Investigating the Effectiveness of Birthday Attack Strategies in Cryptography Network Security DOI
Gurunath T. Chavan,

Shalu Agrawal,

Nitin N. Sakhare

et al.

Published: Dec. 29, 2023

Cryptography is a crucial factor of community safety because it involves growing and decoding mystery codes to guard touchy statistics from unauthorized right entry. As the era advances, protection professionals must continuously evaluate effectiveness numerous cryptographic techniques techniques. One such method birthday attack, form brute-pressure attack that takes benefit paradox – chance in group people, two people will proportion an equal birthday. In cryptography, this used discover collisions hashing function, wherein different enter messages produce identical output. This have look at examines various strategies cryptography context. specially, studies observes algorithms scenarios concerning use methods how they're being utilized network structures. moreover, strives apprehend boom within sophistication networks has brought about prevalence attack. The research seeks cope with diverse problems challenges faced by using approach, inclusive reducing reliability certain factors exposing ability introducing vulnerabilities into device. examine additionally usage multi-layered strategies, which include utilising couple mixture methods, as well exploring capacity any new threat vectors may be used. end, explore whether or not there are first-rate practices lessen associated hit assault tries. consequences take could gain deeper knowledge related risks addition informing destiny efforts reinforce enhance protocols followed networks.

Language: Английский

A Survey on Key Agreement and Authentication Protocol for Internet of Things Application DOI Creative Commons
Mohammad Kamrul Hasan, Zhou Weichen,

Nurhizam Safie

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 61642 - 61666

Published: Jan. 1, 2024

The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and network communication technology to establish ubiquitous connectivity among people, machines, objects. Due its end devices' limited computing resources storage space, it is not feasible merely transpose traditional internet security technologies directly IoT endpoints. Maintaining while concurrently ensuring performance particularly challenging endeavor. This paper provides review key agreements authentication protocols pivotal the IoT. First, this survey discusses applications that need agreement strengthen their current research on these application fields. Subsequently, engages in an in-depth exploration phase involved scheme agreement, including examination cryptographic techniques employed within processes. also thoroughly studies scheme's services, potential attacks, formal analysis informal ensure resilience against such threats. study aims provide profound understanding recent applications. It strives contribute towards strengthening systems for applications, sustainability face evolving

Language: Английский

Citations

29

CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things DOI
Muhammad Tanveer, Akhtar Badshah, Abd Ullah Khan

et al.

Internet of Things, Journal Year: 2023, Volume and Issue: 23, P. 100902 - 100902

Published: Aug. 10, 2023

Language: Английский

Citations

40

Security Framework for Network-Based Manufacturing Systems with Personalized Customization: An Industry 4.0 Approach DOI Creative Commons
Muhammad Hammad, Rashad Jillani, Sami Ullah

et al.

Sensors, Journal Year: 2023, Volume and Issue: 23(17), P. 7555 - 7555

Published: Aug. 31, 2023

Smart manufacturing is pivotal in the context of Industry 4.0, as it integrates advanced technologies like Internet Things (IoT) and automation to streamline production processes improve product quality, paving way for a competitive industrial landscape. Machines have become network-based through IoT, where integrated collaborated system responds real time meet demand fluctuations personalized customization. Within (NBMS), mobile robots (MiRs) are vital increasing operational efficiency, adaptability, productivity. However, with advent IoT-enabled systems, security has serious challenge because communication various devices acting nodes. This paper proposes framework newly customization factory, considering all tools used throughout process. To encounter concern, an NBMS selected model tackle black hole attack (BHA) using NTRUEncrypt cryptography ad hoc on-demand distance-vector (AODV) routing protocol. performs encryption decryption while sending receiving messages. The proposed technique simulated by network simulator NS-2.35, its performance evaluated different environments, such healthy network, malicious NTRUEncrypt-secured based on evaluation metrics, including throughput, goodput, end-to-end delay, packet delivery ratio. results show that scheme safely presence node. implications this study beneficial industries looking embrace subtractive additive facilitated robots. Implementation ensures enables customization, protects confidential data ecosystem.

Language: Английский

Citations

23

Lightweight authentication protocol for connected medical IoT through privacy-preserving access DOI Creative Commons
Muhammad Tanveer, Samia Allaoua Chelloug,

Maali Alabdulhafith

et al.

