment, machines, materials, parts and products to achieve interoperability, secure sharing and intelligent association of heterogeneous information, which is an important cornerstone for the rapid development of the Industrial Internet. Typical global identity resolution systems include the Handle system [RFC3650] [RFC3651], the Object Identifier (OID) resolution system [OID], etc. In order to ensure the security of data transmission involved in the Industrial Internet identity resolution system, the security technical requirements are formulated to enhance the security of the entire Industrial Internet identity resolution system and reduce the security risk caused by data leakage. The security technical requirements can be applied to the planning, construction, operation and management of data transmission security of Industrial Internet identity resolution.

2. Scope

This draft specifies the security technical requirements for the transmission of Industrial Internet identity resolution data.

This draft applies to the planning, construction, operation and management of the Industrial Internet identity resolution data transmission security of the relevant parties.

3. Terms and Definitions

3.1. International Root Node

International root nodes are the top-level service node of the identity resolution system. They are not limited to specific countries or regions to provide public root-level identity services for the global scope on the one hand, and to provide services such as data synchronization and registration resolution for different levels of nodes in local country on the other hand.

3.2. National Root Node

The top-level node within a country or region, which is connected to the international root node and secondary nodes, provides top-level identity resolution services for the whole country.

3.3. Secondary Node

The public node providing identity services for specific industries or multiple industries is responsible for allocating identity and providing identity registration, identity resolution and identity data services for industrial enterprises. And they are divided into two types of industry secondary nodes and comprehensive secondary nodes.

3.4. Enterprise Node

An intra-enterprise identity service node is able to provide identity registration, identity resolution service, identity data service, etc. for a specific enterprise and connect with secondary nodes.

3.5. Recursive Node

The key entrance facility of the identity resolution system is responsible for caching and other operations on the resolution data in the process of identity resolution, reducing the amount of resolution data processing and improving the efficiency of resolution services.

3.6. Transmission Security

Protect the confidentiality, integrity, availability and timeliness characteristics of information transmitted in the network.

3.7. Privacy

Privacy refers to the authority that individuals have to control their information, including who collects and stores it and who discloses it.

4. Abbreviation

Table 1: Abbreviation
Abbreviation Full Name
TLS Transport Layer Security
IPSec Internet Protocol Security
HTTPS Hypertext Transfer Protocol Secure
OID Object Identifier
DNS Domain Name System

5. Overview

The Industrial Internet identity resolution and management service system is mainly a system that supports the global traceability management of industrial IoT product data and dynamic sharing of data information in all aspects of the product life cycle by using the capabilities of the security identity management and resolution platform. Industrial Internet identity resolution data transmission refers to the data technology collection used in the industrial Internet terminal to obtain information and transmit information, and its transmission security involves the network security part of the basic security protection measures dimension, all inter-domain and intra-domain data transmission of the functional domain dimension of the Industrial Internet of Things identity resolution and management service system, and the whole process of the system life cycle dimension.

              +-------------+ DNS Root Node +----------------+
              |             +---------------+                |
        +-----+-------+                             +--------+------+
        |OID Root Node|  International Root Node    |Ecode Root Node|
        +-----+-------+                             +--------+------+
              |                                              |
              |         +---------------------+              |
              +---------+                     +--------------+
                        |  Handle Root Node   |
            +----------->                     <----------------+
            |           +---------------------+                |
            |                                                  |
            |                                       +----------v---+
            |                                       |Secondary Node|
      +-----+--------+          +---------+         +------+-------+
      |Recursive Node+----+----->National |                |
      +-----^--------+    |     |Top Level|        +-------+--------+
            |             |     |Node     |        |                |
            |             |     +---------+   +----+------+ +-------+--+
            |             |                   | Enterprise| |Enterprise|
            |             |                   | Node      | |Node      |
            |             |                   +-----------+ +----------+
            |             |
+-----------+---------+   |    +--------------+
|Identity Resolution  |   +---->Secondary Node|
|Data and Application |   |    +------+-------+
| +------------+      |   |           |
| |Industry App|      |   |   +-------+--------+
| +------------+      |   |   |                |
| +-----------+       |  +v---+------+ +-------+--+
| |Enterprise |       |  | Enterprise| |Enterprise|
| |Information|       |  | Node      | |Node      |
| |System     |       |  +-----------+ +----------+
| +-----------+       |
| +-----------+       |
| |Industrial |       |
| |Internet   |       |
| |Platform   |       |
Figure 1: Industrial Internet Identity Resolution and Management Service System

6. Security Protection Scope

The security protection scope of the Industrial Internet identity resolution and management service system proposed in this draft mainly means that the identity is written into the device and is responsible for collecting product information including device model, device type, generation batch, generation date, generation site, device production information link, device description data link, etc., integrate this information into identity data, and then publish it to the data exchange system for access by identity resolution enterprise nodes. Among the identity resolution enterprise node, the identity resolution secondary node, and the identity resolution root node, the process of data synchronization between the application scenarios, the collection of data transmission technologies used, is used to provide security assurance and security support for the Industrial Internet identity data transmission.

