TRUTH: Trust and Authentication Scheme in 5G-IIoT

被引:11
|
作者
Soleymani, Seyed Ahmad [1 ]
Goudarzi, Shidrokh [2 ]
Anisi, Mohammad Hossein [3 ]
Cruickshank, Haitham [1 ]
Jindal, Anish [4 ]
Kama, Nazri [5 ]
机构
[1] Univ Surrey, Inst Commun Syst, Guildford GU2 7XH, Surrey, England
[2] Univ Surrey, Ctr Vis Speech & Sig Nal Proc, Guildford GU2 7XH, Surrey, England
[3] Univ Essex, Sch Comp Sci & Elect Engn, Colchester CO4 3SQ, Essex, England
[4] Univ Durham, Dept Comp Sci, Durham DH1 3LE, England
[5] Univ Teknol Malaysia, Skudai 81310, Malaysia
关键词
Security; Industrial Internet of Things; Authentication; Peer-to-peer computing; Protocols; Data models; Cloud computing; 5G; authentication; cloud computing; industrial Internet of Things (IIoT); privacy; trust; WIRELESS SENSOR NETWORKS; INDUSTRIAL INTERNET; ATTACK-RESISTANT; MANAGEMENT; SECURITY; PROTOCOL; LIGHTWEIGHT; SYSTEMS;
D O I
10.1109/TII.2022.3174718
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the extremely important role of data in the industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this article, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-party authenticated key exchange (AKE) protocol with privacy-preserving to secure data exchanged via wireless communication, cope with unauthorized entities, and ensure data integrity. Moreover, we develop a trust model based on the Dempster-Shafer theory to check the trustworthiness of data collected by smart devices/sensor nodes. Security analysis performed on our scheme demonstrates that it can withstand different well known attacks in the IIoT environment. We also analyzed the validity of our scheme by using the automated validation of internet security protocols and applications tool. Additionally, the performance evaluation and experimental results prove the effectiveness of the proposed scheme compared to the existing works in terms of accuracy, delay, trust, and throughput.
引用
收藏
页码:880 / 889
页数:10
相关论文
共 50 条
  • [1] Security and Privacy in 5G-IIoT Smart Factories: Novel Approaches, Trends, and Challenges
    Lin, Chun-Cheng
    Tsai, Ching-Tsorng
    Liu, Yu-Liang
    Chang, Tsai-Ting
    Chang, Yung-Sheng
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (03): : 1043 - 1058
  • [2] Security and Privacy in 5G-IIoT Smart Factories: Novel Approaches, Trends, and Challenges
    Chun-Cheng Lin
    Ching-Tsorng Tsai
    Yu-Liang Liu
    Tsai-Ting Chang
    Yung-Sheng Chang
    Mobile Networks and Applications, 2023, 28 : 1043 - 1058
  • [3] A Lightweight Certificateless Mutual Authentication Scheme Based on Signatures for IIoT
    Yin, Deshuai
    Gong, Bei
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (16): : 26852 - 26865
  • [4] Cross-Layer Device Authentication With Quantum Encryption for 5G Enabled IIoT in Industry 4.0
    Xu, Dongyang
    Yu, Keping
    Ritcey, James A.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 6368 - 6378
  • [5] Efficient Revocable Cross-Domain Anonymous Authentication Scheme for IIoT
    Zeng, Mingwei
    Cui, Jie
    Zhang, Qingyang
    Zhong, Hong
    He, Debiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 996 - 1010
  • [6] Efficient Batch Authentication Scheme Based on Edge Computing in IIoT
    Cui, Jie
    Wang, Fengqun
    Zhang, Qingyang
    Gu, Chengjie
    Zhong, Hong
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (01): : 357 - 368
  • [7] A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments
    Son, Seunghwan
    Kwon, Deokkyu
    Lee, Sangwoo
    Kwon, Hyeokchan
    Park, Youngho
    IEEE ACCESS, 2024, 12 : 154066 - 154079
  • [8] LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
    Abdi Nasib Far, Hossein
    Bayat, Majid
    Kumar Das, Ashok
    Fotouhi, Mahdi
    Pournaghi, S. Morteza
    Doostari, M. A.
    WIRELESS NETWORKS, 2021, 27 (02) : 1389 - 1412
  • [9] Secure Authentication and Trust Management Scheme for Edge AI-Enabled Cyber-Physical Systems
    Xiang, Xinyin
    Cao, Jin
    Fan, Weiguo
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2025, 26 (03) : 3237 - 3249
  • [10] A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    Sahoo, Kshira Sagar
    Daneshmand, Mahmoud
    Gandomi, Amir H.
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (17) : 15087 - 15099