A Novel GSPN Based Interconnection Model for 5 G and CAN Heterogeneous Networks DOI
Zheyi Chen, Dajun Du, Minrui Fei

et al.

Wireless Personal Communications, Journal Year: 2024, Volume and Issue: 139(1), P. 491 - 512

Published: Nov. 1, 2024

Language: Английский

A Blockchain Based Scalable Domain Access Control Framework for Industrial Internet of Things DOI Creative Commons

Muhammad Usman,

Muhammad Shahzad Sarfraz, Muhammad Umar Aftab

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 56554 - 56570

Published: Jan. 1, 2024

Industrial Internet of Things (IIoT) applications consist resource constrained interconnected devices that make them vulnerable to data leak and integrity violation challenges. The mobility, dynamism, complex structure the network further this issue more challenging. To control information flow in such environments, access is critical collaboration communication safe. deal with these challenges, recent studies employ attribute-based on top blockchain technology. However, frameworks suffer due high computational overhead. In paper, we propose an improved role-based framework using hyperledger IIoT requirements less overhead making process efficient real-time. proposed leverages a layered architecture chaincodes implement handles permission delegation conflict management dynamism network. system uses Policy Contract, Device Access Contract manage workflow whole process. Each chaincode isolated terms its responsibilities design low coupled. integration enables provide highly scalable solution, tamper-proof, flexible conflicting scenarios. outperforms significantly extensive simulation results. verify scalability efficiency, evaluated against large number concurrent virtual clients statistical analysis proves promising for research domain.

Language: Английский

Citations

5

AdaPtive and rObust Key pre‐distribution for multi‐phase IoT networks DOI
Mohamed‐Lamine Messai

International Journal of Communication Systems, Journal Year: 2024, Volume and Issue: 37(13)

Published: May 17, 2024

Summary Internet of Things (IoT) networks continue to be deployed and play a crucial role in our daily life. Thus, ensuring their security is utmost importance. This necessitates the use cryptographic materials maintain confidentiality exchanged data between IoT devices (or sensor nodes). The key component these encryption decryption keys. In resource‐constrained like networks, employing symmetric pairwise keys offers trade‐off resource saving security. However, cryptosystems suffer from node compromising attacks. addition, such often require post‐deployment new either periodically or based on specific cases leading multi‐phase networks. So, establishment required secure newly added communications. paper presents an adaPtive rObust Key pre‐distribution (POK) that enables nodes. POK enhances generation pre‐loading fundamental concept involves nodes with computed using hash function taking into account expected number future post‐deployments. Through comparative analysis related works, minimizes communication overhead, eliminates need for time synchronization, energy‐efficient scheme. Furthermore, resilience attack by self‐healing property, where compromised have limited effect network, remain unaffected.

Language: Английский

Citations

1

A Novel GSPN Based Interconnection Model for 5 G and CAN Heterogeneous Networks DOI
Zheyi Chen, Dajun Du, Minrui Fei

et al.

Wireless Personal Communications, Journal Year: 2024, Volume and Issue: 139(1), P. 491 - 512

Published: Nov. 1, 2024

Language: Английский

Citations

0