Wireless Personal Communications, Journal Year: 2024, Volume and Issue: 139(1), P. 491 - 512
Published: Nov. 1, 2024
Language: Английский
Wireless Personal Communications, Journal Year: 2024, Volume and Issue: 139(1), P. 491 - 512
Published: Nov. 1, 2024
Language: Английский
IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 56554 - 56570
Published: Jan. 1, 2024
Industrial Internet of Things (IIoT) applications consist resource constrained interconnected devices that make them vulnerable to data leak and integrity violation challenges. The mobility, dynamism, complex structure the network further this issue more challenging. To control information flow in such environments, access is critical collaboration communication safe. deal with these challenges, recent studies employ attribute-based on top blockchain technology. However, frameworks suffer due high computational overhead. In paper, we propose an improved role-based framework using hyperledger IIoT requirements less overhead making process efficient real-time. proposed leverages a layered architecture chaincodes implement handles permission delegation conflict management dynamism network. system uses Policy Contract, Device Access Contract manage workflow whole process. Each chaincode isolated terms its responsibilities design low coupled. integration enables provide highly scalable solution, tamper-proof, flexible conflicting scenarios. outperforms significantly extensive simulation results. verify scalability efficiency, evaluated against large number concurrent virtual clients statistical analysis proves promising for research domain.
Language: Английский
Citations
5International Journal of Communication Systems, Journal Year: 2024, Volume and Issue: 37(13)
Published: May 17, 2024
Summary Internet of Things (IoT) networks continue to be deployed and play a crucial role in our daily life. Thus, ensuring their security is utmost importance. This necessitates the use cryptographic materials maintain confidentiality exchanged data between IoT devices (or sensor nodes). The key component these encryption decryption keys. In resource‐constrained like networks, employing symmetric pairwise keys offers trade‐off resource saving security. However, cryptosystems suffer from node compromising attacks. addition, such often require post‐deployment new either periodically or based on specific cases leading multi‐phase networks. So, establishment required secure newly added communications. paper presents an adaPtive rObust Key pre‐distribution (POK) that enables nodes. POK enhances generation pre‐loading fundamental concept involves nodes with computed using hash function taking into account expected number future post‐deployments. Through comparative analysis related works, minimizes communication overhead, eliminates need for time synchronization, energy‐efficient scheme. Furthermore, resilience attack by self‐healing property, where compromised have limited effect network, remain unaffected.
Language: Английский
Citations
1Wireless Personal Communications, Journal Year: 2024, Volume and Issue: 139(1), P. 491 - 512
Published: Nov. 1, 2024
Language: Английский
Citations
0