Emerging Authentication Technologies for Zero Trust on the Internet of Things DOI Open Access

Chanapha Bast,

Kuo‐Hui Yeh

Symmetry, Journal Year: 2024, Volume and Issue: 16(8), P. 993 - 993

Published: Aug. 5, 2024

The large and interconnected nature of the Internet Things (IoT) presents unique security challenges, even as it revolutionizes various sectors. With numerous devices, often limited in resources, traditional perimeter-based methods struggle to keep pace. “never trust, always verify” principle zero trust offers a viable solution. Zero is concept that has become increasingly popular, using key exchange techniques ensure secure authenticated communication within network, especially managing risks critical infrastructure. Authentication process identify an entity, prerequisite for authorization, essential granting access control. It fundamentally relies on management generate manage cryptographic keys authentication. aim this study enhance context by investigating authentication discussing several potential solutions successful implementation. This also performance evaluation criteria IoT introduces advanced approaches different scenarios, including lightweight cryptography, mutual authentication, blockchain technology. Finally, we address challenges related implementation future directions research.

Language: Английский

La inteligencia artificial en la seguridad informática: Una revisión literaria DOI Creative Commons
Bernabé Ortega-Tenezaca,

Lady Rodriguez Carmona,

Edgar Macías Farias

et al.

Arandu-UTIC., Journal Year: 2025, Volume and Issue: 11(2), P. 2798 - 2819

Published: Jan. 8, 2025

El presente trabajo tiene como objetivo, presentar una revisión y análisis de la literatura científica más reciente, relativa a aplicación uso inteligencia artificial, en detección amenazas, el campo seguridad informática, mediante algoritmos los aprendizaje automático, sus principales tendencias para enfrentar desafíos actuales, relativas ataques evasivos que intentan burlar sistemas tradicionales, tomando cuenta las fortalezas, debilidades retos aún persisten identificación patrones sospechosos, necesidad grandes cantidades datos alta calidad entrenar modelos IA. La importancia este radica sirve guía, investigadores, desarrolladores software profesionales se encuentren interesados generar fallas robustos eficientes, congruentes con necesidades actuales.

Citations

0

Modeling and Assessing the Attack Behaviour of Weak Passwords Based on Attack Graph DOI
Xiao He, X. R. Chen,

Chengliang Gao

et al.

Communications in computer and information science, Journal Year: 2025, Volume and Issue: unknown, P. 128 - 144

Published: Jan. 1, 2025

Language: Английский

Citations

0

Towards Double-Layer Dynamic Heterogeneous Redundancy Architecture for Reliable Railway Passenger Service System DOI Open Access
Xinghua Wu, Mingzhe Wang,

Jinsheng Shen

et al.

Electronics, Journal Year: 2024, Volume and Issue: 13(18), P. 3592 - 3592

Published: Sept. 10, 2024

Researchers have proposed the dynamic heterogeneous redundancy (DHR) architecture, which integrates dynamic, heterogeneous, redundant, and closed-loop feedback elements into system, to fortify reliability of railway passenger service system (RPSS). However, there are at least two weaknesses with common DHR architectures: (1) they need nodes enough computing storage resources; (2) hardly considered architecture. To this end, paper proposes a double-layer (DDHR) architecture ensure RPSS. This introduces set algorithms, optimized co-computation ruling weight optimization algorithms for data processing flow DDHR improves For evaluation also metrics: Dynamic available similarity metric. metric does not rely on overall redundant executor sets but evaluates their performance under specified interaction paths within single scheduling cycle. The smaller its similarity, higher reliability. Scheduling cycle dual-layer threshold. RPSS actual conditions by setting schedulable thresholds between same different layers executives in process. Finally, analog simulation experiments prototype building carried out, whose numerical experimental results show that outperforms traditional terms dynamically thresholds, while algorithmic complexity multi-tasking concurrency slightly weaker than can be applied main operations general.

Language: Английский

Citations

1

Cloud Edge Integrated Security Architecture of New Cloud Manufacturing System DOI Open Access

Longbo Zhao,

Bohu Li,

Haitao Yuan

et al.

Journal of Systems Engineering and Electronics, Journal Year: 2024, Volume and Issue: 35(5), P. 1177 - 1189

Published: Oct. 1, 2024

Language: Английский

Citations

1

Application of anti-mapping security access technology in network security protection DOI Creative Commons
Dongjuan Ma, Rui Li, Zehui Liu

et al.

Applied Mathematics and Nonlinear Sciences, Journal Year: 2024, Volume and Issue: 9(1)

Published: Jan. 1, 2024

Abstract In the current era, characterized by pervasive Internet of Everything, trillions data points are exposed to high-level threats, presenting novel challenges domain cyberspace security. This paper introduces a cybersecurity protection framework derived from PDRR model, enriched with integrated measures. Utilizing mapping architecture that incorporates anti-mapping security access technology, we analyze robustness protections. The employs penetration testing queue technology uncover vulnerabilities within cyberspace, Hidden Markov Model assess posture, and QPSO-LightGBM model evaluate vulnerabilities. To validate efficacy in employing have systematically conducted various experimental methodologies, including testing, posture sensing, vulnerability assessment. approach provides comprehensive for addressing complex posed vast scale today’s interconnected environments. average send/receive telegram packets network I/O graph state SYN flooding attack grows 60 packets/sec normal 2.2*10 4 packets/sec, minimum time perception is only 51.28ms. accuracy assessment reaches 86.58%. Fully utilizing anti-marker can improve understanding threat situation enhance ability.

Language: Английский

Citations

0

Emerging Authentication Technologies for Zero Trust on the Internet of Things DOI Open Access

Chanapha Bast,

Kuo‐Hui Yeh

Symmetry, Journal Year: 2024, Volume and Issue: 16(8), P. 993 - 993

Published: Aug. 5, 2024

The large and interconnected nature of the Internet Things (IoT) presents unique security challenges, even as it revolutionizes various sectors. With numerous devices, often limited in resources, traditional perimeter-based methods struggle to keep pace. “never trust, always verify” principle zero trust offers a viable solution. Zero is concept that has become increasingly popular, using key exchange techniques ensure secure authenticated communication within network, especially managing risks critical infrastructure. Authentication process identify an entity, prerequisite for authorization, essential granting access control. It fundamentally relies on management generate manage cryptographic keys authentication. aim this study enhance context by investigating authentication discussing several potential solutions successful implementation. This also performance evaluation criteria IoT introduces advanced approaches different scenarios, including lightweight cryptography, mutual authentication, blockchain technology. Finally, we address challenges related implementation future directions research.

Language: Английский

Citations

0