Skip to main content
Log in

Design and verification of secure communication scheme for industrial IoT intelligent production line system with multi-path redundancy and collaboration

  • Special issue on IoT-based Health Monitoring System
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

The phenomenon of diversified terminal structures is common in the Industrial Internet of Things (IIoT), and the information transmission methods between the terminals are more complicated. The wireless network transmission and the security of wireless data communication between various intelligent devices are a major challenge facing the IIoT. Aiming at the problem that the existing single-path communication method of the IIoT intelligent production line system cannot guarantee the confidentiality, integrity and authenticity of sensitive information transmission effectively, we establish a redundant collaboration secure communication scheme (TS-RCSCS) for IIoT intelligent production line system in this paper. This scheme constructs a redundant-synergy secure communication model based on threshold signature mechanism and proposes a redundant-synergy transmission method based on multiple auxiliary paths. This method can prevent state information transmission failure effectively caused by the failure of wireless communication nodes in IIoT intelligent production line system, which could reduce the probability of information packets being intercepted by malicious nodes. In addition, in view of the special situation that redundant-synergy secure communication model fails periodically, this scheme further proposes a method for predicting the communication missing data of intelligent production line system. This method can predict the missing communication information of continuous period effectively, which meets the integrity requirements of communication information for IIoT intelligent production line system. The test verification conclusion shows that the TS-RCSCS scheme can obtain higher communication accuracy and higher fitting prediction value in the IIoT environment. The conclusion further shows that the scheme is suitable for the wireless communication process between intelligent devices and intelligent terminals in the IIoT environment, and it can improve the security and integrity of data communication effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

source node

Fig. 7

source node

Fig. 8

source nodes

Fig. 9

source nodes

Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Availability of data and materials

All data generated or analyzed during this study are included in this article.

References

  1. Al-Qerem A, Alauthman M, Almomani A, Gupta BB (2020) IoT transaction processing through cooperative concurrency control on fog-cloud computing environment. Soft Comput 24(8):5695–5711

    Article  Google Scholar 

  2. Abbasimehr H, Shabani M, Yousefi M (2018) An optimized model using LSTM network for demand forecasting. Comput Ind Eng 143:1–13

    Google Scholar 

  3. Amin R, Islam SKH, Biswas GP, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42–62

    Article  Google Scholar 

  4. Chaudhary R, Aujla GS, Garg S, Kumar N, Rodrigues JJPC (2018) SDN-enabled multi-attribute-based secure communication for smart grid in IIoT environment. IEEE Trans Ind Inf 14(6):2629–2640

    Article  Google Scholar 

  5. Chen D, Lu W, Xing WW, Wang N (2019) An efficient verifiable threshold multi-secret sharing scheme with different stages. IEEE Access 7:107104–107110

    Article  Google Scholar 

  6. Chang XJ, Ma ZG, Yang Y, Zeng ZQ, Hauptmann AG (2017) Bi-level semantic representation analysis for multimedia event detection. IEEE Trans Cybern 47(5):1180–1197

    Article  Google Scholar 

  7. Chang XJ, Yu YL, Yang Y, Xing EP (2017) Semantic pooling for complex event analysis in untrimmed videos. IEEE Trans Pattern Anal Mach Intell 39(8):1617–1632

    Article  Google Scholar 

  8. Choudhary K, Gaba GS, Butun I, Kumar P (2020) MAKE-IT-A lightweight mutual authentication and key exchange protocol for industrial internet of things. Sensors 20(18):1–21

    Article  Google Scholar 

  9. Deng LZ (2020) Anonymous aggregate encryption scheme for industrial internet of things. IEEE Syst J 14(3):3999–4006

    Article  Google Scholar 

  10. Eldefrawy MH, Pereira N, Gidlund M (2018) Key distribution protocol for industrial internet of things without implicit certificates. IEEE Internet Things J 6(1):906–917

    Article  Google Scholar 

  11. Esposito C, Ficco M, Gupta BB (2021) Blockchain-based authentication and authorization for smart city applications. Inf Process Manage 58(2):102468

    Article  Google Scholar 

  12. Esposito C, Ficco M, Castiglione A, Palmieri F, De Santis A (2018) Distributed group key management for event notification confidentiality among sensors. IEEE Trans Dependable Secure Comput 17(3):566–580