Egyptian Informatics Journal, Journal Year: 2024, Volume and Issue: 26, P. 100474 - 100474

Published: May 14, 2024

With the rapid progress of communication technology, Internet Things (IoT) has emerged as an essential element in our daily lives. Given that IoT encompasses diverse devices often have limited resources terms communication, computation, and storage. Consequently, National Institute Standards Technology (NIST) standardized several lightweight cryptographic algorithms for encryption decryption, specifically designed to meet needs resource-constrained devices. These algorithms, known authenticated with associated data (AEAD), offer more than just confidentiality—they also guarantee information integrity authentication. Unlike conventional like AES, which solely provide confidentiality, AEAD encompass additional functionality achieve authenticity. This eliminates need separate message authentication codes ensure Therefore, by leveraging characteristics protocol, it is possible develop a framework mitigate security risks inherent public channels. this work, we protocol smart healthcare system (BLAP-SHS) using mechanism. In order do this, session key must first be created encrypted communication. done via method called mutual authentication, verifies legitimacy both user server. The random-or-real methodology ensures derived key, Scyther tool used assess BLAP-SHS' resistance man-in-the-middle replay attacks. Through technique informal analysis, resilience BLAP-SHS against denial service, password-guessing threats are evaluated. By juxtaposing other prominent techniques, usefulness assessed computing costs. We illustrate requires reduction computation cost ranging from [70.11% 95.21%] [3.85% 9.09%], evidenced comparative study.

Language: Английский

Citations

9

Machine Learning and IoT-Based Solutions in Industrial Applications for Smart Manufacturing: A Critical Review DOI Creative Commons
Paolo Visconti,

Giuseppe Rausa,

Carolina Del-Valle-Soto

et al.

Future Internet, Journal Year: 2024, Volume and Issue: 16(11), P. 394 - 394

Published: Oct. 26, 2024

The Internet of Things (IoT) has radically changed the industrial world, enabling integration numerous systems and devices into ecosystem. There are many areas manufacturing industry in which IoT contributed, including plants’ remote monitoring control, energy efficiency, more efficient resources management, cost reduction, paving way for smart framework Industry 4.0. This review article provides an up-to-date overview machine learning (ML) algorithms applied to (SM), analyzing four main application fields: security, predictive maintenance, process additive manufacturing. In addition, paper presents a descriptive comparative ML mainly used Furthermore, each discussed topic, deep analysis recent solutions reported scientific literature is introduced, dwelling on architectural aspects, sensing solutions, implemented data strategies, communication tools, performance, other characteristic parameters. comparison highlights strengths weaknesses solution. Finally, presented work outlines features functionalities future IoT-based applications.

Language: Английский

Citations

7

Development of a Digital Twin Prototype for Industrial Manufacturing Monitoring System Using IoT and Augmented Reality DOI Open Access
Dony Novaliendry,

Rahmat Febri Yoga Saputra,

Novi Febrianti

et al.

International Journal of Online and Biomedical Engineering (iJOE), Journal Year: 2024, Volume and Issue: 20(03), P. 4 - 23

Published: Feb. 27, 2024

The world is currently abuzz with the rapid development of technology in era Industrial Revolution 4.0. Various technological advancements are facilitating progress and accelerating industrial technology. This evolution has led to automation production processes, transitioning toward digitalization. With implementation sensors that provide real-time data, processes can now be monitored remotely. However, direct monitoring still necessary at times periodically check condition each operating machine. Therefore, there a need for monitor reduce high maintenance costs. Currently, numerous new technologies emerging enhance performance efficiency various industries. One such digital twin. A twin visual representation offers insights into continuous operations system. research focuses on an manufacturing system integrates Internet Things (IoT) augmented reality (AR) technologies. composed application prototype machine form conveyor, which simulate It also transmits sensor data error notifications real time. designed serve as implementing technology, combining IoT AR. makes it possible apply machinery tools sectors.

Language: Английский

Citations

4

On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances DOI Creative Commons
Sani M. Abdullahi, Sanja Lazarova‐Molnar

International Journal of Information Security, Journal Year: 2025, Volume and Issue: 24(1)

Published: Jan. 3, 2025

Abstract The adoption of the Internet Things (IoT) in smart manufacturing has recently seen a boost economic and technological advancement. This is attributed to improved operational efficiency resulting from streamlined interoperability, decreased downtime, real-time processing as compared conventional industries. It also brings with it massive deployment intelligent systems devices both Information Technology (IT) Operational (OT) realms within Industrial IoT (IIoT) infrastructure, thus creating heterogeneous interconnectivity. However, such inherent interconnectivity introduces significant security privacy challenges. To mitigate these challenges, researchers cybersecurity experts have proposed different defense mechanisms for facets cyber landscape IIoT infrastructure. Nevertheless, most techniques require major technical expertise be implemented. Also, there lack specific follow-through guides on how adopt implement mechanisms. paper aims fill that gap by providing in-depth guidance adopting deploying designed various threats while ensuring secure privacy-preserving article first emphasizes implications targeting tools infrastructure well vulnerabilities emerging due IT OT convergence. then delves into recent state-of-the-art protection attacks based robust framework includes all defenses. In addition, comprehensive adopted are provided. Finally, other challenges open research questions presented pave way towards efficient schemes manufacturing.

