Trust-Based Certificate Management for Industrial IoT Networks

被引:4
作者
Boudagdigue, Chaimaa [1 ]
Benslimane, Abderrahim [1 ]
Kobbane, Abdellatif [2 ]
Liu, Jiajia [3 ]
机构
[1] Univ Avignon, LIA, CERI, F-84911 Avignon, France
[2] Mohammed V Univ Rabat, ENSIAS, Rabat, Morocco
[3] Northwestern Polytech Univ, Natl Engn Lab Integrated Aerosp Ground Ocean Big D, Xian 710072, Shaanxi, Peoples R China
关键词
Digital certificate management; Industrial Internet of Things (IIoT); short-lived certificate (SLC); signaling game; trust management;
D O I
10.1109/JIOT.2023.3259340
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial Internet of Things (IIoT) network is composed of devices that contain sensitive data, which makes them vulnerable to various security threats. Digital Certificates can be used to reinforce the security of the IIoT network, however, their management remains a major issue. Hence, in this article, we rely on trust management to deal with the whole certificate management process in IIoT networks, from revocation to verification. For this purpose, we organize the IIoT network into a clustering architecture where each cluster head (CH) hosts an agent, called CH-UR agent, that renews/revokes the certificates of its cluster member nodes. We apply signaling game theory to build a Certificate Revocation Game modeling the interactions between a member IIoT node and the CH-UR agent. Thus, upon the belief on the member node, updated by using the Bayesian rules, the best response strategy for the CH-UR agent can be obtained. Further, we propose a new efficient certificate verification scheme based on short-lived certificates (SLCs) and suitable for IIoT network requirements. The performance evaluation of our framework proves, first, the accuracy and convergence speed of our revocation mechanism to detect untrusted devices and on-off attacks. Second, the effectiveness of our clustering architecture to reduce the resource consumption resulting from the management of SLCs to 60% even with the increase of network density. Third, the effectiveness of the proposed certificate verification scheme to reduce the time needed to obtain the revocation information as well as the resulting storage and communication overhead to achieve this purpose.
引用
收藏
页码:12867 / 12885
页数:19
相关论文
共 50 条
  • [21] Trust-based mechanism design for cooperative spectrum sensing in cognitive radio networks
    Wang, Ji
    Chen, Ing-Ray
    Tsai, Jeffrey J. P.
    Wang, Ding-Chau
    [J]. COMPUTER COMMUNICATIONS, 2018, 116 : 90 - 100
  • [22] Toward Trustworthy 6G Networks: A Trust-Based Consensus Scheme
    Yang, Haochen
    Yu, Yong
    Zhu, Yixing
    Tao, Xiaoling
    Yu, Jiguo
    [J]. IEEE NETWORK, 2025, 39 (02): : 72 - 79
  • [23] A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks
    Sen, Jaydip
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 77 - 91
  • [24] Trust Calculation and Delivery Control in Trust-Based Access Control
    LEI Jianyun1
    2. School of Computer Science
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 765 - 768
  • [25] A trust-based pollution attack prevention scheme in peer-to-peer streaming networks
    Kang, Xin
    Wu, Yongdong
    [J]. COMPUTER NETWORKS, 2014, 72 : 62 - 73
  • [26] Trust management for IoT devices based on federated learning and blockchain
    Wang, Liang
    Li, Yilin
    Zuo, Lina
    [J]. JOURNAL OF SUPERCOMPUTING, 2025, 81 (01)
  • [27] Blockchain based distributed trust management in IoT and IIoT: a survey
    Lahbib, Asma
    Toumi, Khalifa
    Laouiti, Anis
    Martin, Steven
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (15) : 21867 - 21919
  • [28] A Prospect Theoretic Approach for Trust Management in IoT Networks Under Manipulation Attacks
    Salimitari, Mehrdad
    Bhattacharjee, Shameek
    Chatterjee, Mainak
    Fallah, Yaser P.
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2020, 16 (03)
  • [29] Validating a trust-based access control system
    Adams, William J.
    Davis, Nathaniel J.
    [J]. TRUST MANAGEMENT, 2007, 238 : 91 - +
  • [30] Trust-based Scheme for Alert Spreading in VANET
    Ltifi, Amel
    Zouinkhi, Ahmed
    Bouhlel, Mohamed Salim
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015), 2015, 73 : 282 - 289