    Google Scholar 

  13. Fang LM, Zhang HY, Li MH, Ge CP, Liu L, Liu Z (2020) A secure and fine-grained scheme for data security in industrial IoT platforms for smart city. IEEE Internet Things J 7(9):7982–7990

    Article  Google Scholar 

  14. Gupta BB, Quamara M (2020) An overview of Internet of Things (IoT) Architectural aspects, challenges, and protocols. Concurr Comput-Pract Exp 32(21):1–24

    Article  Google Scholar 

  15. Gebremichael T, Ledwaba LPI, Eldefrawy MH, Hancke GP, Pereira N, Gidlund M, Akerberg J (2020) Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access 8:152351–152366

    Article  Google Scholar 

  16. Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63(11):7124–7132

    Article  Google Scholar 

  17. Hui HW, Zhou CC, Xu SG, Lin FH (2020) A novel secure data transmission scheme in industrial internet of things. China Commun 17(1):73–88

    Article  Google Scholar 

  18. Hiller J, Henze M, Serror M, Wagner E, Richter JN, Wehrle K (2018) Secure Low Latency Communication for Constrained Industrial IoT Scenarios. IEEE 43rd Conference on Local Computer Networks (LCN). Chicago.

  19. Tsai KL, Huang YL, Leu FY, You I, Huang YL, Tsai CH (2018) AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access 6:45325–45334

    Article  Google Scholar 

  20. Li WT, Wang P (2019) Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction. Future Gener Comput Syst-Int J eSci 101:694–708

    Article  Google Scholar 

  21. Li X, Niu JW, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2018) A Robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans Ind Inf 14(8):3599–3609

    Article  Google Scholar 

  22. Shen M, Liu HS, Zhu LH, Xu K, Yu HB, Du XJ, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J Sel Areas Commun 38(5):942–954

    Article  Google Scholar 

  23. Shuai MX, Xiong L, Wang CH, Yu NH (2020) A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem. Comput Commun 160:215–227

    Article  Google Scholar 

  24. Singh J, Gimekar A, Venkatesan S (2019) An efficient lightweight authentication scheme for human-centered industrial Internet of Things. Int J Commun Syst. https://doi.org/10.1002/dac.4189

  25. Tewari A, Gupta BB (2020) Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Gener Comput Syst-Int J eSci 108:909–920

    Article  Google Scholar 

  26. Tewari A, Gupta BB (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73(3):1085–1102

    Article  Google Scholar 

  27. Wan JF, Li JP, Hua QS, Celesti A, Wang ZR (2020) Intelligent equipment design assisted by cognitive internet of things and industrial big data. Neural Comput Appl 32(9):4463–4472

    Article  Google Scholar 

  28. Wang JJ, Ma YL, Zhang LB, Gao RX, Wu DZ (2018) Deep learning for smart manufacturing: methods and applications. J Manuf Syst 48:144–156

    Article  Google Scholar 

  29. Wei M, Zhang SD, Wang P, Kim K (2018) An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things. Int J Distrib Sensor Netw 14(1):1-11

    Article  Google Scholar 

  30. Han L, Li ML, Zhuo L, Yang H, Zhang X (2017) Interpretation of Industrial Internet of Things white paper (2017). China Acad J Electron Publishing House 12:30–34

    Google Scholar 

  31. Yang Z, He J, Tian YG, Zhou JY (2020) Faster authenticated key agreement with perfect forward secrecy for industrial internet-of-things. IEEE Trans Industr Inf 16(10):6584–6596

    Article  Google Scholar 

  32. Yu CY, Li JZ, Li X, Ren XC, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

    Article  Google Scholar 

  33. Zhang YS, Li WJ, Chen L, Bi W, Yang T (2018) Verifiable special threshold secret sharing scheme based on eigenvalue. J Commun 39(8):169-175

    Google Scholar 

  34. Zhu CS, Rodrigues JJPC, Leung VCM, Shu L, Yang LT (2018) Trust-based communication for the industrial internet of things. IEEE Commun Mag 56(2):16–22

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by National Key R&D Program of China under Grant NO. 2017YFE0125300.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingshi Li.

Ethics declarations

Conflict of interest

We all declare that we have no conflict of interest in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, M., Yin, Z., Ma, Y. et al. Design and verification of secure communication scheme for industrial IoT intelligent production line system with multi-path redundancy and collaboration. Neural Comput & Applic 35, 13879–13893 (2023). https://doi.org/10.1007/s00521-021-05990-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-021-05990-z

Keywords

Navigation