TRUTH: Trust and Authentication Scheme in 5G-IIoT

被引:11
作者
Soleymani, Seyed Ahmad [1 ]
Goudarzi, Shidrokh [2 ]
Anisi, Mohammad Hossein [3 ]
Cruickshank, Haitham [1 ]
Jindal, Anish [4 ]
Kama, Nazri [5 ]
机构
[1] Univ Surrey, Inst Commun Syst, Guildford GU2 7XH, Surrey, England
[2] Univ Surrey, Ctr Vis Speech & Sig Nal Proc, Guildford GU2 7XH, Surrey, England
[3] Univ Essex, Sch Comp Sci & Elect Engn, Colchester CO4 3SQ, Essex, England
[4] Univ Durham, Dept Comp Sci, Durham DH1 3LE, England
[5] Univ Teknol Malaysia, Skudai 81310, Malaysia
关键词
Security; Industrial Internet of Things; Authentication; Peer-to-peer computing; Protocols; Data models; Cloud computing; 5G; authentication; cloud computing; industrial Internet of Things (IIoT); privacy; trust; WIRELESS SENSOR NETWORKS; INDUSTRIAL INTERNET; ATTACK-RESISTANT; MANAGEMENT; SECURITY; PROTOCOL; LIGHTWEIGHT; SYSTEMS;
D O I
10.1109/TII.2022.3174718
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the extremely important role of data in the industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this article, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-party authenticated key exchange (AKE) protocol with privacy-preserving to secure data exchanged via wireless communication, cope with unauthorized entities, and ensure data integrity. Moreover, we develop a trust model based on the Dempster-Shafer theory to check the trustworthiness of data collected by smart devices/sensor nodes. Security analysis performed on our scheme demonstrates that it can withstand different well known attacks in the IIoT environment. We also analyzed the validity of our scheme by using the automated validation of internet security protocols and applications tool. Additionally, the performance evaluation and experimental results prove the effectiveness of the proposed scheme compared to the existing works in terms of accuracy, delay, trust, and throughput.
引用
收藏
页码:880 / 889
页数:10
相关论文
共 50 条
  • [41] To Trust or Not to Trust: Data Origin Authentication for Group Communication in 5G Networks
    Annessi, Robert
    Fabini, Joachim
    Zseby, Tanja
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [42] MRSA: Mask Random Array Protocol for Efficient Secure Handover Authentication in 5G HetNets
    Liu, Yibing
    Huo, Lijun
    Wu, Jun
    Guizani, Mohsen
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3809 - 3827
  • [43] A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks
    Abdel-Malek, Mai A.
    Akkaya, Kemal
    Bhuyan, Arupjyoti
    Ibrahim, Ahmed S.
    IEEE ACCESS, 2022, 10 : 57485 - 57498
  • [44] SEMS-5G: A Secure and Efficient Multi-Server Authentication Scheme for 5G Networks
    Irshad, Azeem
    Alreshoodi, Mohammed
    IEEE ACCESS, 2024, 12 : 49062 - 49077
  • [45] A Secure User Anonymity-Preserving Biometrics and PUF-Based Multiserver Authentication Scheme With Key Agreement in 5G Networks
    Xu, Deqin
    Bian, Weixin
    Li, Qingde
    Xie, Dong
    Zhao, Jun
    Hu, Yao
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5170 - 5184
  • [46] LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks
    Cao, Jin
    Yan, Zheng
    Ma, Ruhui
    Zhang, Yinghui
    Fu, Yulong
    Li, Hui
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 5329 - 5344
  • [47] Authentication and Access Control in 5G Device-to-Device Communication
    Panicker, Jithu Geevargheese
    Salehi, Ahmad S.
    Rudolph, Carsten
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1575 - 1582
  • [48] A node trust factor linked privacy preservation model in 5G networks with a multi-stage authentication model
    Dontineni, Mohan Ranga Rao
    OPTIK, 2022, 271
  • [49] Battery Status-aware Authentication Scheme for V2G Networks in Smart Grid
    Liu, Hong
    Ning, Huansheng
    Zhang, Yan
    Guizani, Mohsen
    IEEE TRANSACTIONS ON SMART GRID, 2013, 4 (01) : 99 - 110
  • [50] An Intelligent Trust Cloud Management Method for Secure Clustering in 5G Enabled Internet of Medical Things
    Yang, Liu
    Yu, Keping
    Yang, Simon X.
    Chakraborty, Chinmay
    Lu, Yinzhi
    Guo, Tan
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (12) : 8864 - 8875