Article
Automation & Control Systems
Farva Rafique, Mohammad S. Obaidat, Khalid Mahmood, Muhammad Faizan Ayub, Javed Ferzund, Shehzad Ashraf Chaudhry
Summary: This article introduces a secure multifactor authenticated key agreement scheme for data transmission in the IoT environment. The scheme is resource-efficient and secure, using simple cryptographic operations like XOR and hashing to provide security for legitimate entities.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Review
Computer Science, Hardware & Architecture
Tariq Ahamed Ahanger, Abdullah Aljumah, Mohammed Atiquzzaman
Summary: This paper provides a comprehensive study on the data protection problem in the IoT paradigm. It focuses on IoT vulnerabilities and related artificial techniques, categorizes recent research works, and proposes a novel taxonomy. Additionally, it emphasizes the seriousness of the IoT problem and offers organizational knowledge resources to address these issues.
Article
Automation & Control Systems
Wenxin Lei, Zhibo Pang, Hong Wen, Wenjing Hou, Wen Li
Summary: As security concerns in the industrial Internet of Things (IIoT) continue to arise, industrial organizations are striving to improve the security system. This article presents a three-step zero trust security framework that enhances security in the wireless IIoT by leveraging the advantages of physical-layer security.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Automation & Control Systems
Martin Serror, Sacha Hack, Martin Henze, Marko Schuba, Klaus Wehrle
Summary: The Industrial Internet of Things, also known as Industry 4.0, is a natural trend towards interconnecting devices in industrial settings, similar to the success seen in consumer IoT. Although it brings many benefits, it also introduces serious security challenges. Unlike consumer IoT, securing the Industrial IoT focuses more on safety and productivity requirements.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Telecommunications
Mojtaba Alizadeh, Mohammad Hesam Tadayon, Alireza Jolfaei
Summary: The growing number of interconnected devices and services on the Internet of Things (IoT) necessitates secure processing and transmission of sensory data. Existing literature on authentication in IoT has not addressed the need for a scalable and efficient method. This paper proposes a secure and anonymous ticket-based authentication method that offers protection against security and privacy threats, as well as mutual authentication and sensor anonymity. Security and performance evaluations confirm its effectiveness.
DIGITAL COMMUNICATIONS AND NETWORKS
(2023)
Article
Computer Science, Information Systems
Muhammad Tanveer, Ahmed Alkhayyat, Abd Ullah Khan, Neeraj Kumar, Abdullah G. Alharbi
Summary: This article proposes a resource-efficient authentication protocol called REAP-IIoT for the Industrial Internet of Things (IIoT) environment, which utilizes lightweight cryptography (LWC) and hash function to address security and privacy concerns.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Automation & Control Systems
B. D. Deebak, Fida Hussain Memon, Kapal Dev, Sunder Ali Khowaja, Weizheng Wang, Nawab Muhammad Faseeh Qureshi
Summary: This article proposes a trust-aware blockchain-based seamless authentication with privacy-preserving (TAB-SAPP) method to address the issues of privacy, security, and packet delivery in IoT applications. By utilizing identity management and a novel data traffic pattern, this method can expand user connectivity and improve communication metrics.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Information Systems
Haotian Yin, Xin Huang, Bin Xing, Jiajia Huang, Xiaoxin Sun, Jianshuang Li, Sheng Chai, Di Zhang, Rana Abu Bakar, Wei Wang
Summary: Wireless body area networks (WBANs) commonly use Bluetooth as the communication technology, but the scalar multiplication of elliptic curve cryptography (ECC) in Bluetooth is computationally expensive for WBAN devices. To address this, we propose a lightweight and secure numeric comparison protocol (LSNCP) that requires fewer scalar multiplications than Bluetooth's NCP. We verify the security of LSNCP using logic expressions and rules in GNY logic and conduct a provable security analysis. The results show that LSNCP is secure and has lower computation cost compared to NCP and other benchmark protocols. LSNCP has potential applications in healthcare, Metaverse, and blockchain.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Rachid Zagrouba, Asayel AlAbdullatif, Kholood AlAjaji, Norah Al-Serhani, Fahd Alhaidari, Abdullah Almuhaideb, Atta-ur-Rahman
Summary: This paper proposes a new authentication protocol called Authenblue to enhance the authentication process of IoT devices and Coordinators of Personal Area Network (CPANs) in an Industrial IoT (IIoT) environment. The Authenblue protocol improves the generation of IIoT identifiers and shared secret keys used by IIoT devices, making the authentication process more efficient and secure. Simulation results in Network Simulator 3 show improved performance compared to existing models.
