Abstract

One of the most critical and key issues in the field of the Industrial Internet of Things security is the authentication. The main aim of this paper is to identify possible methods of solving authentication issues. The relevance of the research is confirmed by the “Information Security Doctrine of the Russian Federation” and emerging risks caused by information and technical impact on industrial facilities in the current geopolitical environment. Based on the presented literature review, the architecture of the industrial Internet of things, options for protecting authentication protocols from known attacks, as well as options for protection using blockchain technology are presented. When analyzing network models, it was revealed that information protection options do not depend on the model itself, but depend on the architectural level at which the protection of a particular model is built. The paper discusses the advantages and disadvantages of various protection options that should be considered during its implementation. The obtained results can be used to select a method for protecting the authentication protocol when building an information system in the field of the Internet of things.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call