End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things

被引:0
|
作者
Dildar, Muhammad Shahid [1 ,2 ]
Khan, Adnan Shahid [1 ]
Abbasi, Irshad Ahmed [3 ]
Akhtar, Reema Shaheen Naseem [1 ,4 ]
Al Ruqaishi, Khalil [5 ]
Sarwar, Shakeel Ahmed Ghulam [4 ]
机构
[1] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Kota Samarahan 94300, Malaysia
[2] King Khalid Univ, Coll Business, Dept Business Informat, Abha 61421, Saudi Arabia
[3] Univ Bisha, Coll Comp & Informat Technol, Bisha 67714, Saudi Arabia
[4] Jazan Univ, Dept eLearning Ctr ELC, Jazan 45142, Saudi Arabia
[5] Univ Nizwa, Dept Math & Phys Sci, Nizwa 616, Oman
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Industrial Internet of Things; Security; Blockchains; Performance evaluation; Scalability; Computer architecture; Computational modeling; Authentication; Real-time systems; Manufacturing; Internet of Things; blockchain; privacy; security; lightweight clients; DEVICE;
D O I
10.1109/ACCESS.2025.3535821
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The urgent penetration of the Industrial Internet of Things (IIoT) in industrial sectors has fostered unmatched benefits in terms of efficiency, productivity, and overall performance. Although current security frameworks already offer a sound level of protection, they do not adequately scale to the growing diversity and number of devices integrated into the Industrial Internet of Things. They rely on static, centralized network organization and management, which cannot ensure data integrity across a huge number of highly distributed devices. The proposed research provides insight into an innovative end-to-end security solution model, which caters to the needs of IIoT via the introduction of the blockchain. The current security solutions seem to fail in terms of security, scalability, data efficiency, integrity, and the actual needs of IIoT. As a result, the top chance of a cyberattack or similar threat remains high. The proposed work demonstrates that IIoTs may benefit from blockchain frameworks because blockchains reuse existing security mechanisms, enable transaction validation without central trust, and implement appropriate authorization. Additionally, the IIoT environment can benefit from implementing security frameworks that reflect their characteristics. In this paper, an overall solution that employed the decentralized setup of blockchain was proposed for authentication, authorization, and data integrity for all devices. Our approach is free from the need for any central authority. That mechanism is based on smart contracts that enforce security policies. Our framework allows for the switching of any access rule at any time, as well as it can immediately react to some suspicious behavior. In our paper, we proposed some lightweight cryptographic schemes, and Data management overhead which could fit any device. Moreover, our algorithm for the blockchain implementation is hybrid because this approach incorporates all the best features of the private and public implementation due to the individual blocks containing feasible information rather than the entire history.
引用
收藏
页码:20584 / 20598
页数:15
相关论文
共 50 条
  • [41] An efficient end-to-end security mechanism for IP multimedia subsystem
    Chen, Chi-Yuan
    Wu, Tin-Yu
    Huang, Yueh-Min
    Chao, Han-Chieh
    COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4259 - 4268
  • [42] Proxy-based End-to-End Key Establishment Protocol for the Internet of Things
    Porambage, Pawani
    Braeken, An
    Kumar, Pardeep
    Gurtov, Andrei
    Ylianttila, Mika
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2677 - 2682
  • [43] Cooperation and end-to-end in the Internet
    Kantola, Raimo
    Kabir, Hammad
    Loiseau, Patrick
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (12)
  • [44] End-to-End Security for the IoT
    Dooley, James
    INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [45] Lightweight Internet of Things Device Authentication, Encryption, and Key Distribution Using End-to-End Neural Cryptosystems
    Sun, Yingnan
    Lo, Frank P-W
    Lo, Benny
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16): : 14978 - 14987
  • [46] END-TO-END SECURITY PROTECTION
    Nazaryan, Levon
    Panaousis, Emmanouil A.
    Politis, Christos
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2010, 5 (01): : 85 - 90
  • [47] Packet Key-Based End-to-End Security Management on a Blockchain Control Plane
    Jung, Younchan
    Peradilla, Marnel
    Agulto, Ronnel
    SENSORS, 2019, 19 (10):
  • [48] Sizzle: A standards-based end-to-end security architecture for the embedded Internet
    Gupta, Vipul
    Wurm, Michael
    Zhu, Yu
    Millard, Matthew
    Fung, Stephen
    Gura, Nils
    Eberle, Hans
    Shantz, Sheueling Chang
    PERVASIVE AND MOBILE COMPUTING, 2005, 1 (04) : 425 - 445
  • [49] An End-to-End Trainable Feature Selection-Forecasting Architecture Targeted at the Internet of Things
    Nakip, Mert
    Karakayali, Kubilay
    Guzelis, Cuneyt
    Rodoplu, Volkan
    IEEE ACCESS, 2021, 9 : 104011 - 104028
  • [50] SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things
    Raza, Shahid
    Helgason, Tomas
    Papadimitratos, Panos
    Voigt, Thiemo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 77 : 40 - 51