Abstract
Peer-to-Peer (P2P) networks are prominent in the Internet-of-things-assisted industrial environments for distributed computing and smart control systems. The problem arises with the independence and peer systems security due to anonymous access and security measures. In this paper, an innovative control-driven autonomous authentication scheme is proposed for improving the access security of P2P industrial systems. The proposed scheme provides authentication based on P2P system control requirements within its access time. The P2P control systems and their functionalities are provided with classified security measures for administering autonomous security. The advantage of offering autonomous protection is to prevent the sequence of security breaches and control sabotage. In this process, the control system requirements and authentications are paired by identifying the machines' operating time and access time. For identification and grouping-based classification, support vector machines are used. It learns the sabotage and control requirements based on access and control time for providing a rupture-less industrial process. It helps to leverage the detection of autonomous adversaries in P2P industrial control systems. Besides, a less complex and latent-free security measure is achievable using the proposed scheme.
Similar content being viewed by others
References
AA AlZubi, A Alarifi, M Al-Maitah, O Alheyasat (2020) Multi-sensor information fusion for Internet of Things assisted automated guided vehicles in smart city. Sustain Cities Soc, online version, pp 102539.
Abuhasel KA, Khan MA (2020) A secure industrial internet of things (IIoT) framework for resource management in smart manufacturing. IEEE Access 8:117354–117364
Ahmad Ali AlZubi (2019) Location assisted delay-less service discovery method for IoT environments. Comput Commun 150:405–412
Al-Maitah M, AlZubi AA, Alarifi A (2019) An optimal storage utilization technique for IoT devices using sequential machine learning. Comput Netw 152:98–105
Al-Turjman F, Alturjman S (2018) Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans Industr Inf 14(6):2736–2744
AlZubi AA, Al-Maitah M, Alarifi A (2019) A best-fit routing algorithm for non-redundant communication in large-scale. IoT Based Netw 152:106–113
Baskaran SBM, Raja G, Bashir AK, Murata M (2017) QoS-aware frequency-based 4G+relative authentication model for next generation LTE and its dependent public safety networks. IEEE Access 5:21977–21991
Boyes H, Hallaq B, Cunningham J, Watson T (2018) The industrial internet of things (IIoT): an analysis framework. Comput Ind 101:1–12
Cao, Y., Jia, F., & Manogaran, G. (2019). Efficient traceability systems of steel products Using Blockchain-based Industrial Internet of Things. IEEE Transactions on Industrial Informatics
Chen S, Yang L, Zhao C, Varadarajan V, Wang K (2020) Double-blockchain assisted secure and anonymous data aggregation for fog-enabled smart grid. Engineering
Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJ (2018) Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment. IEEE Internet Things J 5(6):4900–4913
Deep S, Zheng X, Jolfaei A, Yu D, Ostovari P, Bashir AK (March 2020) A survey of security and privacy issues in the Internet of Things from the layered context. Wiley, Transactions on Emerging Telecommunications Technologies
Gebremichael T, Ledwaba LP, Eldefrawy MH, Hancke GP, Pereira N, Gidlund M, Akerberg J (2020) Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access 8:152351–152366
George G, Thampi SM (2018) A graph-based security framework for securing industrial IoT networks from vulnerability exploitations. IEEE Access 6:43586–43601
Guido Dartmann, Houbing Song, and Anke Schmeink. Big Data Analytics for Cyber-Physical Systems: Machine Learning for the Internet of Things. ISBN: 9780128166376. Elsevier, 2019, pp. 1–360.
Hassan MM, Gumaei A, Huda S, Almogren A (2020) Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model. IEEE Trans Ind Inf 16(9):6154–6162
Huang K, Zhang X, Mu Y, Wang X, Yang G, Du X, Guizani M (2019) Building redactable consortium blockchain for industrial Internet-of-Things. IEEE Trans Industr Inf 15(6):3670–3679
Lee Y, Lee KM, Lee SH (2019) Blockchain-based reputation management for custom manufacturing service in the peer-to-peer networking environment. Peer Peer Network Appl 13(2):671–683
Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2018) A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans Ind Inf 14(8):3599–3609
McNinch M, Parks D, Jacksha R, Miller A (2019) Leveraging IIoT to improve machine safety in the mining industry. Min Metall Explor 36(4):675–681
Mosteiro-Sanchez A, Barcelo M, Astorga J, Urbieta A (2020) Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0. J Manuf Syst 57:367–378
Plaga S, Wiedermann N, Anton SD, Tatschner S, Schotten H, Newe T (2019) Securing future decentralised industrial IoT infrastructures: challenges and free open source solutions. Futur Gener Comput Syst 93:596–608
Qureshi KN, Rana SS, Ahmed A, Jeon G (2020) A novel and secure attacks detection framework for smart cities industrial internet of things. Sustain Cities Soc 61
Sabina Jeschke, Christian Brecher, Houbing Song, and Danda Rawat, Industrial Internet of Things: Cybermanufacturing Systems. ISBN: 978–3–319–42558–0, Cham, Switzerland: Springer, 2017, pp. 1–715.
Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J Select Areas Commun 38(5):942–954
Shijie W, Yingfeng Z (2020) A credit-based dynamical evaluation method for the smart configuration of manufacturing services under Industrial Internet of Things. J Intell Manuf
Sodhro AH, Pirbhulal S, Muzammal M, Zongwei L (2020) Towards blockchain-enabled security technique for industrial internet of things based decentralized applications. J Grid Comput, pp 1–14.
Sundarasekar R, Shakeel PM, Baskar S, Kadry S, Mastorakis G, Mavromoustakis CX, Gn V (2019) Adaptive energy aware quality of service for reliable data transfer in under water acoustic sensor networks. IEEE Access 7: 80093–80103
Tajalli SZ, Mardaneh M, Taherian-Fard E, Izadian A, Kavousi-Fard A, Dabbaghjamanesh M, Niknam T (2020) DoS-resilient distributed optimal scheduling in a fog supporting IIoT-based smart microgrid. IEEE Trans Ind Appl 56(3):2968–2977
Wang EK, Liang Z, Chen C-M, Kumari S, Khan MK (2020) PoRX: a reputation incentive scheme for blockchain consensus of IIoT. Future Gener Comput Syst 102:140–151
Xu X, Han M, Nagarajan SM, Anandhan P (2020) Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment. Comput Commun 160:423–430
Xu Y, Ren J, Wang G, Zhang C, Yang J, Zhang Y (2019) A blockchain-based nonrepudiation network computing service scheme for industrial IoT. IEEE Trans Ind Inf 15(6):3632–3641
Yan X, Xu Y, Xing X, Cui B, Guo Z, Guo T (2020) Trustworthy network anomaly detection based on an adaptive learning rate and momentum in IIoT. IEEE Trans Ind Inf 16(9):6182–6192
Zhang D, Chan CC, Zhou GY (2018) Enabling Industrial Internet of Things (IIoT) towards an emerging smart energy system. Global Energy Interconnect 1(1):39–47
Zhu F, Wu W, Zhang Y, Chen X (2019) Privacy-preserving authentication for general directed graphs in industrial IoT. Inf Sci 502:218–228
Acknowledgements
Researchers would like to thank Scientific Research, Qassim University, for funding this project's publication.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Communicated by Vicente Garcia Diaz.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alkhalaf, S. A control-driven autonomous authentication scheme for peer-to-peer control systems assisted industrial Internet of things. Soft Comput 25, 12175–12189 (2021). https://doi.org/10.1007/s00500-021-05883-2
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-021-05883-2