{"title":"工业物联网的认证和加密解决方案研究","authors":"Rajesh P Sukumaran, S. Benedict","doi":"10.1109/I-SMAC55078.2022.9987278","DOIUrl":null,"url":null,"abstract":"The rapid emergence of Internet of Things (IoT) has fueled the wide acceptance of its own extended version Industrial IoT(IIoT). It provides a real-time, robust, and reliable communication in various domains, including robotics, medical sensors, and other software-defined applications. In general, authentication is considered as the prime security control in IIoT systems to ensure that a right user is accessing resources at any specified time. Many research works have been presented in the literature so far with regard to improving the authentication and security aspects of industrial IIoT systems. This paper aims at presenting a comprehensive study on security and authentication aspects in IIoT systems; it highlights the existing cryptographic methods for such IIoT systems. Further, some of the existing research works on the IIoT systems, along with their strengths and weaknesses, are also been reviewed and presented. The work will be useful for researchers or practitioners while applying authentication techniques on IIoT systems.","PeriodicalId":306129,"journal":{"name":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Authentication and Cryptography solutions for Industrial IoT - A Study\",\"authors\":\"Rajesh P Sukumaran, S. Benedict\",\"doi\":\"10.1109/I-SMAC55078.2022.9987278\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid emergence of Internet of Things (IoT) has fueled the wide acceptance of its own extended version Industrial IoT(IIoT). It provides a real-time, robust, and reliable communication in various domains, including robotics, medical sensors, and other software-defined applications. In general, authentication is considered as the prime security control in IIoT systems to ensure that a right user is accessing resources at any specified time. Many research works have been presented in the literature so far with regard to improving the authentication and security aspects of industrial IIoT systems. This paper aims at presenting a comprehensive study on security and authentication aspects in IIoT systems; it highlights the existing cryptographic methods for such IIoT systems. Further, some of the existing research works on the IIoT systems, along with their strengths and weaknesses, are also been reviewed and presented. The work will be useful for researchers or practitioners while applying authentication techniques on IIoT systems.\",\"PeriodicalId\":306129,\"journal\":{\"name\":\"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I-SMAC55078.2022.9987278\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SMAC55078.2022.9987278","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authentication and Cryptography solutions for Industrial IoT - A Study
The rapid emergence of Internet of Things (IoT) has fueled the wide acceptance of its own extended version Industrial IoT(IIoT). It provides a real-time, robust, and reliable communication in various domains, including robotics, medical sensors, and other software-defined applications. In general, authentication is considered as the prime security control in IIoT systems to ensure that a right user is accessing resources at any specified time. Many research works have been presented in the literature so far with regard to improving the authentication and security aspects of industrial IIoT systems. This paper aims at presenting a comprehensive study on security and authentication aspects in IIoT systems; it highlights the existing cryptographic methods for such IIoT systems. Further, some of the existing research works on the IIoT systems, along with their strengths and weaknesses, are also been reviewed and presented. The work will be useful for researchers or practitioners while applying authentication techniques on IIoT systems.