2023
DOI: 10.3390/pr11051558
|View full text |Cite
|
Sign up to set email alerts
|

An Authenticated Group Shared Key Mechanism Based on a Combiner for Hash Functions over the Industrial Internet of Things

Abstract: The Industrial Internet of Things (IIoT) provides internet connectivity for instruments, digital machines, and any other manufactured object to enable intelligent industrial operations to achieve high productivity. Securing communications between IIoT devices remains a critical and challenging issue due to the resource-constrained and processing capabilities of sensing devices. Moreover, the traditional group shared key might implement complex mathematical operations that are not suitable for the limited recou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 36 publications
0
1
0
Order By: Relevance
“…Healthcare: In the convergence of privacy and security within healthcare ecosystems, research papers [12,[34][35][36][37][38][39], make substantial contributions, comprising 11% of notable Industrial: This sector, represented by research papers [7,9,17,[27][28][29][30][31][32][33], accounts for 15% of the total. The central focus revolves around the crucial requirement for authorization frameworks in industrial settings to counter unauthorized access, strengthen data security, and guarantee the unwavering reliability and safety of critical industrial processes.…”
Section: Types Of Publication Channelsmentioning
confidence: 99%
See 3 more Smart Citations
“…Healthcare: In the convergence of privacy and security within healthcare ecosystems, research papers [12,[34][35][36][37][38][39], make substantial contributions, comprising 11% of notable Industrial: This sector, represented by research papers [7,9,17,[27][28][29][30][31][32][33], accounts for 15% of the total. The central focus revolves around the crucial requirement for authorization frameworks in industrial settings to counter unauthorized access, strengthen data security, and guarantee the unwavering reliability and safety of critical industrial processes.…”
Section: Types Of Publication Channelsmentioning
confidence: 99%
“…Others were motivated to have the authentication process in IoT integrated into another practical, real-world system or hardware (such as pollution detection systems [39], digital health solutions [11,35,48], medical devices [34,37], automated monitoring systems [49,54], intelligent transport systems [49], multiple integrated access control systems [32], and the vulnerability of servers in cyber-physical systems [75,76]. Some emerging problems involve addressing cross-domain authentication in IoT devices [12,42,69,70], multi-layered architecture communication [8,69], resource-friendly security mechanisms [36,58,64], and Internet-enabled smart devices [9,27,60].…”
Section: Rq4 What Is the Contribution Of Authentication In Iot System?mentioning
confidence: 99%
See 2 more Smart Citations
“…The users in the same group can encrypt and decrypt messages using the shared key so that they can communicate with each other securely [29], [29]. There are two steps in generating a group shared key: distributing the pre-shared key and generating the final key [30]. To enable users to switch to different groups, the dynamic joining and leaving processes can reduce the cost of the authentication process [31], [32].…”
Section: Introductionmentioning
confidence: 99%