End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things

被引:0
|
作者
Dildar, Muhammad Shahid [1 ,2 ]
Khan, Adnan Shahid [1 ]
Abbasi, Irshad Ahmed [3 ]
Akhtar, Reema Shaheen Naseem [1 ,4 ]
Al Ruqaishi, Khalil [5 ]
Sarwar, Shakeel Ahmed Ghulam [4 ]
机构
[1] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Kota Samarahan 94300, Malaysia
[2] King Khalid Univ, Coll Business, Dept Business Informat, Abha 61421, Saudi Arabia
[3] Univ Bisha, Coll Comp & Informat Technol, Bisha 67714, Saudi Arabia
[4] Jazan Univ, Dept eLearning Ctr ELC, Jazan 45142, Saudi Arabia
[5] Univ Nizwa, Dept Math & Phys Sci, Nizwa 616, Oman
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Industrial Internet of Things; Security; Blockchains; Performance evaluation; Scalability; Computer architecture; Computational modeling; Authentication; Real-time systems; Manufacturing; Internet of Things; blockchain; privacy; security; lightweight clients; DEVICE;
D O I
10.1109/ACCESS.2025.3535821
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The urgent penetration of the Industrial Internet of Things (IIoT) in industrial sectors has fostered unmatched benefits in terms of efficiency, productivity, and overall performance. Although current security frameworks already offer a sound level of protection, they do not adequately scale to the growing diversity and number of devices integrated into the Industrial Internet of Things. They rely on static, centralized network organization and management, which cannot ensure data integrity across a huge number of highly distributed devices. The proposed research provides insight into an innovative end-to-end security solution model, which caters to the needs of IIoT via the introduction of the blockchain. The current security solutions seem to fail in terms of security, scalability, data efficiency, integrity, and the actual needs of IIoT. As a result, the top chance of a cyberattack or similar threat remains high. The proposed work demonstrates that IIoTs may benefit from blockchain frameworks because blockchains reuse existing security mechanisms, enable transaction validation without central trust, and implement appropriate authorization. Additionally, the IIoT environment can benefit from implementing security frameworks that reflect their characteristics. In this paper, an overall solution that employed the decentralized setup of blockchain was proposed for authentication, authorization, and data integrity for all devices. Our approach is free from the need for any central authority. That mechanism is based on smart contracts that enforce security policies. Our framework allows for the switching of any access rule at any time, as well as it can immediately react to some suspicious behavior. In our paper, we proposed some lightweight cryptographic schemes, and Data management overhead which could fit any device. Moreover, our algorithm for the blockchain implementation is hybrid because this approach incorporates all the best features of the private and public implementation due to the individual blocks containing feasible information rather than the entire history.
引用
收藏
页码:20584 / 20598
页数:15
相关论文
共 50 条
  • [31] Layered Fault Management Scheme for End-to-end Transmission in Internet of Things
    Li Xi
    Ji Hong
    Li Yi
    2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2011, : 1021 - 1025
  • [32] A note on tools and techniques for end-to-end QoS monitoring in Internet of Things
    Ranjan, Rajiv
    Solaiman, Ellis
    Villari, Massimo
    Watson, Paul
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 132 : 160 - 163
  • [33] Layered Fault Management Scheme for End-to-end Transmission in Internet of Things
    Li, Xi
    Ji, Hong
    Li, Yi
    MOBILE NETWORKS & APPLICATIONS, 2013, 18 (02): : 195 - 205
  • [34] Layered Fault Management Scheme for End-to-end Transmission in Internet of Things
    Xi Li
    Hong Ji
    Yi Li
    Mobile Networks and Applications, 2013, 18 : 195 - 205
  • [35] Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things
    Coroller, Stevan
    Chabridon, Sophie
    Laurent, Maryline
    Conan, Denis
    Leneutre, Jean
    PROCEEDINGS OF THE 2018 WORKSHOP ON MIDDLEWARE AND APPLICATIONS FOR THE INTERNET OF THINGS (M4IOT '18), 2018, : 35 - 40
  • [36] End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
    Gao, Yansong
    Kim, Minki
    Abuadbba, Sharif
    Kim, Yeonjae
    Thapa, Chandra
    Kim, Kyuyeon
    Camtep, Seyit A.
    Kim, Hyoungshick
    Nepal, Surya
    2020 INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2020), 2020, : 91 - 100
  • [37] Security Model for Internet of Things end devices
    Rajashree, S.
    Shah, Pritam Gajkumar
    Murali, S.
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 219 - 221
  • [38] Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions
    Sharma, Mehul
    Pant, Shrid
    Kumar Sharma, Deepak
    Datta Gupta, Koyel
    Vashishth, Vidushi
    Chhabra, Anshuman
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (07)
  • [39] Sizzle: A standards based end-to-end security architecture for the embedded Internet
    Gupta, V
    Millard, M
    Fung, S
    Zhu, Y
    Gura, N
    Eberle, H
    Shantz, SC
    Third IEEE International Conference on Pervasive Computing and Communications, Proceedings, 2005, : 247 - 256
  • [40] On the effectiveness of end-to-end security for Internet-integrated sensing applications
    Granjal, Jorge
    Monteiro, Edmundo
    Silva, Jorge Sa
    2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 87 - 93