Cryptography
is
a
crucial
factor
of
community
safety
because
it
involves
growing
and
decoding
mystery
codes
to
guard
touchy
statistics
from
unauthorized
right
entry.
As
the
era
advances,
protection
professionals
must
continuously
evaluate
effectiveness
numerous
cryptographic
techniques
techniques.
One
such
method
birthday
attack,
form
brute-pressure
attack
that
takes
benefit
paradox
–
chance
in
group
people,
two
people
will
proportion
an
equal
birthday.
In
cryptography,
this
used
discover
collisions
hashing
function,
wherein
different
enter
messages
produce
identical
output.
This
have
look
at
examines
various
strategies
cryptography
context.
specially,
studies
observes
algorithms
scenarios
concerning
use
methods
how
they're
being
utilized
network
structures.
moreover,
strives
apprehend
boom
within
sophistication
networks
has
brought
about
prevalence
attack.
The
research
seeks
cope
with
diverse
problems
challenges
faced
by
using
approach,
inclusive
reducing
reliability
certain
factors
exposing
ability
introducing
vulnerabilities
into
device.
examine
additionally
usage
multi-layered
strategies,
which
include
utilising
couple
mixture
methods,
as
well
exploring
capacity
any
new
threat
vectors
may
be
used.
end,
explore
whether
or
not
there
are
first-rate
practices
lessen
associated
hit
assault
tries.
consequences
take
could
gain
deeper
knowledge
related
risks
addition
informing
destiny
efforts
reinforce
enhance
protocols
followed
networks.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 61642 - 61666
Published: Jan. 1, 2024
The
Internet
of
Things
(IoT)
represents
a
dynamic
infrastructure,
leveraging
sensing
and
network
communication
technology
to
establish
ubiquitous
connectivity
among
people,
machines,
objects.
Due
its
end
devices'
limited
computing
resources
storage
space,
it
is
not
feasible
merely
transpose
traditional
internet
security
technologies
directly
IoT
endpoints.
Maintaining
while
concurrently
ensuring
performance
particularly
challenging
endeavor.
This
paper
provides
review
key
agreements
authentication
protocols
pivotal
the
IoT.
First,
this
survey
discusses
applications
that
need
agreement
strengthen
their
current
research
on
these
application
fields.
Subsequently,
engages
in
an
in-depth
exploration
phase
involved
scheme
agreement,
including
examination
cryptographic
techniques
employed
within
processes.
also
thoroughly
studies
scheme's
services,
potential
attacks,
formal
analysis
informal
ensure
resilience
against
such
threats.
study
aims
provide
profound
understanding
recent
applications.
It
strives
contribute
towards
strengthening
systems
for
applications,
sustainability
face
evolving
Sensors,
Journal Year:
2023,
Volume and Issue:
23(17), P. 7555 - 7555
Published: Aug. 31, 2023
Smart
manufacturing
is
pivotal
in
the
context
of
Industry
4.0,
as
it
integrates
advanced
technologies
like
Internet
Things
(IoT)
and
automation
to
streamline
production
processes
improve
product
quality,
paving
way
for
a
competitive
industrial
landscape.
Machines
have
become
network-based
through
IoT,
where
integrated
collaborated
system
responds
real
time
meet
demand
fluctuations
personalized
customization.
Within
(NBMS),
mobile
robots
(MiRs)
are
vital
increasing
operational
efficiency,
adaptability,
productivity.
However,
with
advent
IoT-enabled
systems,
security
has
serious
challenge
because
communication
various
devices
acting
nodes.
This
paper
proposes
framework
newly
customization
factory,
considering
all
tools
used
throughout
process.
To
encounter
concern,
an
NBMS
selected
model
tackle
black
hole
attack
(BHA)
using
NTRUEncrypt
cryptography
ad
hoc
on-demand
distance-vector
(AODV)
routing
protocol.
performs
encryption
decryption
while
sending
receiving
messages.
The
proposed
technique
simulated
by
network
simulator
NS-2.35,
its
performance
evaluated
different
environments,
such
healthy
network,
malicious
NTRUEncrypt-secured
based
on
evaluation
metrics,
including
throughput,
goodput,
end-to-end
delay,
packet
delivery
ratio.
results
show
that
scheme
safely
presence
node.
implications
this
study
beneficial
industries
looking
embrace
subtractive
additive
facilitated
robots.
Implementation
ensures
enables
customization,
protects
confidential
data
ecosystem.
Egyptian Informatics Journal,
Journal Year:
2024,
Volume and Issue:
26, P. 100474 - 100474
Published: May 14, 2024
With
the
rapid
progress
of
communication
technology,
Internet
Things
(IoT)
has
emerged
as
an
essential
element
in
our
daily
lives.
Given
that
IoT
encompasses
diverse
devices
often
have
limited
resources
terms
communication,
computation,
and
storage.
Consequently,
National
Institute
Standards
Technology
(NIST)
standardized
several
lightweight
cryptographic
algorithms
for
encryption
decryption,
specifically
designed
to
meet
needs
resource-constrained
devices.
These
algorithms,
known
authenticated
with
associated
data
(AEAD),
offer
more
than
just
confidentiality—they
also
guarantee
information
integrity
authentication.
