Soleymani, Seyed Ahmad and Goudarzi, Shidrokh and Anisi, Mohammad Hossein and Cruickshank, Haitham and Jindal, Anish and Kama, Nazri (2023) TRUTH: Trust and Authentication Scheme in 5G-IIoT. IEEE Transactions on Industrial Informatics, 19 (1). pp. 880-889. DOI https://doi.org/10.1109/tii.2022.3174718
Soleymani, Seyed Ahmad and Goudarzi, Shidrokh and Anisi, Mohammad Hossein and Cruickshank, Haitham and Jindal, Anish and Kama, Nazri (2023) TRUTH: Trust and Authentication Scheme in 5G-IIoT. IEEE Transactions on Industrial Informatics, 19 (1). pp. 880-889. DOI https://doi.org/10.1109/tii.2022.3174718
Soleymani, Seyed Ahmad and Goudarzi, Shidrokh and Anisi, Mohammad Hossein and Cruickshank, Haitham and Jindal, Anish and Kama, Nazri (2023) TRUTH: Trust and Authentication Scheme in 5G-IIoT. IEEE Transactions on Industrial Informatics, 19 (1). pp. 880-889. DOI https://doi.org/10.1109/tii.2022.3174718
Abstract
Due to the extremely important role of data in the Industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this study, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-party Authenticated Key Exchange (AKE) protocol with privacy-preserving to secure data exchanged via wireless communication, cope with unauthorized entities and ensure data integrity. Moreover, we develop a trust model based on the Dempster-Shafer theory to check the trustworthiness of data collected by smart devices/sensor nodes. Security analysis performed on our scheme demonstrates that it can withstand different well-known attacks in the IIoT environment. We also analyzed the validity of our scheme by using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Additionally, the performance evaluation and experimental results prove the effectiveness of the proposed scheme compared to the existing works in terms of accuracy, delay, trust, and throughput.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | 5G; Authentication; Cloud Computing; IIoT; Privacy; Trust |
Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 24 May 2022 16:11 |
Last Modified: | 30 Oct 2024 20:52 |
URI: | http://repository.essex.ac.uk/id/eprint/32841 |
Available files
Filename: ALL_TII-21-4836.pdf