Abstract
The phenomenon of diversified terminal structures is common in the Industrial Internet of Things (IIoT), and the information transmission methods between the terminals are more complicated. The wireless network transmission and the security of wireless data communication between various intelligent devices are a major challenge facing the IIoT. Aiming at the problem that the existing single-path communication method of the IIoT intelligent production line system cannot guarantee the confidentiality, integrity and authenticity of sensitive information transmission effectively, we establish a redundant collaboration secure communication scheme (TS-RCSCS) for IIoT intelligent production line system in this paper. This scheme constructs a redundant-synergy secure communication model based on threshold signature mechanism and proposes a redundant-synergy transmission method based on multiple auxiliary paths. This method can prevent state information transmission failure effectively caused by the failure of wireless communication nodes in IIoT intelligent production line system, which could reduce the probability of information packets being intercepted by malicious nodes. In addition, in view of the special situation that redundant-synergy secure communication model fails periodically, this scheme further proposes a method for predicting the communication missing data of intelligent production line system. This method can predict the missing communication information of continuous period effectively, which meets the integrity requirements of communication information for IIoT intelligent production line system. The test verification conclusion shows that the TS-RCSCS scheme can obtain higher communication accuracy and higher fitting prediction value in the IIoT environment. The conclusion further shows that the scheme is suitable for the wireless communication process between intelligent devices and intelligent terminals in the IIoT environment, and it can improve the security and integrity of data communication effectively.
Similar content being viewed by others
Availability of data and materials
All data generated or analyzed during this study are included in this article.
References
Al-Qerem A, Alauthman M, Almomani A, Gupta BB (2020) IoT transaction processing through cooperative concurrency control on fog-cloud computing environment. Soft Comput 24(8):5695–5711
Abbasimehr H, Shabani M, Yousefi M (2018) An optimized model using LSTM network for demand forecasting. Comput Ind Eng 143:1–13
Amin R, Islam SKH, Biswas GP, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42–62
Chaudhary R, Aujla GS, Garg S, Kumar N, Rodrigues JJPC (2018) SDN-enabled multi-attribute-based secure communication for smart grid in IIoT environment. IEEE Trans Ind Inf 14(6):2629–2640
Chen D, Lu W, Xing WW, Wang N (2019) An efficient verifiable threshold multi-secret sharing scheme with different stages. IEEE Access 7:107104–107110
Chang XJ, Ma ZG, Yang Y, Zeng ZQ, Hauptmann AG (2017) Bi-level semantic representation analysis for multimedia event detection. IEEE Trans Cybern 47(5):1180–1197
Chang XJ, Yu YL, Yang Y, Xing EP (2017) Semantic pooling for complex event analysis in untrimmed videos. IEEE Trans Pattern Anal Mach Intell 39(8):1617–1632
Choudhary K, Gaba GS, Butun I, Kumar P (2020) MAKE-IT-A lightweight mutual authentication and key exchange protocol for industrial internet of things. Sensors 20(18):1–21
Deng LZ (2020) Anonymous aggregate encryption scheme for industrial internet of things. IEEE Syst J 14(3):3999–4006
Eldefrawy MH, Pereira N, Gidlund M (2018) Key distribution protocol for industrial internet of things without implicit certificates. IEEE Internet Things J 6(1):906–917
Esposito C, Ficco M, Gupta BB (2021) Blockchain-based authentication and authorization for smart city applications. Inf Process Manage 58(2):102468
Esposito C, Ficco M, Castiglione A, Palmieri F, De Santis A (2018) Distributed group key management for event notification confidentiality among sensors. IEEE Trans Dependable Secure Comput 17(3):566–580
Fang LM, Zhang HY, Li MH, Ge CP, Liu L, Liu Z (2020) A secure and fine-grained scheme for data security in industrial IoT platforms for smart city. IEEE Internet Things J 7(9):7982–7990
Gupta BB, Quamara M (2020) An overview of Internet of Things (IoT) Architectural aspects, challenges, and protocols. Concurr Comput-Pract Exp 32(21):1–24
Gebremichael T, Ledwaba LPI, Eldefrawy MH, Hancke GP, Pereira N, Gidlund M, Akerberg J (2020) Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access 8:152351–152366
Gope P, Hwang T (2016) A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans Ind Electron 63(11):7124–7132
Hui HW, Zhou CC, Xu SG, Lin FH (2020) A novel secure data transmission scheme in industrial internet of things. China Commun 17(1):73–88
Hiller J, Henze M, Serror M, Wagner E, Richter JN, Wehrle K (2018) Secure Low Latency Communication for Constrained Industrial IoT Scenarios. IEEE 43rd Conference on Local Computer Networks (LCN). Chicago.
Tsai KL, Huang YL, Leu FY, You I, Huang YL, Tsai CH (2018) AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access 6:45325–45334
Li WT, Wang P (2019) Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction. Future Gener Comput Syst-Int J eSci 101:694–708
Li X, Niu JW, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2018) A Robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans Ind Inf 14(8):3599–3609
Shen M, Liu HS, Zhu LH, Xu K, Yu HB, Du XJ, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J Sel Areas Commun 38(5):942–954
Shuai MX, Xiong L, Wang CH, Yu NH (2020) A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem. Comput Commun 160:215–227
Singh J, Gimekar A, Venkatesan S (2019) An efficient lightweight authentication scheme for human-centered industrial Internet of Things. Int J Commun Syst. https://doi.org/10.1002/dac.4189
Tewari A, Gupta BB (2020) Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Gener Comput Syst-Int J eSci 108:909–920
Tewari A, Gupta BB (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73(3):1085–1102
Wan JF, Li JP, Hua QS, Celesti A, Wang ZR (2020) Intelligent equipment design assisted by cognitive internet of things and industrial big data. Neural Comput Appl 32(9):4463–4472
Wang JJ, Ma YL, Zhang LB, Gao RX, Wu DZ (2018) Deep learning for smart manufacturing: methods and applications. J Manuf Syst 48:144–156
Wei M, Zhang SD, Wang P, Kim K (2018) An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things. Int J Distrib Sensor Netw 14(1):1-11
Han L, Li ML, Zhuo L, Yang H, Zhang X (2017) Interpretation of Industrial Internet of Things white paper (2017). China Acad J Electron Publishing House 12:30–34
Yang Z, He J, Tian YG, Zhou JY (2020) Faster authenticated key agreement with perfect forward secrecy for industrial internet-of-things. IEEE Trans Industr Inf 16(10):6584–6596
Yu CY, Li JZ, Li X, Ren XC, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608
Zhang YS, Li WJ, Chen L, Bi W, Yang T (2018) Verifiable special threshold secret sharing scheme based on eigenvalue. J Commun 39(8):169-175
Zhu CS, Rodrigues JJPC, Leung VCM, Shu L, Yang LT (2018) Trust-based communication for the industrial internet of things. IEEE Commun Mag 56(2):16–22
Acknowledgements
This research was supported by National Key R&D Program of China under Grant NO. 2017YFE0125300.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
We all declare that we have no conflict of interest in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Li, M., Yin, Z., Ma, Y. et al. Design and verification of secure communication scheme for industrial IoT intelligent production line system with multi-path redundancy and collaboration. Neural Comput & Applic 35, 13879–13893 (2023). https://doi.org/10.1007/s00521-021-05990-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-021-05990-z