Unlike
conventional
like
AES,
which
solely
provide
confidentiality,
AEAD
encompass
additional
functionality
achieve
authenticity.
This
eliminates
need
separate
message
authentication
codes
ensure
Therefore,
by
leveraging
characteristics
protocol,
it
is
possible
develop
a
framework
mitigate
security
risks
inherent
public
channels.
this
work,
we
protocol
smart
healthcare
system
(BLAP-SHS)
using
mechanism.
In
order
do
this,
session
key
must
first
be
created
encrypted
communication.
done
via
method
called
mutual
authentication,
verifies
legitimacy
both
user
server.
The
random-or-real
methodology
ensures
derived
key,
Scyther
tool
used
assess
BLAP-SHS'
resistance
man-in-the-middle
replay
attacks.
Through
technique
informal
analysis,
resilience
BLAP-SHS
against
denial
service,
password-guessing
threats
are
evaluated.
By
juxtaposing
other
prominent
techniques,
usefulness
assessed
computing
costs.
We
illustrate
requires
reduction
computation
cost
ranging
from
[70.11%
95.21%]
[3.85%
9.09%],
evidenced
comparative
study.
Future Internet,
Journal Year:
2024,
Volume and Issue:
16(11), P. 394 - 394
Published: Oct. 26, 2024
The
Internet
of
Things
(IoT)
has
radically
changed
the
industrial
world,
enabling
integration
numerous
systems
and
devices
into
ecosystem.
There
are
many
areas
manufacturing
industry
in
which
IoT
contributed,
including
plants’
remote
monitoring
control,
energy
efficiency,
more
efficient
resources
management,
cost
reduction,
paving
way
for
smart
framework
Industry
4.0.
This
review
article
provides
an
up-to-date
overview
machine
learning
(ML)
algorithms
applied
to
(SM),
analyzing
four
main
application
fields:
security,
predictive
maintenance,
process
additive
manufacturing.
In
addition,
paper
presents
a
descriptive
comparative
ML
mainly
used
Furthermore,
each
discussed
topic,
deep
analysis
recent
solutions
reported
scientific
literature
is
introduced,
dwelling
on
architectural
aspects,
sensing
solutions,
implemented
data
strategies,
communication
tools,
performance,
other
characteristic
parameters.
comparison
highlights
strengths
weaknesses
solution.
Finally,
presented
work
outlines
features
functionalities
future
IoT-based
applications.
International Journal of Online and Biomedical Engineering (iJOE),
Journal Year:
2024,
Volume and Issue:
20(03), P. 4 - 23
Published: Feb. 27, 2024
The
world
is
currently
abuzz
with
the
rapid
development
of
technology
in
era
Industrial
Revolution
4.0.
Various
technological
advancements
are
facilitating
progress
and
accelerating
industrial
technology.
This
evolution
has
led
to
automation
production
processes,
transitioning
toward
digitalization.
With
implementation
sensors
that
provide
real-time
data,
processes
can
now
be
monitored
remotely.
However,
direct
monitoring
still
necessary
at
times
periodically
check
condition
each
operating
machine.
Therefore,
there
a
need
for
monitor
reduce
high
maintenance
costs.
Currently,
numerous
new
technologies
emerging
enhance
performance
efficiency
various
industries.
One
such
digital
twin.
A
twin
visual
representation
offers
insights
into
continuous
operations
system.
research
focuses
on
an
manufacturing
system
integrates
Internet
Things
(IoT)
augmented
reality
(AR)
technologies.
composed
application
prototype
machine
form
conveyor,
which
simulate
It
also
transmits
sensor
data
error
notifications
real
time.
designed
serve
as
implementing
technology,
combining
IoT
AR.
makes
it
possible
apply
machinery
tools
sectors.
International Journal of Information Security,
Journal Year:
2025,
Volume and Issue:
24(1)
Published: Jan. 3, 2025
Abstract
The
adoption
of
the
Internet
Things
(IoT)
in
smart
manufacturing
has
recently
seen
a
boost
economic
and
technological
advancement.
This
is
attributed
to
improved
operational
efficiency
resulting
from
streamlined
interoperability,
decreased
downtime,
real-time
processing
as
compared
conventional
industries.
It
also
brings
with
it
massive
deployment
intelligent
systems
devices
both
Information
Technology
(IT)
Operational
(OT)
realms
within
Industrial
IoT
(IIoT)
infrastructure,
thus
creating
heterogeneous
interconnectivity.
However,
such
inherent
interconnectivity
introduces
significant
security
privacy
challenges.
To
mitigate
these
challenges,
researchers
cybersecurity
experts
have
proposed
different
defense
mechanisms
for
facets
cyber
landscape
IIoT
infrastructure.
Nevertheless,
most
techniques
require
major
technical
expertise
be
implemented.
Also,
there
lack
specific
follow-through
guides
on
how
adopt
implement
mechanisms.
paper
aims
fill
that
gap
by
providing
in-depth
guidance
adopting
deploying
designed
various
threats
while
ensuring
secure
privacy-preserving
article
first
emphasizes
implications
targeting
tools
infrastructure
well
vulnerabilities
emerging
due
IT
OT
convergence.
then
delves
into
recent
state-of-the-art
protection
attacks
based
robust
framework
includes
all
defenses.
