ABSTRACT
In industrial Internet system, data security and privacy protection are very important, and data interaction and collaboration need fast and reliable network connection. Lightweight trusted identity architecture needs to support high-speed data transmission and processing, and provide secure authentication and access control mechanisms to prevent unauthorized access and malicious attacks. Therefore, a lightweight trusted identity architecture based on cloud-side collaboration technology of industrial Internet is designed. The data collector is used to collect the lightweight trusted identification data of industrial Internet, and a task scheduling model of industrial Internet is constructed based on cloud-side collaboration technology. On this basis, combined with industrial Internet, trusted applications and logo authorities, the lightweight trusted logo architecture is designed. The experimental results show that the proposed method has high confidence and accuracy of verification information, and can accurately detect and identify industrial Internet attacks, and take corresponding countermeasures in time, thus protecting users' network security.
- Alassery, F. 2022. Predictive maintenance for cyber physical systems using neural network based on deep soft sensor and industrial internet of things. Computers and Electrical Engineering, 101: 108062.Google ScholarDigital Library
- Goyat, R., Kumar, G., Saha, R. 2023. RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things. Cluster Computing, 2023: 1-23.Google Scholar
- Deebak, B. D., Fadi, A. L. T. 2022. A robust and distributed architecture for 5G-enabled networks in the smart blockchain era. Computer Communications, 181: 293-308.Google ScholarDigital Library
- Bouras, M. A., Lu, Q., Dhelim, S. 2021. A lightweight blockchain-based IoT identity management approach. Future Internet, 13(2): 24-32.Google ScholarCross Ref
- Ben Saad, S., Ksentini, A., Brik, B. 2022. An end‐to‐end trusted architecture for network slicing in 5G and beyond networks. Security and Privacy, 5(1): e186-e172.Google ScholarCross Ref
- Hussain, S., Ullah, I., Khattak, H. 2021. A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT). Journal of Information Security and Applications, 58: 102625.Google ScholarCross Ref
- Niveditha, V. R., Usha, D., Rajakumar, P. S. 2021. Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform. International Journal of e-Collaboration (IJeC), 17(4): 122-131.Google ScholarDigital Library
- Liu, Y., Zang, Y., Zhu, C. 2021. Research on Monitoring Application of Railway Unattended Station Based on Edge Computing. Computer Simulation, 38(03): 51-55.Google Scholar
Index Terms
- Lightweight Trusted Identity Architecture Based on Industrial Internet Cloud Edge Collaboration Technology
Recommendations
A Lightweight Cross-Domain Authentication Protocol for Trusted Access to Industrial Internet
This paper proposes a hierarchical framework for industrial Internet device authentication and trusted access as well as a mechanism for industrial security state perception, and designs a cross-domain authentication scheme for devices on this basis. The ...
Research on the Architecture of Trusted Security System Based on the Internet of Things
ICICTA '11: Proceedings of the 2011 Fourth International Conference on Intelligent Computation Technology and Automation - Volume 02With the advent of Internet of Things (IoT), information security issues will be a major bottleneck of the future development of IoT. How to resolve the information security problems of IoT effectively has become an important research issue. Firstly, ...
IoT---Cloud collaboration to establish a secure connection for lightweight devices
Internet of Things (IoT) technologies allow everyday objects including small devices in sensor networks to be capable of connecting to the Internet. Such an innovative technology can lead to positive changes in human life. However, if there is no proper ...
Comments