Secure access technology for industrial internet of things

IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Concurrency and Computation-Practice & Experience Pub Date : 2024-08-29 DOI:10.1002/cpe.8231
Bingquan Wang, Jin Peng, Meili Cui
{"title":"Secure access technology for industrial internet of things","authors":"Bingquan Wang,&nbsp;Jin Peng,&nbsp;Meili Cui","doi":"10.1002/cpe.8231","DOIUrl":null,"url":null,"abstract":"<p>When terminal devices attempt to access the industrial internet of things (IIoT), preventing illegal access from untrusted terminals becomes challenging. This difficulty arises because most devices adopt the commonly used traditional methods of accessing the internet of things. To address this challenge, we propose a perception-layer-based IIoT trusted connection architecture, derived from the trusted connection architecture (TCA), and names it TCA-IIoT. This architecture enables bidirectional identity and platform integrity authentication between access points and terminals, while also ensuring trusted authentication of IIoT terminal behavior. To validate the effectiveness of TCA-IIoT, the paper details a simulation experiment. This experiment centers on evaluating the success rate of data transmission and measuring the average delay under various conditions, including scenarios with malicious nodes. The results of the study indicate that TCA-IIoT markedly improves the security and reliability of IIoT networks, advancements that are vital for the sustainable development and broader application of these systems.</p>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 25","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.8231","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0

Abstract

When terminal devices attempt to access the industrial internet of things (IIoT), preventing illegal access from untrusted terminals becomes challenging. This difficulty arises because most devices adopt the commonly used traditional methods of accessing the internet of things. To address this challenge, we propose a perception-layer-based IIoT trusted connection architecture, derived from the trusted connection architecture (TCA), and names it TCA-IIoT. This architecture enables bidirectional identity and platform integrity authentication between access points and terminals, while also ensuring trusted authentication of IIoT terminal behavior. To validate the effectiveness of TCA-IIoT, the paper details a simulation experiment. This experiment centers on evaluating the success rate of data transmission and measuring the average delay under various conditions, including scenarios with malicious nodes. The results of the study indicate that TCA-IIoT markedly improves the security and reliability of IIoT networks, advancements that are vital for the sustainable development and broader application of these systems.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
工业物联网安全接入技术
当终端设备试图访问工业物联网(IIoT)时,防止来自不受信任的终端设备的非法访问变得十分困难。出现这种困难的原因是,大多数设备都采用常用的传统方法访问物联网。为了应对这一挑战,我们提出了一种基于感知层的 IIoT 可信连接架构,该架构源自可信连接架构(TCA),并将其命名为 TCA-IIoT。该架构可在接入点和终端之间实现双向身份和平台完整性验证,同时还能确保对 IIoT 终端行为进行可信验证。为了验证 TCA-IIoT 的有效性,本文详细介绍了一项模拟实验。该实验主要评估数据传输的成功率,并测量各种条件下的平均延迟,包括存在恶意节点的场景。研究结果表明,TCA-IIoT 显著提高了 IIoT 网络的安全性和可靠性,这些进步对于这些系统的可持续发展和更广泛应用至关重要。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Concurrency and Computation-Practice & Experience
Concurrency and Computation-Practice & Experience 工程技术-计算机:理论方法
CiteScore
5.00
自引率
10.00%
发文量
664
审稿时长
9.6 months
期刊介绍: Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of: Parallel and distributed computing; High-performance computing; Computational and data science; Artificial intelligence and machine learning; Big data applications, algorithms, and systems; Network science; Ontologies and semantics; Security and privacy; Cloud/edge/fog computing; Green computing; and Quantum computing.
期刊最新文献
Issue Information Improving QoS in cloud resources scheduling using dynamic clustering algorithm and SM-CDC scheduling model Issue Information Issue Information Camellia oleifera trunks detection and identification based on improved YOLOv7
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1