4.5 Article

A Secure Communicating Things Network Framework for Industrial IoT using Blockchain Technology

期刊

AD HOC NETWORKS
卷 94, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.adhoc.2019.101933

关键词

Industrial IoT; Blockchain security; IoT devices

向作者/读者索取更多资源

Communicating Things Network (CTN) is the latest paradigm in the development of smart technologies. CTN comprises a network of physical devices capable of extracting and sharing digital information. The aim of CTN is to develop smart appliances that boost productivity and provide real-time data rapidly than any structure or a network that is dependent on human interference. Interconnected physical objects in the network communicate with each other and facilitate intelligent decision-making by monitoring and analysing their surroundings. In today's era, CTNs are playing a significant role in daily activities by providing a substantial reduction in costs with increased visibility and efficiency in all aspects of businesses and individuals. In this manuscript, we have considered an important application of CTNs (i.e., IoT) and have proposed a secure Hybrid Industrial IoT framework using the Blockchain technique. We have used a hybrid industrial architecture where different branches of a company are located in more than one country. Although IoT devices are used in many organizations and assist in reducing their production costs along with improving quality, several threats can occur in IoT devices initiated by various intruders. Intruders may compromise IoT devices with the purpose of performing malicious activities. For example, a company's employee may steal some product or may rest during working hours. To prevent these issues, the Blockchain technology is considered as the best technique that provides secrecy and protects the control system in real-time conditions. In this manuscript, we have used a Blockchain mechanism to extract information from IoT devices and store extracted records into Blockchain to maintain transparency among various users located at different places. Furthermore, the experimentation of the proposed framework has been performed against the internal communication of Blockchain where IoT devices are compromised by several intruders. Results have been analysed against the conventional approach and validated with improved simulated results that offer an 89% success rate over user request time, falsification attack, black hole attack, and probabilistic authentication scenarios because of the Blockchain technology. (C) 2019 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据