CMC-COMPUTERS MATERIALS & CONTINUA
(2021)
Article
Computer Science, Information Systems
Christos Xenofontos, Ioannis Zografopoulos, Charalambos Konstantinou, Alireza Jolfaei, Muhammad Khurram Khan, Kim-Kwang Raymond Choo
Summary: IoT devices are increasingly prevalent and require robust cybersecurity practices. Attack taxonomies help identify and mitigate vulnerabilities, ensuring secure IoT operation.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Malak Qaisi, Saud Althunibat, Marwa Qaraqe
Summary: Security is a crucial concern for IoT networks, and researchers worldwide have been investigating this issue. Existing security mechanisms are not suitable for IoT networks due to their complexity and resource consumption. A tag-embedding message authentication scheme has been proposed for IoT networks, but it still needs improvement in terms of immunity against nearby eavesdroppers. This article introduces a novel scheme that enhances authentication rate and tag confidentiality without any additional requirements.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Multidisciplinary Sciences
Mohit Kumar, Priya Mukherjee, Sahil Verma, Kavita, Jana Shafi, Marcin Wozniak, Muhammad Fazal Ijaz
Summary: The Industrial Internet of Things (IIoT) faces challenges in data privacy and security. This research paper proposes a privacy preservation model in IIoT using artificial intelligent techniques. The model involves two stages: data sanitization and restoration. The sanitization process hides sensitive information and generates optimal keys using a new algorithm. The simulation results demonstrate the superiority of the proposed model over other state-of-the-art models in terms of performance metrics.
SCIENTIFIC REPORTS
(2023)
Article
Computer Science, Information Systems
Xu Yang, Xuechao Yang, Xun Yi, Ibrahim Khalil, Xiaotong Zhou, Debiao He, Xinyi Huang, Surya Nepal
Summary: This article discusses the challenges of ensuring device authenticity and security in IoT systems, and proposes a blockchain-based authentication scheme that combines blockchain technology with the modular square root algorithm to achieve effective authentication.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Osama A. Khashan, Nour M. Khafajah
Summary: With the rapid increase in the number of IoT devices, the need for secure authentication mechanisms that are resource-efficient and scalable has become crucial. Conventional authentication approaches are not suitable for IoT devices due to their expensive cryptographic primitives and lack of scalability. Blockchain technology has been proposed as a solution, but existing blockchain-based authentication methods suffer from high overhead and authentication time delays. This study presents a hybrid centralized and blockchain-based authentication architecture for IoT systems, combining the efficiency of edge servers with the decentralized trust of blockchains. Lightweight cryptographic methods are implemented to achieve efficient authentication while limiting resource consumption. The proposed architecture demonstrates significant improvements in computation cost, execution time, and power consumption compared to traditional authentication schemes.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2023)
Editorial Material
Automation & Control Systems
Ximeng Liu, Robert H. Deng, Yinbin Miao, Athanasios V. Vasilakos
Summary: 5G technology enables the interconnection of humans, machines, and things, allowing devices with communication and sensing capabilities to securely and reliably connect to the Internet. It has potential applications in various military and civilian settings, including radar anomaly detection, unmanned aerial vehicles (UAV) data storage sharing, and traffic data analysis.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)