TRUTH: Trust and Authentication Scheme in 5G-IIoT

被引:11
|
作者
Soleymani, Seyed Ahmad [1 ]
Goudarzi, Shidrokh [2 ]
Anisi, Mohammad Hossein [3 ]
Cruickshank, Haitham [1 ]
Jindal, Anish [4 ]
Kama, Nazri [5 ]
机构
[1] Univ Surrey, Inst Commun Syst, Guildford GU2 7XH, Surrey, England
[2] Univ Surrey, Ctr Vis Speech & Sig Nal Proc, Guildford GU2 7XH, Surrey, England
[3] Univ Essex, Sch Comp Sci & Elect Engn, Colchester CO4 3SQ, Essex, England
[4] Univ Durham, Dept Comp Sci, Durham DH1 3LE, England
[5] Univ Teknol Malaysia, Skudai 81310, Malaysia
关键词
Security; Industrial Internet of Things; Authentication; Peer-to-peer computing; Protocols; Data models; Cloud computing; 5G; authentication; cloud computing; industrial Internet of Things (IIoT); privacy; trust; WIRELESS SENSOR NETWORKS; INDUSTRIAL INTERNET; ATTACK-RESISTANT; MANAGEMENT; SECURITY; PROTOCOL; LIGHTWEIGHT; SYSTEMS;
D O I
10.1109/TII.2022.3174718
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the extremely important role of data in the industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this article, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-party authenticated key exchange (AKE) protocol with privacy-preserving to secure data exchanged via wireless communication, cope with unauthorized entities, and ensure data integrity. Moreover, we develop a trust model based on the Dempster-Shafer theory to check the trustworthiness of data collected by smart devices/sensor nodes. Security analysis performed on our scheme demonstrates that it can withstand different well known attacks in the IIoT environment. We also analyzed the validity of our scheme by using the automated validation of internet security protocols and applications tool. Additionally, the performance evaluation and experimental results prove the effectiveness of the proposed scheme compared to the existing works in terms of accuracy, delay, trust, and throughput.
引用
收藏
页码:880 / 889
页数:10
相关论文
共 50 条
  • [21] Lightweight batch authentication and key agreement scheme for IIoT gateways
    Ding, Xiaohui
    Wang, Jian
    Zhao, Yongxuan
    Zhang, Zhiqiang
    JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 160
  • [22] Bridge of Trust: Cross Domain Authentication for Industrial Internet of Things (IIoT) Blockchain over Transport Layer Security (TLS)
    Stodt, Fatemeh
    Reich, Christoph
    ELECTRONICS, 2023, 12 (11)
  • [23] Practical and Secure Password Authentication and Key-Agreement-Scheme-Based Dual Server for IoT Devices in 5G Network
    Zhang, Songsong
    Liu, Yining
    Gao, Tiegang
    Xie, Yong
    Zhou, Chuan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (21): : 34639 - 34651
  • [24] On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond
    Bello, Yahuza
    Hussein, Ahmed Refaey
    Ulema, Mehmet
    Koilpillai, Juanita
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1876 - 1889
  • [25] A Secure Batch Authentication Scheme for Multiaccess Edge Computing in 5G-Enabled Intelligent Transportation System
    Kim, Myeonghyun
    Lee, Joonyoung
    Oh, Jihyeon
    Kwon, Deokkyu
    Park, Kisung
    Park, Youngho
    Park, Kil Houm
    IEEE ACCESS, 2022, 10 : 96224 - 96238
  • [26] Secure and Efficient Privacy-Preserving Authentication Scheme for 5G Software Defined Vehicular Networks
    Huang, Jiaqi
    Qian, Yi
    Hu, Rose Qingyang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) : 8542 - 8554
  • [27] XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets
    Wang, Mingjun
    Zhao, Dongsheng
    Yan, Zheng
    Wang, Haiguang
    Li, Tieyan
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (07) : 5962 - 5976
  • [28] Trust in 5G and Beyond Networks
    Benzaid, Chafika
    Taleb, Tarik
    Farooqi, Muhammad Zubair
    IEEE NETWORK, 2021, 35 (03): : 212 - 222
  • [29] Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks
    Shen, Gang
    Xia, Chengliangyi
    Li, Yumei
    Shen, Hua
    Meng, Weizhi
    Zhang, Mingwu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 6664 - 6676
  • [30] Adaptive Interference-Avoidance and Mode Selection Scheme for D2D-Enabled Small Cells in 5G-IIoT Networks
    Gbadamosi, Safiu A.
    Hancke, Gerhard P.
    Abumahfouz, Adnan M.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (02) : 2408 - 2419