User authentication of industrial internet of things (IIoT) through Blockchain

被引:4
|
作者
Devi, Anju [1 ]
Kumar, Amit [1 ]
Rathee, Geetanjali [2 ]
Saini, Hemraj [3 ]
机构
[1] Jaypee Univ Informat Technol, Dept Comp Sci & Engn, Waknaghat, Solan 173234, Himachal Prades, India
[2] Netaji Subhas Univ Technol, Dept Comp Sci & Engn, Dwarka Sect, 3, New Delhi, India
[3] DIT Univ, Sch Comp, Dehra Dun 248009, India
关键词
User authentication scheme; Ethereum blockchain; IPFS; Blockchain security; Authentication mechanism; ENHANCING SECURITY; PRIVACY;
D O I
10.1007/s11042-022-14154-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Industrial IoT is starting an enormous advancement occasion in the industrial epoch. Data security as well as privacy becomes a challenge in almost every field in the real life for the duration of monitoring and collection of data in Industrial Internet of Things (IIoT) applications. The security and privacy of data in IIoT depends on the user's reliability that can be obtained by using the user authentication scheme otherwise unable to secure the IIoT applications data. Many authors have proposed the user authentication schemes in industrial internet of things who suffer from some hindrances such as data security, throughput, single point of failure, storage problem and latency (due to which increases the eavesdropping attacks chances). Therefore, to eliminate the above security issues, this paper proposes a new hybrid authentication approach instead of that also increases the throughput of IIoT applications, reduces the latency as well as enhances the accuracy of IIoT users. To create smart contracts of user authentication approaches by using the PKI and ECC algorithms, whereas it helps to achieve the privacy preservation. Instead of that, ECC that constructs the trustworthy user authentication blockchain scheme which enhance the privacy further as well as helps to maintain the number of keys along, every time keys are updated continuously. Moreover, we implement the proposed approach on the Ethereum blockchain and put all the data through smart contract on the decentralized IPFS cloud server which is transparent, secure, traceable, and storage utilization. Only authenticated users can interface with IIoT applications, even if someone tries to corrupt them, and then revoke the digital certificate from the user. It will be known from the performance of this paper that the proposed approach not only provides the privacy of the users but also obtains the high authentication accuracy, throughput and reduces the latency in comparison of existing approach.
引用
收藏
页码:19021 / 19039
页数:19
相关论文
共 50 条
  • [11] User Authentication for the Internet of Things
    Stajano, Frank
    Lomas, Mark
    [J]. SECURITY PROTOCOLS XXVI, 2018, 11286 : 209 - 213
  • [12] Industry 4.0: Industrial Internet of Things (IIOT)
    Munirathinam, Sathyan
    [J]. DIGITAL TWIN PARADIGM FOR SMARTER SYSTEMS AND ENVIRONMENTS: THE INDUSTRY USE CASES, 2020, 117 : 129 - 164
  • [13] Network Optimization for Industrial Internet of Things (IIoT)
    Khalil, Ruhul Amin
    Saeed, Nasir
    [J]. IEEE SENSORS LETTERS, 2020, 4 (07)
  • [14] The industrial internet of things (IIoT): An analysis framework
    Boyes, Hugh
    Hallaq, Bit
    Cunningham, Joe
    Watson, Tim
    [J]. COMPUTERS IN INDUSTRY, 2018, 101 : 1 - 12
  • [15] CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things
    Tanveer, Muhammad
    Badshah, Akhtar
    Khan, Abd Ullah
    Alasmary, Hisham
    Chaudhry, Shehzad Ashraf
    [J]. INTERNET OF THINGS, 2023, 23
  • [16] Traffic Modeling for Industrial Internet of Things (IIoT) Networks
    Glabowski, Mariusz
    Hanczewski, Slawomir
    Stasiak, Maciej
    Weissenberg, Michal
    Zwierzykowski, Piotr
    Bai, Vito
    [J]. IMAGE PROCESSING AND COMMUNICATIONS: TECHNIQUES, ALGORITHMS AND APPLICATIONS, 2020, 1062 : 264 - 271
  • [17] Architecture and Implementation of Industrial Internet of Things (IIoT) Gateway
    Zhang, Yinfen
    Sun, Wenfeng
    Shi, Yuntao
    [J]. PROCEEDINGS OF 2020 IEEE 2ND INTERNATIONAL CONFERENCE ON CIVIL AVIATION SAFETY AND INFORMATION TECHNOLOGY (ICCASIT), 2020, : 114 - 120
  • [18] An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)
    Demertzi, Vasiliki
    Demertzis, Stavros
    Demertzis, Konstantinos
    [J]. ALGORITHMS, 2023, 16 (08)
  • [19] Lightweight Cryptography in IIoT the Internet of Things in the Industrial Field
    Eterovic, Jorge
    Cipriano, Marcelo
    Garcia, Edith
    Torres, Luis
    [J]. COMPUTER SCIENCE - CACIC 2019, 2020, 1184 : 335 - 353
  • [20] Customer expectation from Industrial Internet of Things (IIOT)
    Seetharaman, A.
    Patwa, Nitin
    Saravanan, A. S.
    Sharma, Abhishek
    [J]. JOURNAL OF MANUFACTURING TECHNOLOGY MANAGEMENT, 2019, 30 (08) : 1161 - 1178