Secure authentication and privacy-preserving blockchain for industrial internet of things

被引:5
|
作者
Sharma, Prakash Chandra [1 ]
Mahmood, Md Rashid [2 ]
Raja, Hiral [3 ]
Yadav, Narendra Singh [1 ]
Gupta, Brij B. [4 ,5 ,7 ,8 ,9 ,12 ]
Arya, Varsha [6 ,10 ,11 ]
机构
[1] Manipal Univ Jaipur, Dept Informat Technol, Jaipur, Rajasthan, India
[2] Guru Nanak Inst Tech Campus, Dept Elect & Commun Engn, Hyderabad, Telangana, India
[3] Dr CV Raman Univ, Dept Math, Bilaspur, Cg, India
[4] Asia Univ, Int Ctr AI & Cyber Secur Res & Innovat, Taichung 413, Taiwan
[5] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[6] Asia Univ, Taichung, Taiwan
[7] Skyline Univ Coll, Sch Informat Technol, Sharjah, U Arab Emirates
[8] Symbiosis Int Univ, Symbiosis Ctr Informat Technol SCIT, Pune, Maharashtra, India
[9] Univ Petr & Energy Studies UPES, Ctr Interdisciplinary Res, Dehra Dun, Uttarakhand, India
[10] Chandigarh Univ, Chandigarh, India
[11] King Abdulaziz Univ, Immers Virtual Real Res Grp, Jeddah 21589, Saudi Arabia
[12] Lebanese Amer Univ, Beirut 1102, Lebanon
关键词
Security; Industrial internet of things; Elliptic curve cryptographycipolla's extended; euclidean algorithm based lattice cryptosystem; Homomorphic encryption neural network; Blockchain; CONSENSUS; SYSTEMS; NETWORK; IOT;
D O I
10.1016/j.compeleceng.2023.108703
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain (BC) technology has overtaken Industrial Internet of Things (IIoT) platforms. It is necessary to explore efficient implementation. Fault tolerance, decentralised control, authenti-cation, cryptographic security, immutability, data integrity, and BC smart contracts are recom-mended IIoT features. If entities are authenticated and trusted, the internet can be used for industrial activities. Despite several methods, communication is insecure due to scalability, dependability, latency, insufficient transmission security, and uneven data loads. The paper created safe User authentication and optimal BC node selection using AFHENN (Fully Homo-morphic encryption neural network) for IIoT to solve the problem. Mutual authentication, se-crecy, and integrity protect user data. A registration process secures new User authentication. To protect registered data, it uses cryptographic methods like Transient key congruential generator based Elliptic curve cryptography (TKCG-ECC) and Dual keyed Cipolla's Extended Euclidean Algorithm based lattice cryptosystem (DKCEED-LC). To access BCN, the gateway verifies regis-tered users utilising keyed-based Zero Knowledge of Proof (k-ZKP) and Approximation Fully Homomorphic encryption neural network-based Blockchain. Finally, Approximation Fully Ho-momorphic encryption neural network-based Blockchain networking authenticates data (AFHENN-BCN). The BCN avoids legal selection of miner nodes and harmful activities. Compared to top techniques, the proposed work achieves improved throughput and PDR (Packet Delivery Ratio) values with minimal computing time and strong security.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
    Diksha Rangwani
    Dipanwita Sadhukhan
    Sangram Ray
    Muhammad Khurram Khan
    Mou Dasgupta
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 1548 - 1571
  • [2] A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
    Rangwani, Diksha
    Sadhukhan, Dipanwita
    Ray, Sangram
    Khan, Muhammad Khurram
    Dasgupta, Mou
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1548 - 1571
  • [3] Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications
    Das, Manik Lal
    Kumar, Pardeep
    Martin, Andrew
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 110 (01) : 339 - 353
  • [4] Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications
    Manik Lal Das
    Pardeep Kumar
    Andrew Martin
    [J]. Wireless Personal Communications, 2020, 110 : 339 - 353
  • [5] Privacy-Preserving Redactable Blockchain for Internet of Things
    Ren, Yanli
    Cai, Xianji
    Hu, Mingqi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [6] Privacy-Preserving Delegable Authentication in the Internet of Things
    Gritti, Clementine
    Onen, Melek
    Molva, Refik
    [J]. SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 861 - 869
  • [7] Blockchain Enabled Anonymous Privacy-Preserving Authentication Scheme for Internet of Health Things
    Rajasekaran, Arun Sekar
    Maria, Azees
    Rajagopal, Maheswar
    Lorincz, Josip
    [J]. SENSORS, 2023, 23 (01)
  • [8] Physically secure and privacy-preserving blockchain enabled authentication scheme for internet of drones
    Subramani, Jegadeesan
    Maria, Azees
    Rajasekaran, Arun Sekar
    Lloret, Jaime
    [J]. SECURITY AND PRIVACY, 2024, 7 (03):
  • [9] Privacy-preserving solutions in the Industrial Internet of Things
    Drosatos, George
    Rantos, Konstantinos
    Karampatzakis, Dimitris
    Lagkas, Thomas
    Sarigiannidis, Panagiotis
    [J]. 16TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2020), 2020, : 219 - 226
  • [10] A blockchain-enabled privacy-preserving authentication management protocol for Internet of Medical Things
    Miao, Junfeng
    Wang, Zhaoshun
    Wu, Zeqing
    Ning, Xin
    Tiwari, Prayag
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 237