Secure authentication and privacy-preserving blockchain for industrial internet of things

被引:5
|
作者
Sharma, Prakash Chandra [1 ]
Mahmood, Md Rashid [2 ]
Raja, Hiral [3 ]
Yadav, Narendra Singh [1 ]
Gupta, Brij B. [4 ,5 ,7 ,8 ,9 ,12 ]
Arya, Varsha [6 ,10 ,11 ]
机构
[1] Manipal Univ Jaipur, Dept Informat Technol, Jaipur, Rajasthan, India
[2] Guru Nanak Inst Tech Campus, Dept Elect & Commun Engn, Hyderabad, Telangana, India
[3] Dr CV Raman Univ, Dept Math, Bilaspur, Cg, India
[4] Asia Univ, Int Ctr AI & Cyber Secur Res & Innovat, Taichung 413, Taiwan
[5] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[6] Asia Univ, Taichung, Taiwan
[7] Skyline Univ Coll, Sch Informat Technol, Sharjah, U Arab Emirates
[8] Symbiosis Int Univ, Symbiosis Ctr Informat Technol SCIT, Pune, Maharashtra, India
[9] Univ Petr & Energy Studies UPES, Ctr Interdisciplinary Res, Dehra Dun, Uttarakhand, India
[10] Chandigarh Univ, Chandigarh, India
[11] King Abdulaziz Univ, Immers Virtual Real Res Grp, Jeddah 21589, Saudi Arabia
[12] Lebanese Amer Univ, Beirut 1102, Lebanon
关键词
Security; Industrial internet of things; Elliptic curve cryptographycipolla's extended; euclidean algorithm based lattice cryptosystem; Homomorphic encryption neural network; Blockchain; CONSENSUS; SYSTEMS; NETWORK; IOT;
D O I
10.1016/j.compeleceng.2023.108703
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain (BC) technology has overtaken Industrial Internet of Things (IIoT) platforms. It is necessary to explore efficient implementation. Fault tolerance, decentralised control, authenti-cation, cryptographic security, immutability, data integrity, and BC smart contracts are recom-mended IIoT features. If entities are authenticated and trusted, the internet can be used for industrial activities. Despite several methods, communication is insecure due to scalability, dependability, latency, insufficient transmission security, and uneven data loads. The paper created safe User authentication and optimal BC node selection using AFHENN (Fully Homo-morphic encryption neural network) for IIoT to solve the problem. Mutual authentication, se-crecy, and integrity protect user data. A registration process secures new User authentication. To protect registered data, it uses cryptographic methods like Transient key congruential generator based Elliptic curve cryptography (TKCG-ECC) and Dual keyed Cipolla's Extended Euclidean Algorithm based lattice cryptosystem (DKCEED-LC). To access BCN, the gateway verifies regis-tered users utilising keyed-based Zero Knowledge of Proof (k-ZKP) and Approximation Fully Homomorphic encryption neural network-based Blockchain. Finally, Approximation Fully Ho-momorphic encryption neural network-based Blockchain networking authenticates data (AFHENN-BCN). The BCN avoids legal selection of miner nodes and harmful activities. Compared to top techniques, the proposed work achieves improved throughput and PDR (Packet Delivery Ratio) values with minimal computing time and strong security.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] PAutoBotCatcher: A blockchain-based privacy-preserving botnet detector for Internet of Things
    Lekssays, Ahmed
    Landa, Luca
    Carminati, Barbara
    Ferrari, Elena
    [J]. COMPUTER NETWORKS, 2021, 200 (200)
  • [32] Privacy-Preserving Implicit Authentication Protocol Using Cosine Similarity for Internet of Things
    Wei, Fushan
    Vijayakumar, Pandi
    Kumar, Neeraj
    Zhang, Ruijie
    Cheng, Qingfeng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) : 5599 - 5606
  • [33] SecureMed: A Blockchain-Based Privacy-Preserving Framework for Internet of Medical Things
    Rafique, Wajid
    Khan, Maqbool
    Khan, Salabat
    Ally, Juma Said
    [J]. Wireless Communications and Mobile Computing, 2023, 2023
  • [34] Ibn Sina: A patient privacy-preserving authentication protocol in medical internet of things
    Rasslan, Mohamed
    Nasreldin, Mahmoud M.
    Aslan, Heba K.
    [J]. COMPUTERS & SECURITY, 2022, 119
  • [35] A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion
    Ding, Wenxiu
    Jing, Xuyang
    Yan, Zheng
    Yang, Laurence T.
    [J]. INFORMATION FUSION, 2019, 51 : 129 - 144
  • [36] A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain
    Gao, Sheng
    Su, Qianqian
    Zhang, Rui
    Zhu, Jianming
    Sui, Zhiyuan
    Wang, Junsheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [37] Efficient Privacy-Preserving Authentication using Blockchain for VANET
    Pariyarath, Akhil
    Tomar, Shubham
    Tripathi, Meenakshi
    [J]. 2023 15TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS, COMSNETS, 2023,
  • [38] Privacy-preserving authentication and authorization in networks using blockchain
    Sanap, Asha
    Malwade, Sulakshana Sagar
    Bhosale, Rohini
    Karandikar, Aarti
    Bakare, Anuradha A.
    Langote, Vaishali
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 903 - 914
  • [39] BPA: A Novel Blockchain-Based Privacy-Preserving Authentication Scheme for the Internet of Vehicles
    Li, Jie
    Lin, Yuanyuan
    Li, Yibing
    Zhuang, Yan
    Cao, Yangjie
    [J]. ELECTRONICS, 2024, 13 (10)
  • [40] Privacy-Preserving Channel Access for Internet of Things
    Banerjee, Debasmit
    Dong, Bo
    Taghizadeh, Mahmoud
    Biswas, Subir
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05): : 430 - 445