In
addition,
comprehensive
adopted
are
provided.
Finally,
other
challenges
open
research
questions
presented
pave
way
towards
efficient
schemes
manufacturing.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 51176 - 51192
Published: Jan. 1, 2024
Connecting
smart
industrial
components
to
computer
networks
revolutionizes
business
operations.
However,
in
the
Industrial
Internet
of
Things
(IIoT),
sharing
data
has
bandwidth,
computational,
and
privacy
issues.
Researchers
presented
cloud
computing
fine-grained
access
control
overcome
these
challenges.
traditional
centralized
systems
involve
single
points
failure.
To
mitigate
challenges,
we
have
proposed
a
secure
incentive-based
data-sharing
framework
for
IIoT
using
blockchain
technology.
We
leverage
due
its
ability
provide
tamper-resistant
storage
as
participants
store
their
on
distributed
ledger
(DL),
preventing
unauthorized
access.
A
security
protocol
is
designed
that
utilizes
properties
elliptic
curve
cryptography
(ECC).
Moreover,
Shapley
value
employed
calculate
revenue
distribute
it
fairly.
perform
formal
evaluation,
conducted
extensive
simulations
Automated
Validation
Security
Protocols
Applications
(AVISPA)
Scyther
simulation
tools,
which
demonstrated
our
robust
against
various
adversarial
attacks.
The
experimental
results
show
incentive
distribution
fairness
among
participants.
Continuous
biological
surveillance
requires
less
mechanical
aid
and
affordable
wearable
technology
sensors.
The
health
industry
benefits
greatly
from
the
rapid
development
expansion
of
Internet
Things
(IoT).
Measuring
accuracy
physical
education
systems
is
a
major
difficulty
for
fitness
sports
trackers,
as
human
dependability
primary
concern
these
technologies.
This
study
supports
use
portable
sensor
device
monitoring
activities
in
athletes'
training.
proposed
method
achieved
with
help
using
device(MPE-Wsd)to
track
their
health.
With
Service
Level
Agreement
(SLA)
method,
processing
power
requirements
are
estimated
server.
article
opened
unique
compelling
model
offers
at
human-machine
interface.
It's
convenient
both
participants
doctor
to
have
access
various
sources
information.
this
new
field
study,
policymakers
may
make
most
efficient
hardware
software
designed
Things.
Provides
network
instantaneous
large-scale
resources
while
reducing
operational
capital
expenditures.
Many
mental
physiological
diseases
rising
global
population
ages
because
point-of-care
(POC)
treatment
continuous
disease
important.
results
tests
validate
technique
being
economical
employ
regularly.
Engineering Research Express,
Journal Year:
2024,
Volume and Issue:
6(4), P. 045425 - 045425
Published: Nov. 7, 2024
Abstract
This
research
presents
a
simulation
focusing
on
the
integration
of
dynamic
and
robust
cybersecurity
framework
into
manufacturing
execution
system
(MES).
aims
to
address
cyber
security
vulnerabilities
inherent
in
systems
Production
implementation
commonly
use
various
communication
protocols,
including
RS232,
IPv4,
IPv6,
PROFIBUS,
MODBUS.
Recent
provide
for
separating
industrial
control
networks
from
corporate
enterprise
Internet.
strengthen
as
result.
However,
when
collaborate,
becomes
crucial.
process
poses
significant
risks
that
can
compromise
integrity
data
confidentiality.
study
identify
mitigate
gateway
vulnerabilities,
establish
cyber-defense
framework,
emphasize
standardization
highlight
its
unique
advantages,
benchmark
proposed
method
against
existing
solutions.
The
design
resilience
encompasses
systems’
capacity
anticipate,
address,
recover
threats,
all
while
preserving
operational
integrity.
Mathematical
modeling
strengthens
by
exploring
protocols
like
PLC,
SCADA,
DCS,
reveals
analysis
safeguard
potential
attacks,
given
implications
each
protocol.
proposes
simple
processes
mathematical
models
enhance
security,
despite
existence
procedures.
We
propose
functional
relationships
forecast
computer
behavior,
performance,
underscore
crucial
role
standardized
protocols.
develop
investigate
model.
model
takes
account
presence
devices,
firewall
configurations,
encryption
systems,
access
systems.
dynamics
equation
align
with
real-time
conditions
MES.
determines
metric
based
specific
parameters.
Passing
base
threshold
triggers
transaction
deletion
logic,
exposing
proactive
event
breaches.
suggests
designing
MES
automation
goal
ensuring
seamless
service,
implementing
response
mechanisms
swiftly,
minimizing
time.
flow
diagram
figure
1
shows
structured
approach
paper
begins
development
create
conceptual
representation.
A
follows,
assessing
organizational
needs
objectives
well
process,
which
includes
proposal
stage
tool
selection.
Among
these,
performance
evaluation
entails
measuring
model’s
using
established
metrics,
driving
through
response,
monitoring
making
changes
feedback.