GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment

被引:11
作者
Ali, Yasir [1 ,3 ]
Khan, Habib Ullah [2 ]
机构
[1] Univ Swabi, Dept Comp Sci, Kp, Pakistan
[2] Qatar Univ, Coll Business & Econ, Accounting & Informat, Doha, Qatar
[3] Govt Degree Coll Yar Hussain Swabi, Kp, Pakistan
关键词
Authentication; IIoT assessment framework; Authentication features; Graph Theory Matrix Approach; THEORY MATRIX APPROACH; AHP; PROTOCOL; NETWORK; TOPSIS;
D O I
10.1016/j.cie.2022.108119
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Industry Internet of Things (IIoT) has become the most evolving area over the last few years. The number of IoT devices connected in industry has sharply elevated but this surge has led to the vulnerability and data breach such as if a malicious entry is made to the secure network, it will forfeit all the network resources. For this purpose a full pledged secure authentication method is essential to safeguard IIoT network. There is a bulky list of number of authentications protocols available to keep network safe with a variety of features so but it becomes herculean task for network administrator to pick the strong and secure authentication method due to huge number of criteria, conflicting objectives and availability of authentication protocols in industry environment. It has become imperative to get the most rational authentication method in devices operating in IIoT. To address this issue, a feature-oriented assessment framework is put forward to provide a ground for ranking and selection of best authentication mechanism. This framework uses a mathematic approach known as Graph Theory Matrix Approach (GTMA) and selects the best authentication method based on the number of features. These features are related to authentication and covers almost every aspect of authentication method and are used as benchmark for selection purposes. This framework takes into account the most important features and helps in selecting the best and most ideal features-oriented authentication method that can be employed in IIoT to keep the integrity and security of connected devices and overall network infrastructure.
引用
收藏
页数:12
相关论文
共 59 条
[11]   A criteria-based evaluation framework for authentication schemes in IMS [J].
Eliasson, Charlott ;
Fiedler, Markus ;
Jorstad, Ivar .
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, :865-+
[12]  
FInjan, 2017, WHAT IS NONR PRINC T
[13]  
Forget A, 2015, INF COMPUT SECUR
[14]  
Gatto J., WHAT ARE RISKS ASS I
[15]  
Geetha N., 2016, Graph theory matrix approach in selecting optimal combination of operating parameter
[16]   Graph Theory Matrix Approach with Fuzzy Set Theory for Optimization of Operating Parameters on a Diesel Engine [J].
Geetha, N. K. ;
Sekar, P. .
MATERIALS TODAY-PROCEEDINGS, 2017, 4 (08) :7750-7759
[17]   Graph Theory Matrix Approach - A Qualitative Decision Making Tool [J].
Geetha, N. K. ;
Sekar, P. .
MATERIALS TODAY-PROCEEDINGS, 2017, 4 (08) :7741-7749
[18]   What do we mean by entity authentication? [J].
Gollmann, D .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :46-54
[19]   Developing and evaluating a proposed health security framework in IoT using fuzzy analytic network process method [J].
Haghparast, Mohammad Bagher ;
Berehlia, Sasan ;
Akbari, Mona ;
Sayadi, Ali .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) :3121-3138
[20]   An approach to develop the smart health using Internet of Things and authentication based on biometric technology [J].
Hamidi, Hodjat .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 :434-449