TRUTH: Trust and Authentication Scheme in 5G-IIoT

被引:11
作者
Soleymani, Seyed Ahmad [1 ]
Goudarzi, Shidrokh [2 ]
Anisi, Mohammad Hossein [3 ]
Cruickshank, Haitham [1 ]
Jindal, Anish [4 ]
Kama, Nazri [5 ]
机构
[1] Univ Surrey, Inst Commun Syst, Guildford GU2 7XH, Surrey, England
[2] Univ Surrey, Ctr Vis Speech & Sig Nal Proc, Guildford GU2 7XH, Surrey, England
[3] Univ Essex, Sch Comp Sci & Elect Engn, Colchester CO4 3SQ, Essex, England
[4] Univ Durham, Dept Comp Sci, Durham DH1 3LE, England
[5] Univ Teknol Malaysia, Skudai 81310, Malaysia
关键词
Security; Industrial Internet of Things; Authentication; Peer-to-peer computing; Protocols; Data models; Cloud computing; 5G; authentication; cloud computing; industrial Internet of Things (IIoT); privacy; trust; WIRELESS SENSOR NETWORKS; INDUSTRIAL INTERNET; ATTACK-RESISTANT; MANAGEMENT; SECURITY; PROTOCOL; LIGHTWEIGHT; SYSTEMS;
D O I
10.1109/TII.2022.3174718
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the extremely important role of data in the industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this article, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-party authenticated key exchange (AKE) protocol with privacy-preserving to secure data exchanged via wireless communication, cope with unauthorized entities, and ensure data integrity. Moreover, we develop a trust model based on the Dempster-Shafer theory to check the trustworthiness of data collected by smart devices/sensor nodes. Security analysis performed on our scheme demonstrates that it can withstand different well known attacks in the IIoT environment. We also analyzed the validity of our scheme by using the automated validation of internet security protocols and applications tool. Additionally, the performance evaluation and experimental results prove the effectiveness of the proposed scheme compared to the existing works in terms of accuracy, delay, trust, and throughput.
引用
收藏
页码:880 / 889
页数:10
相关论文
共 50 条
  • [31] Rendering Secure and Trustworthy Edge Intelligence in 5G-Enabled IIoT Using Proof of Learning Consensus Protocol
    Qiu, Chao
    Aujla, Gagangeet Singh
    Jiang, Jing
    Wen, Wu
    Zhang, Peiying
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 900 - 909
  • [32] Efficient Blockchain-Based Pseudonym Authentication Scheme Supporting Revocation for 5G-Assisted Vehicular Fog Computing
    Mohammed, Badiea Abdulkarem
    Al-Shareeda, Mahmood A.
    Alsadhan, Abeer Abdullah
    Al-Mekhlafi, Zeyad Ghaleb
    Sallam, Amer A.
    Al-Qatab, Bassam Ali
    Alshammari, Mohammad T.
    Alayba, Abdulaziz M.
    IEEE ACCESS, 2024, 12 : 33089 - 33099
  • [33] A blockchain assisted multi-gateway authentication scheme for IIoT based on group
    Liu, Xin
    Wang, Miao
    Wang, Tanyang
    Zhang, Ruisheng
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (01) : 245 - 259
  • [34] D-BlockAuth: An Authentication Scheme-Based Dual Blockchain for 5G-Assisted Vehicular Fog Computing
    Al-Janabi, Hussam Dheaa Kamel
    Lashari, Saima Anwar
    Al-Shareeda, Mahmood A.
    Khalil, Ayman
    Alsadhan, Abeer Abdullah
    Almaiah, Mohammed Amin
    Alkhdour, Tayseer
    IEEE ACCESS, 2024, 12 : 99321 - 99332
  • [35] Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System
    Fan, Chun-, I
    Shih, Yu-Tse
    Huang, Jheng-Jia
    Chiu, Wan-Ru
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (01): : 701 - 712
  • [36] FedOnion: FL and Onion Routing-driven Secure Data Exchange Framework for 5G-IIoT Applications
    Jadav, Nilesh Kumar
    Gupta, Rajesh
    Bhattacharya, Pronaya
    Tanwar, Sudeep
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 7315 - 7320
  • [37] A Blockchain-Based Authentication and Key Agreement (AKA) Protocol for 5G Networks
    Hojjati, Maede
    Shafieinejad, Alireza
    Yanikomeroglu, Halim
    IEEE ACCESS, 2020, 8 (08): : 216461 - 216476
  • [38] Intelligent Drone-assisted Anonymous Authentication and Key Agreement for 5G/B5G Vehicular Ad-Hoc Networks
    Zhang, Jing
    Cui, Jie
    Zhong, Hong
    Bolodurina, Irina
    Liu, Lu
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (04): : 2982 - 2994
  • [39] An Anonymous Key Distribution Scheme for Group Healthcare Services in 5G-Enabled Multi-Server Environments
    Tuan-Vinh Le
    Hsu, Chien-Lung
    IEEE ACCESS, 2021, 9 (09): : 53408 - 53422
  • [40] Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks
    Kumar, Amit
    Om, Hari
    DIGITAL COMMUNICATIONS AND NETWORKS, 2020, 6 (03) : 341 - 353