Abstract

Internet of Things (IoT), which is a growing domain, provides a universal connection to the Internet by spinning common objects to connected ones by changing the way people communicate and interact with the things around them. This type of setup paves the way for the creation of interconnected infrastructure to support innovative services that ensure improved efficiency and flexibility. Such benefits are attractive for user applications and industrial domain. The entry of the IoT domain into the industrial market, also termed as Industrial Internet of Things (IIoT), was recently observed. However, security threats are increasing daily with the prevalent use of IIoT technology. An efficient security solution that can help in the prevention of malicious attacks is researched despite the existence of multiple security solutions. The current study will help the research community to understand the security flaws and causes by classifying and comparing the different certificateless signature schemes of IIoT domain. This survey aims to provide a comparative analysis of the available solutions to improve security. The multi-criteria decision-making approach is utilized for the comparative analysis of the existing certificateless signature schemes by employing the EDAS technique to evaluate the previously suggested solution proposed for IIoT. The authors believe that this technique has never been previously used for any cryptographic solutions. In addition, the study addresses some of the public research issues for technologists, academia, and researchers to develop the security aspects of IIoT.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call