4.8 Article

TRUTH: Trust and Authentication Scheme in 5G-IIoT

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 19, Issue 1, Pages 880-889

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2022.3174718

Keywords

Security; Industrial Internet of Things; Authentication; Peer-to-peer computing; Protocols; Data models; Cloud computing; 5G; authentication; cloud computing; industrial Internet of Things (IIoT); privacy; trust

Ask authors/readers for more resources

This article presents a cloud-integrated 5G-IIoT network architecture that ensures data security and privacy protection through a three-party authenticated key exchange protocol. It also establishes a trust model based on the Dempster-Shafer theory to verify the trustworthiness of collected data. Security analysis and performance evaluation demonstrate the effectiveness of the proposed scheme.
Due to the extremely important role of data in the industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this article, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-party authenticated key exchange (AKE) protocol with privacy-preserving to secure data exchanged via wireless communication, cope with unauthorized entities, and ensure data integrity. Moreover, we develop a trust model based on the Dempster-Shafer theory to check the trustworthiness of data collected by smart devices/sensor nodes. Security analysis performed on our scheme demonstrates that it can withstand different well known attacks in the IIoT environment. We also analyzed the validity of our scheme by using the automated validation of internet security protocols and applications tool. Additionally, the performance evaluation and experimental results prove the effectiveness of the proposed scheme compared to the existing works in terms of accuracy, delay, trust, and throughput.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available