Secure and efficient communication approaches for Industry 5.0 in edge computing

被引:18
作者
Miao, Junfeng [1 ]
Wang, Zhaoshun [1 ]
Wang, Mei [2 ,3 ]
Garg, Sahil [4 ]
Hossain, M. Shamim [5 ]
Rodrigues, Joel J. P. C. [6 ]
机构
[1] Univ Sci & Technol Beijing, Beijing 100089, Peoples R China
[2] Shandong Univ, Jinan 250100, Shandong, Peoples R China
[3] Quancheng Lab, Jinan 250103, Peoples R China
[4] Ecole Technol Super, Elect Engn Dept, Montreal, PQ, Canada
[5] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh 12372, Saudi Arabia
[6] Lusofona Univ, COPELABS, Lisbon, Portugal
关键词
Industry; 5.0; Secure; Edge computing; Efficiency; AUTHENTICATION SCHEME; INTERNET; THINGS; PROTOCOL;
D O I
10.1016/j.comnet.2024.110244
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the new generation of information technology and the deep integration with industry, Industry 5.0 systematically puts forward the consumer -centric industrial production core, and emphasizes the sustainable and resilient technologies. Industry 5.0 considers the development of industry not only from the technical aspect, but also from the economic, social and environmental aspects, and studies how to use technological innovation to support the production of consumer electronics. In order to achieve interconnection, collaboration and sustainable communication, the integration of Industry 5.0 and edge computing not only reduces the computing bottleneck and communication bottleneck, but also reduces the delay, which helps to transform the industrial process model from centralized to distributed. However, a large number of privacy sensitive data in Industry 5.0 need to interact through the network, which also makes it possible for malicious network attackers to take advantage of it. Therefore, this paper proposes a secure and effective communication approach based on edge computing in Industry 5.0. This approach introduces threefactor authentication and elliptic curve cryptography to ensure the anonymity, confidentiality and integrity of the message. Based on the security proof, the proposed approach meets the security requirements. Through performance analysis, compared with other related schemes, this approach provides better security, and has obvious advantages in computation and communication efficiency.
引用
收藏
页数:10
相关论文
共 40 条
[1]   Future of industry 5.0 in society: human-centric solutions, challenges and prospective research areas [J].
Adel, Amr .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01)
[2]   State of Industry 5.0-Analysis and Identification of Current Research Trends [J].
Akundi, Aditya ;
Euresti, Daniel ;
Luna, Sergio ;
Ankobiah, Wilma ;
Lopes, Amit ;
Edinbarough, Immanuel .
APPLIED SYSTEM INNOVATION, 2022, 5 (01)
[3]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[4]  
Chander B., 2022, Artificial intelligencebased internet of things systems, P3, DOI [DOI 10.1007/978-3-030-87059-11, 10.1007/978-3-030-87059-1_1, DOI 10.1007/978-3-030-87059-1_1]
[5]   A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks [J].
Chang, Chin-Chen ;
Le, Hai-Duong .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :357-366
[6]   Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment [J].
Das, Ashok Kumar ;
Wazid, Mohammad ;
Kumar, Neeraj ;
Vasilakos, Athanasios V. ;
Rodrigues, Joel J. P. C. .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06) :4900-4913
[7]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[8]   CRACAU: Byzantine Machine Learning Meets Industrial Edge Computing in Industry 5.0 [J].
Du, Anran ;
Shen, Yicheng ;
Zhang, Qinzi ;
Tseng, Lewis ;
Aloqaily, Moayad .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (08) :5435-5445
[9]  
George A.S., 2023, Partners Universal Int. Innov. J., V1, P22, DOI DOI 10.5281/ZENODO.7852124
[10]   Industry 5.0: improving humanization and sustainability of Industry 4.0 [J].
Grabowska, Sandra ;
Saniuk, Sebastian ;
Gajdzik, Bozena .
SCIENTOMETRICS, 2022, 127 (06) :3117-3144