{"title":"边缘人工智能网络物理系统的安全认证与信任管理方案","authors":"Xinyin Xiang;Jin Cao;Weiguo Fan","doi":"10.1109/TITS.2025.3529691","DOIUrl":null,"url":null,"abstract":"Cyber-physical systems (CPSs) connected in the form of the Industrial Internet of Things (IIoT) are susceptible to various security threats. Due to the extensive deployment of infrastructure for IIoT devices, the trustworthiness and security of data are among the major concerns in CPSs. Therefore, establishing security measures against potential threats through trust assessment and trust authentication has become a key goal. Blockchain has the characteristics of traceability, anonymity, transparency, etc., and can achieve trust authentication for trust assessment. In our work, we propose a lightweight decentralized authentication and trust management scheme for edge AI-enabled CPSs that supports access control on the basis of extended chaotic maps, which meets the privacy and security needs of data transmission in a broader sense. Moreover, we develop a trust model for checking the trustworthiness of data collected by smart devices/sensor nodes. A formal security analysis is executed by utilizing the broadly applicable real-or-random (RoR) model. Our scheme, which is different from previous methods, combines high security with relatively low communication and computational costs. Through an informal security analysis, we verify that our proposal is in compliance with the security requirements and can withstand various forms of attacks. Furthermore, the functionality and performance analysis results indicate that our method is better suited for lightweight validation in CPS networks while providing a higher level of security than other methods.","PeriodicalId":13416,"journal":{"name":"IEEE Transactions on Intelligent Transportation Systems","volume":"26 3","pages":"3237-3249"},"PeriodicalIF":8.4000,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Authentication and Trust Management Scheme for Edge AI-Enabled Cyber-Physical Systems\",\"authors\":\"Xinyin Xiang;Jin Cao;Weiguo Fan\",\"doi\":\"10.1109/TITS.2025.3529691\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber-physical systems (CPSs) connected in the form of the Industrial Internet of Things (IIoT) are susceptible to various security threats. Due to the extensive deployment of infrastructure for IIoT devices, the trustworthiness and security of data are among the major concerns in CPSs. Therefore, establishing security measures against potential threats through trust assessment and trust authentication has become a key goal. Blockchain has the characteristics of traceability, anonymity, transparency, etc., and can achieve trust authentication for trust assessment. In our work, we propose a lightweight decentralized authentication and trust management scheme for edge AI-enabled CPSs that supports access control on the basis of extended chaotic maps, which meets the privacy and security needs of data transmission in a broader sense. Moreover, we develop a trust model for checking the trustworthiness of data collected by smart devices/sensor nodes. A formal security analysis is executed by utilizing the broadly applicable real-or-random (RoR) model. Our scheme, which is different from previous methods, combines high security with relatively low communication and computational costs. Through an informal security analysis, we verify that our proposal is in compliance with the security requirements and can withstand various forms of attacks. Furthermore, the functionality and performance analysis results indicate that our method is better suited for lightweight validation in CPS networks while providing a higher level of security than other methods.\",\"PeriodicalId\":13416,\"journal\":{\"name\":\"IEEE Transactions on Intelligent Transportation Systems\",\"volume\":\"26 3\",\"pages\":\"3237-3249\"},\"PeriodicalIF\":8.4000,\"publicationDate\":\"2025-01-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Intelligent Transportation Systems\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10855321/\",\"RegionNum\":1,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, CIVIL\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Intelligent Transportation Systems","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10855321/","RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, CIVIL","Score":null,"Total":0}
Secure Authentication and Trust Management Scheme for Edge AI-Enabled Cyber-Physical Systems
Cyber-physical systems (CPSs) connected in the form of the Industrial Internet of Things (IIoT) are susceptible to various security threats. Due to the extensive deployment of infrastructure for IIoT devices, the trustworthiness and security of data are among the major concerns in CPSs. Therefore, establishing security measures against potential threats through trust assessment and trust authentication has become a key goal. Blockchain has the characteristics of traceability, anonymity, transparency, etc., and can achieve trust authentication for trust assessment. In our work, we propose a lightweight decentralized authentication and trust management scheme for edge AI-enabled CPSs that supports access control on the basis of extended chaotic maps, which meets the privacy and security needs of data transmission in a broader sense. Moreover, we develop a trust model for checking the trustworthiness of data collected by smart devices/sensor nodes. A formal security analysis is executed by utilizing the broadly applicable real-or-random (RoR) model. Our scheme, which is different from previous methods, combines high security with relatively low communication and computational costs. Through an informal security analysis, we verify that our proposal is in compliance with the security requirements and can withstand various forms of attacks. Furthermore, the functionality and performance analysis results indicate that our method is better suited for lightweight validation in CPS networks while providing a higher level of security than other methods.
期刊介绍:
The theoretical, experimental and operational aspects of electrical and electronics engineering and information technologies as applied to Intelligent Transportation Systems (ITS). Intelligent Transportation Systems are defined as those systems utilizing synergistic technologies and systems engineering concepts to develop and improve transportation systems of all kinds. The scope of this interdisciplinary activity includes the promotion, consolidation and coordination of ITS technical activities among IEEE entities, and providing a focus for cooperative activities, both internally and externally.