Language: Английский

Citations

0

Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing DOI Creative Commons
Muhammad Noman Sohail, Adeel Anjum, Iftikhar Ahmed Saeed

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 51176 - 51192

Published: Jan. 1, 2024

Connecting smart industrial components to computer networks revolutionizes business operations. However, in the Industrial Internet of Things (IIoT), sharing data has bandwidth, computational, and privacy issues. Researchers presented cloud computing fine-grained access control overcome these challenges. traditional centralized systems involve single points failure. To mitigate challenges, we have proposed a secure incentive-based data-sharing framework for IIoT using blockchain technology. We leverage due its ability provide tamper-resistant storage as participants store their on distributed ledger (DL), preventing unauthorized access. A security protocol is designed that utilizes properties elliptic curve cryptography (ECC). Moreover, Shapley value employed calculate revenue distribute it fairly. perform formal evaluation, conducted extensive simulations Automated Validation Security Protocols Applications (AVISPA) Scyther simulation tools, which demonstrated our robust against various adversarial attacks. The experimental results show incentive distribution fairness among participants.

Language: Английский

Citations

2

Application of Wearable Sensors in Physical education for biomedical surveillance and human-machine interface DOI
Mohammed Jameel Alsalhy,

Ibrahem Ahmed,

Naseer Ali Hussien

et al.

Published: Nov. 16, 2023

Continuous biological surveillance requires less mechanical aid and affordable wearable technology sensors. The health industry benefits greatly from the rapid development expansion of Internet Things (IoT). Measuring accuracy physical education systems is a major difficulty for fitness sports trackers, as human dependability primary concern these technologies. This study supports use portable sensor device monitoring activities in athletes' training. proposed method achieved with help using device(MPE-Wsd)to track their health. With Service Level Agreement (SLA) method, processing power requirements are estimated server. article opened unique compelling model offers at human-machine interface. It's convenient both participants doctor to have access various sources information. this new field study, policymakers may make most efficient hardware software designed Things. Provides network instantaneous large-scale resources while reducing operational capital expenditures. Many mental physiological diseases rising global population ages because point-of-care (POC) treatment continuous disease important. results tests validate technique being economical employ regularly.

Language: Английский

Citations

2

SIMULATION AND MODELING OF A ROBUST CYBERSECURITY SYSTEM FOR NEXT-GENERATION MANUFACTURING EXECUTION DOI

G Moulika,

Ponnusamy Palanisamy

Engineering Research Express, Journal Year: 2024, Volume and Issue: 6(4), P. 045425 - 045425

Published: Nov. 7, 2024

Abstract This research presents a simulation focusing on the integration of dynamic and robust cybersecurity framework into manufacturing execution system (MES). aims to address cyber security vulnerabilities inherent in systems Production implementation commonly use various communication protocols, including RS232, IPv4, IPv6, PROFIBUS, MODBUS. Recent provide for separating industrial control networks from corporate enterprise Internet. strengthen as result. However, when collaborate, becomes crucial. process poses significant risks that can compromise integrity data confidentiality. study identify mitigate gateway vulnerabilities, establish cyber-defense framework, emphasize standardization highlight its unique advantages, benchmark proposed method against existing solutions. The design resilience encompasses systems’ capacity anticipate, address, recover threats, all while preserving operational integrity. Mathematical modeling strengthens by exploring protocols like PLC, SCADA, DCS, reveals analysis safeguard potential attacks, given implications each protocol. proposes simple processes mathematical models enhance security, despite existence procedures. We propose functional relationships forecast computer behavior, performance, underscore crucial role standardized protocols. develop investigate model. model takes account presence devices, firewall configurations, encryption systems, access systems. dynamics equation align with real-time conditions MES. determines metric based specific parameters. Passing base threshold triggers transaction deletion logic, exposing proactive event breaches. suggests designing MES automation goal ensuring seamless service, implementing response mechanisms swiftly, minimizing time. flow diagram figure 1 shows structured approach paper begins development create conceptual representation. A follows, assessing organizational needs objectives well process, which includes proposal stage tool selection. Among these, performance evaluation entails measuring model’s using established metrics, driving through response, monitoring making changes feedback.

Language: Английский

Citations

0