The scope of Industrial Internet identity data transmission security protection specifically includes the security and the security support of the data transmission interface within and between the functional domains of the Industrial Internet identity resolution system. Its role is in the whole life cycle of the system (planning and design, development and construction, operation and maintenance , abandonment and exit).

            |          Identity Resolution Root Node                 |
            |        Identity Resolution Secondary Node              |
 |                                    |                                |
 |          +-------------------------v------------------------------+ |
 |          |        Identity Resolution Enterprise Node             | |
 |          +-------------------------^------------------------------+ |
 |Demilitarized                       |                                |
 |   Zone   +-------------------------v------------------------------+ |
 |          |                Data Exchange System                    | |
 |          +-------------------------^------------------------------+ |
 |                                    |                                |
 |          +-------------------------|------------------------------+ |
 |          |      Identity Generation and Management System         | |
 |          +------^------------------------------------------^------+ |
 |Enterprise       |                                          |        |
 | Intranet +------v-------+  Enterprise Products ------------v------+ |
 |          |              |  | +-----------------+ +--------------+ | |
 |          |              |  | |Network Hard Disk| |Access Control| | |
 |          |  Enterprise  |  | |Video Recorder   | |    Device    | | |
 |          | Information  |  | +-----------------+ +--------------+ | |
 |          |    System    |  |    +------------+        +---+       | |
 |          |              |  |    |Video Camera|        |...|       | |
 |          |              |  |    +------------+        +---+       | |
 |          +--------------+  +--------------------------------------+ |
Figure 2: Industrial Internet Identity Resolution and Management Service System

7. Safety Technical Requirements

7.1. Data Transmission Integrity

Data transmission should comply with the following common requirements:

1) Support the information integrity check mechanism during transmission to realize the transmission integrity protection of management data, authentication information, sensitive information, important business data and other data (such as: check code, message abstract, digital signature, etc.).

2) It has the functions of communication delay and interrupt processing to ensure the integrity of the data.

3) For important data, use the relevant cryptographic algorithm technology of National Cryptography Administration to ensure the integrity of data transmission

4) Take measures to restore or regain data when it detects that the integrity has been compromised.

7.2. Data Transmission Availability

The timeliness and accuracy of the data shall be guaranteed during data transmission. Specifically:

1) Timeliness: the feature of identifying historical data received or data beyond the time limit. Specifically, the data comes from the system using a unified time allocation/correction mechanism, and the data should include time stamps, etc.

2) Accuracy: When there is an acceptable error in the data, there is an overload to ensure the normal acquisition of the data in time.

7.3. Data Transmission Confidentiality

When transferring data, it is necessary to ensure the confidentiality of the data, including:

1) For important data, authenticate information and important business data such as user passwords, biometrics, private keys, symmetric keys, product order information, device unique identity (Handle ID), etc., a certain strength encryption algorithm or other effective measures should be used to ensure Confidentiality.

2) Choose appropriate security protocols (such as HTTPS, SSH, IPSec, TLS, etc.) to protect the transmitted data.

7.4. Data Transmission Authentication

Ensure the legitimacy of the identities of both parties in the data transmission, which means, ensure the identity authentication of the subject to the object before the interaction, and establish a trusted transmission path.

7.5. Data Transmission Strategy

Establish a formal transmission strategy to protect the security of all types of information transmitted through communication facilities, and meet:

1) Clarify the type and scope of information that can be transmitted in plain text.

2) For sensitive data, such as user passwords, biometrics, private keys, symmetric keys, etc., an encrypted transmission strategy is required.

7.6. Data Transmission Protocol

The protocol should address the safe transmission of internal and external business, and meet:

Cryptographic algorithms such as data abstract, signature, and authentication shall use the cryptographic algorithms and combinations of abstract, signature, and authentication required by national regulations or national mandatory standards.

7.7. Maintenance and Update of Transmission Protocol

The confidentiality protocol for data transmission should be regularly maintained and updated so that the procotol should reflect the requirements for data transmission security protection and meet:

1) The transmission security protocol needs to be reviewed every year to ensure that the agreement should reflect the requirements for data transmission security protection

2) When new services are launched or existing services are changed, the transmission security protocol needs to be audited and updated if necessary

7.8. Log and Audit

The transmission system shall log and audit the following security failure events. The content of the log shall at least contains date/time, event type, event subject, event description, success/failure information, and meet the following requirements:

1) Data transmission establishment success and failure

2) Transmission device online monitoring abnormalities and alarm events

3) Malicious program intrusion alert event

4) Configuration modification operations caused by administrators/non-administrators

8. Security Considerations

This entire memo deals with security issues.

9. IANA Considerations

This documents has no IANA actions.

10. Informative References

"Introduction to OIDs and the OID Resolution System (ORS)", , <>.
Sun, S., Lannom, L., and B. Boesch, "Handle System Overview", DOI 10.17487/RFC3650, , <>.
Sun, S., Reilly, S., and L. Lannom, "Handle System Namespace and Service Definition", DOI 10.17487/RFC3651, , <>.

Authors' Addresses

Bin Wang (editor)
555 Qianmo Road, Binjiang District
Kezhang Lin (editor)
555 Qianmo Road, Binjiang District
Chonghua Wang (editor)
Xing Wang (editor)
555 Qianmo Road, Binjiang District