Abstract

The IoT has gained significant recognition from research and industrial communities over the last decade. The concept of Industrial IoT (IIoT) has emerged to improve industrial processes and reduce downtime or breach in secure communication. If automated, industrial applications can make the implementation process more convenient, it also helps increase productivity, but an external attacker may cause distortion to the process, which could cause much damage. Thus, a trust management technique is proposed for securing IIoT. The transition of the Internet to IoT and for industrial applications to IIoT leads to numerous changes in the communication processes. This transition was initiated by wireless sensor networks that have unattended wireless topologies and were comprised due to the nature of their resource-constrained nodes. In order to protect the sensitivity of transmitted information, the security protocol uses the Datagram Transport Layer Security (DTLS) mandated by Secure Constrained Application Protocol (CoAP). However, DTLS was designed for powerful devices and needed strong support for industrial applications connected through high-bandwidth links. In the proposed trust management system, machine learning algorithms are used with an elastic slide window to handle bigger data and reduce the strain of massive communication. The proposed method detected on and off attacks on nodes, malicious nodes, healthy nodes, and broken nodes. This identification is necessary to check if a particular node could be trusted or not. The proposed technique successfully predicted 97% of nodes' behavior faster than other machine learning algorithms.

Highlights

  • Humans have been analyzing their surrounding physical environment for a thousand years, including identifying additional vital elements for maintaining the balance like measuring temperature, distance, and time

  • This research's proposed trust management method is expected to detect On and Off attacks in Industrial Internet of Things (IoT) (IIoT) with 97.1% precision tested on a real-time dataset

  • The reasons behind choosing the proposed method were: (1) to establish secure communication with resources limitation presence in IIoT, (2) to enhance the defenseless Datagram Transport Layer Security (DTLS) protocol against DoS attacks to gain the advantage of lightweight transmission with low power consumption

Read more

Summary

Introduction

Humans have been analyzing their surrounding physical environment for a thousand years, including identifying additional vital elements for maintaining the balance like measuring temperature, distance, and time. Rudimentary methods were focused on using references like sun's position and body part sizes. The measurement units were standardized over time, the first-ever mechanical unit to offer exact physical measures appeared and were named sensors. With the electronic revolution in the silicon age, the method has been more precise for calculating and labeled as electronic sensors. The research was initiated by Silverstein and was known as Sound Surveillance System. It was an intelligence-based project launched for detecting Soviet Submarines in the Pacific and Atlantic Oceans [2]

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call