A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0

被引:48
作者
Sengupta, Jayasree [1 ]
Ruj, Sushmita [2 ,3 ]
Bit, Sipra Das [1 ]
机构
[1] Indian Inst Engn Sci & Technol, Dept Comp Sci & Technol, Howrah 711103, India
[2] CSIRO, Eveleigh, NSW 2015, Australia
[3] Indian Stat Inst, Cryptol & Secur Res Unit, Kolkata 700108, India
关键词
Fog computing; homomorphic encryption; Industrial Internet of Things (IIoT); Industry; 4.0; proxy re-encryption; secure aggregation;
D O I
10.1109/TII.2020.2998105
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of Industrial Internet of Things (IIoT) along with cloud computing has brought a huge paradigm shift in manufacturing industries resulting in yet another industrial revolution, Industry 4.0. Huge amounts of delay-sensitive data of diverse nature are being generated, which need to be locally processed and secured because of their sensitivity. However, the low-end Internet of Things devices are unable to handle huge computational overheads. In addition, the semi-trusted nature of cloud introduces several security concerns. To address these issues, this article proposes a secure fog-based IIoT architecture by suitably plugging a number of security features into it and by offloading some of the tasks judiciously to fog nodes. These features secure the system alongside reducing the trust and burden on the cloud and resource-constrained devices, respectively. We validate our proposed architecture through both theoretical overhead analysis and practical experimentation, including simulation study and testbed implementation.
引用
收藏
页码:2316 / 2324
页数:9
相关论文
共 30 条
[1]   Deploying Fog Computing in Industrial Internet of Things and Industry 4.0 [J].
Aazam, Mohammad ;
Zeadally, Sherali ;
Harras, Khaled A. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) :4674-4682
[2]   A Privacy-Preserving Data-Sharing Framework for Smart Grid [J].
Alharbi, Khalid Nawaf ;
Lin, Xiaodong ;
Shao, Jun .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02) :555-562
[3]  
[Anonymous], 2012, P 7 ACM S INFORM COM
[4]   Temporal Access Control with User Revocation for Cloud Data [J].
Balani, Nihal ;
Ruj, Sushmita .
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, :336-342
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]  
Bonomi F., 2012, P 1 EDITION MCC WORK, P13, DOI DOI 10.1145/2342509.2342513
[7]   The industrial internet of things (IIoT): An analysis framework [J].
Boyes, Hugh ;
Hallaq, Bit ;
Cunningham, Joe ;
Watson, Tim .
COMPUTERS IN INDUSTRY, 2018, 101 :1-12
[8]  
Brent Waters, 2009, AGGR SIGN
[9]   Efficient Decentralized Attribute Based Access Control for Mobile Clouds [J].
De, Sourya Joyee ;
Ruj, Sushmita .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (01) :124-137
[10]   A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment [J].
Esfahani, Alireza ;
Mantas, Georgios ;
Matischek, Rainer ;
Saghezchi, Firooz B. ;
Rodriguez, Jonathan ;
Bicaku, Ani ;
Maksuti, Silia ;
Tauber, Markus G. ;
Schmittner, Christoph ;
Bastos, Joaquim .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :288-296