Abstract

The Industrial Internet of Things (IIoT) is a technology that uses the Internet of Things (IoT) infrastructure to sense, process, and communicate real-time events in the industrial system to cut down on unnecessary operating costs and to speed up industrial automation of internal and external working processes. Since the IIoT system inherits the same cyber-physical vulnerabilities that the IoT system already encounters, it requires additional work to address security concerns owing to its heterogeneous nature. As a result, an efficient security mechanism is essential to protect against various and unknown cyber-attacks. In this article, we propose a certificate-based signature scheme based on hyperelliptic curve cryptography (HECC), with the aim of improving security while reducing computational and communication costs in the IIoT environment. The proposed scheme outperforms existing schemes in terms of both computational and communication costs, as well as offering better security.

Highlights

  • We propose a certificate-based signature scheme based on hyperelliptic curve cryptography (HECC), with the aim of improving security while reducing computational and communication costs in the IIoT environment. e proposed scheme outperforms existing schemes in terms of both computational and communication costs, as well as offering better security

  • It does have severe flaws in terms of certificate management and revocations. en, when a trusted agent (TA) or organization receives the participant identification, identity-based environment (IBE) removes certificate management and revocation concerns, and a trusted agent (TA) or organization creates the private key for participating devices. e secret key was provided with participants through a dedicated link by TA

  • If TA so desires, it will provide the opponent with the private key, so that he or she may generate a real signature of the participants. e certificateless environment (CE) resolves the issue of participant signature forgery in IBE by eliminating the process of private key generation from the TA and having the TA produce the partial private key (PPK) for the participating users, which is shared with participants via a dedicated link

Read more

Summary

Research Article

E Industrial Internet of ings (IIoT) is a technology that uses the Internet of ings (IoT) infrastructure to sense, process, and communicate real-time events in the industrial system to cut down on unnecessary operating costs and to speed up industrial automation of internal and external working processes. 1. Introduction e term “Industrial Internet of ings” (IIoT) refers to the use of Internet of ings (IoT) devices and infrastructure to collect and communicate real-time events in industrial systems in order to reduce human efforts and operational costs while improving manufacturing and industrial processes [1]. 5G mobile networks support a cutting-edge technology known as cloud computing [5], which ensures the storage, processing, analysis, and exchange of data generated by IIoT devices.

Wireless Communications and Mobile Computing
Findings
It is the selected security parameter from hyperelliptic curve n
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call