End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things

被引:0
|
作者
Dildar, Muhammad Shahid [1 ,2 ]
Khan, Adnan Shahid [1 ]
Abbasi, Irshad Ahmed [3 ]
Akhtar, Reema Shaheen Naseem [1 ,4 ]
Al Ruqaishi, Khalil [5 ]
Sarwar, Shakeel Ahmed Ghulam [4 ]
机构
[1] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Kota Samarahan 94300, Malaysia
[2] King Khalid Univ, Coll Business, Dept Business Informat, Abha 61421, Saudi Arabia
[3] Univ Bisha, Coll Comp & Informat Technol, Bisha 67714, Saudi Arabia
[4] Jazan Univ, Dept eLearning Ctr ELC, Jazan 45142, Saudi Arabia
[5] Univ Nizwa, Dept Math & Phys Sci, Nizwa 616, Oman
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Industrial Internet of Things; Security; Blockchains; Performance evaluation; Scalability; Computer architecture; Computational modeling; Authentication; Real-time systems; Manufacturing; Internet of Things; blockchain; privacy; security; lightweight clients; DEVICE;
D O I
10.1109/ACCESS.2025.3535821
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The urgent penetration of the Industrial Internet of Things (IIoT) in industrial sectors has fostered unmatched benefits in terms of efficiency, productivity, and overall performance. Although current security frameworks already offer a sound level of protection, they do not adequately scale to the growing diversity and number of devices integrated into the Industrial Internet of Things. They rely on static, centralized network organization and management, which cannot ensure data integrity across a huge number of highly distributed devices. The proposed research provides insight into an innovative end-to-end security solution model, which caters to the needs of IIoT via the introduction of the blockchain. The current security solutions seem to fail in terms of security, scalability, data efficiency, integrity, and the actual needs of IIoT. As a result, the top chance of a cyberattack or similar threat remains high. The proposed work demonstrates that IIoTs may benefit from blockchain frameworks because blockchains reuse existing security mechanisms, enable transaction validation without central trust, and implement appropriate authorization. Additionally, the IIoT environment can benefit from implementing security frameworks that reflect their characteristics. In this paper, an overall solution that employed the decentralized setup of blockchain was proposed for authentication, authorization, and data integrity for all devices. Our approach is free from the need for any central authority. That mechanism is based on smart contracts that enforce security policies. Our framework allows for the switching of any access rule at any time, as well as it can immediately react to some suspicious behavior. In our paper, we proposed some lightweight cryptographic schemes, and Data management overhead which could fit any device. Moreover, our algorithm for the blockchain implementation is hybrid because this approach incorporates all the best features of the private and public implementation due to the individual blocks containing feasible information rather than the entire history.
引用
收藏
页码:20584 / 20598
页数:15
相关论文
共 50 条
  • [1] Internet of Things: An End-to-End Security Layer
    Behrens, Reinhard
    Ahmed, Ali
    PROCEEDINGS OF THE 2017 20TH CONFERENCE ON INNOVATIONS IN CLOUDS, INTERNET AND NETWORKS (ICIN), 2017, : 146 - 149
  • [2] A Novel Edge Security Gateway for End-to-End Protection in Industrial Internet of Things
    Khan, Rafiullah
    McLaughlin, Kieran
    Kang, BooJoong
    Laverty, David
    Sezer, Sakir
    2021 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2021,
  • [3] BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things
    Peretti, Giulio
    Lakkundi, Vishwas
    Zorzi, Michele
    2015 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS IEEE COMSNETS 2015, 2015,
  • [4] End-to-End Trust and Security for Internet of Things Applications
    Bhattarai, Sulabh
    Wang, Yong
    COMPUTER, 2018, 51 (04) : 20 - 27
  • [5] Tailoring End-to-End IP Security Protocols to the Internet of Things
    Hummen, Rene
    Wirtz, Hanno
    Ziegeldorf, Jan Henrik
    Hiller, Jens
    Wehrle, Klaus
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [6] Performance Evaluation of end-to-end security protocols in an Internet of Things
    De Rubertis, Antonio
    Mainetti, Luca
    Mighali, Vincenzo
    Patrono, Luigi
    Sergi, Ilaria
    Stefanizzi, Maria Laura
    Pascali, Stefano
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 94 - 99
  • [7] Standards-based End-to-End IP Security for the Internet of Things
    Hummen, Rene
    Wehrle, Klaus
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [8] End-to-End Transport Security in the IP-based Internet of Things
    Brachmann, Martina
    Keoh, Sye Loong
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [9] End-to-end security scheme for mobility enabled healthcare Internet of Things
    Moosavi, Sanaz Rahimi
    Tuan Nguyen Gia
    Nigussie, Ethiopia
    Rahmani, Amir M.
    Virtanen, Seppo
    Tenhunen, Hannu
    Isoaho, Jouni
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 64 : 108 - 124
  • [10] Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things
    Sahraoui, Somia
    Bilami, Azeddine
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, MISC 2016, 2016, : 249 - 260