2020
DOI: 10.1109/access.2020.3004711 View full text |Buy / Rent full text
|
|

Abstract: The Industrial Internet of Things (IIoT) can transform an existing isolated industrial system to a connected network. The IIoT and the related wireless connectivity requirements for industrial sensors are very significant. The deployed sensors in IIoT monitors the conditions of the industrial devices and machines. Therefore, reliability and security become the most important concerns in IIoT. This introduces many familiar and ever-increasing risks associated with the industrial system. The IIoT devices can be … Show more

Help me understand this report

Search citation statements

Order By: Relevance
Select...
3
2
0
9
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

0
9
0
Order By: Relevance
“…Abuhasel, et al [34] developed a new framework for managing the resources in cloud-IIoT systems, where the Rivest Shamir Adleman (RSA) method was utilized for ensuring the security of each IIoT device. Here, the device authentication [35] was performed based on the processes of registration, login and verification by using the SHA-512 cryptographic model.…”
Section: Related Workmentioning
Create an account to read the remaining citation statements from this report. You will also get access to:
  • Search over 1.2b+ citation statments to see what is being said about any topic in the research literature
  • Advanced Search to find publications that support or contrast your research
  • Citation reports and visualizations to easily see what publications are saying about each other
  • Browser extension to see Smart Citations wherever you read research
  • Dashboards to evaluate and keep track of groups of publications
  • Alerts to stay on top of citations as they happen
  • Automated reference checks to make sure you are citing reliable research in your manuscripts
  • 7 day free preview of our premium features.

Trusted by researchers and organizations around the world

Over 130,000 students researchers, and industry experts at use scite

See what students are saying

rupbmjkragerfmgwileyiopcupepmcmbcthiemesagefrontiersapsiucrarxivemeralduhksmucshluniversity-of-gavle
“…Abuhasel, et al [34] developed a new framework for managing the resources in cloud-IIoT systems, where the Rivest Shamir Adleman (RSA) method was utilized for ensuring the security of each IIoT device. Here, the device authentication [35] was performed based on the processes of registration, login and verification by using the SHA-512 cryptographic model.…”
Section: Related Workmentioning
“…The results showed significant performance when compared to other work. The authors in [34] proposed a resource scheduling and secure data transmission of IIoT data using SoftMax-DNN and improved RSA techniques. The authors validated and evaluated the proposed techniques and existing techniques, using simulation in JAVA and NS3 platforms, by evaluating various performance metrics in terms of latency and throughput.…”
Section: Related Workmentioning
“…The system contained RFID, QR, and bar code, and it authenticated all products in processes of the supply chain. Abuhasel et al proposed SoftMax-based deep neural network for increasing security [ 14 ]. They also discussed the secure task scheduling system.…”
Section: Related Studiesmentioning