4.8 Article

Enabling Secure Authentication in Industrial IoT With Transfer Learning Empowered Blockchain

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 17, Issue 11, Pages 7725-7733

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2021.3049405

Keywords

Authentication; Blockchain; Industrial Internet of Things; Data privacy; Servers; Computational modeling; Privacy; Authentication; blockchain; Industrial Internet of Things (IIoT); transfer learning (TL)

Funding

  1. King Saud University, Riyadh, Saudi Arabia [RSP-2020/32]

Ask authors/readers for more resources

The article proposes a novel authentication mechanism ATLB based on transfer learning and blockchain, which trains user authentication models in specific regions and transfers them for quick authentication in other areas to address data security and privacy challenges in Industrial Internet of Things.
Industrial Internet of Things (IIoT) is ushering in huge development opportunities in the era of Industry 4.0. However, there are significant data security and privacy challenges during automatic and real-time data collection, monitoring for industrial applications in IIoT. Data security and privacy in IIoT applications are closely related to the reliability of users, which is determined by user authentication that have been widely used as an effective approach. However, the existing user authentication mechanisms in IIoT suffer from single factor authentication and poor adaptability with the rapid growth of the number of users and the diversity of user categories. To solve the aforementioned issues, this article proposes a novel Authentication mechanism based on Transfer Learning empowered Blockchain, coined ATLB. In ATLB, blockchains are applied to achieve the privacy preservation for industrial applications. In addition, by introducing the transfer learning based authentication mechanism, trustworthy blockchains are built such that the privacy preservation for industrial applications is further enhanced. Specifically, ATLB first employs a guiding deep deterministic policy gradient algorithm to train the user authentication model of a specific region, which is then transferred locally for foreign user authentication or cross-regionally for another region's user authentication such that the model training time is significantly reduced. Experimental results show that the proposed ATLB not only provides accurate authentications for IIoT applications but also achieves high throughput and low latency.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available