4.8 Article

A Secure and Trusted Mechanism for Industrial IoT Network Using Blockchain

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 19, Issue 2, Pages 1894-1902

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2022.3182121

Keywords

Blockchain; Industrial Internet-of-Things (IIoT); secure IoT devices; security; trust management

Ask authors/readers for more resources

The Industrial Internet-of-Things (IIoT) is a powerful application that revolutionizes the growth of industries by enabling transparent communication among various entities. Data science techniques are introduced to enhance the analysis of collected data in IIoT, addressing the limitations of current distributed architectures. The article tackles the security risks posed by network anomalies/attackers in IIoT through the election of a coordinator IoT device and the integration of a blockchain-based data model, thus increasing network security.
Industrial Internet-of-Things (IIoT) is a powerful IoT application, which remodels the growth of industries by ensuring transparent communication among various entities such as hubs, manufacturing places, and packaging units. Introducing data science techniques within the IIoT improves the ability to analyze the collected data in a more efficient manner, which current IIoT architectures lack due to their distributed nature. From a security perspective, network anomalies/attackers pose high security risk in IIoT. In this article, we have addressed this problem, where a coordinator IoT device is elected to compute the trust of IoT devices to prevent the MD to be part of network. Further, the transparency of the data is ensured by integrating a blockchain-based data model. The performance of the proposed framework is validated extensively and rigorously via MATLAB against various security metrics such as attack strength, message alteration, and probability of false authentication. The simulation results suggest that the proposed solution increases IIoT network security by efficiently detecting malicious attacks in the network.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available