2019
DOI: 10.1007/978-981-15-1301-5_23
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-layer Security Model for 5G-Enabled Industrial Internet of Things

Abstract: This article considers the need for secure communications between Industrial Internet of Things (IIoT) devices that operate in 5Genabled environments. 5G networks enable greater data throughput and lower latency, which presents new opportunities for the secure authentication of business transactions between IoT hardware. We propose an approach to developing a flexible and secure model for IIoT components in 5G environments. Using the NIST seven layer model of cloud computing, in conjunction with Physically Unc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0
1

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 27 publications
0
7
0
1
Order By: Relevance
“…For example, in order to design and develop a new hybrid DI approach that is mixed up from various technologies such as Network Function Virtualization (NFV) [93], Mobile cloud Computing [94], Multi-Agent system [95,96], Distributed Leger technology [97], is yet to be developed. -IOTA DLT Masked Authentication Messaging comprises of three modes including public, private, and restricted that could potentially provide a way of enabling multiparty authentication scenarios [4], and access control. Moreover, location privacy [13] that focuses on how to effectively select reasonable dummy locations and avoid having the real locations.…”
Section: Challenges and Opportunitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, in order to design and develop a new hybrid DI approach that is mixed up from various technologies such as Network Function Virtualization (NFV) [93], Mobile cloud Computing [94], Multi-Agent system [95,96], Distributed Leger technology [97], is yet to be developed. -IOTA DLT Masked Authentication Messaging comprises of three modes including public, private, and restricted that could potentially provide a way of enabling multiparty authentication scenarios [4], and access control. Moreover, location privacy [13] that focuses on how to effectively select reasonable dummy locations and avoid having the real locations.…”
Section: Challenges and Opportunitiesmentioning
confidence: 99%
“…By 2030, the study predicts that IoT will rise exponentially, for example, by about 125 billion connected devices to the internet [1][2][3]. As a result, this poses several challenges in terms of providing timely delivery, data volume, speed, confidentiality and scalability [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…In NIST layers there are tenant users which could be hardware devices or virtual machines (VMs). Such a model may be implemented to each layer according to the principles of trustworthy computing [1,2].…”
Section: Nist Cloud Modelmentioning
confidence: 99%
“…It is clear that raising industrial users' knowledge that a substantial amount of the interest they create is intrinsically connected with intellectual property (IP) ownership and continuous development. There is also the persistent risk of a security breach that could compromise ownership of the IP, putting the underlying business model at higher risk [2,3]. This is particularly prevalent in the provision of IoT assisted healthcare systems, which is a pertinent example of distributed IT systems that have similarly complex needs and stakeholder requirements [4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation