2022
DOI: 10.1109/jiot.2022.3176192
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Privacy-Preserving Blockchain-Based Multifactor Device Authentication Protocol for Cross-Domain IIoT

Abstract: Industrial Internet of Things (IIoT) has emerged as a prospective technology that improves the productivity and automation level for industrial applications. Devices from cooperative IIoT domains will communicate and collaborate on the increasingly complicated manufacturing tasks. To secure cross-domain device collaborations, we propose combining the blockchain with multi-factor authentication. Because the multifactor authentication conforms to IIoT devices' operation modes and brings higher security levels, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(18 citation statements)
references
References 42 publications
0
9
0
Order By: Relevance
“…G 2 had ad hoc SAs without reasoning [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50]. Finally, G 3 possessed a minimal AMP with reasoning [27], [28], [51], [52] and our work.…”
Section: Related Workmentioning
confidence: 97%
See 3 more Smart Citations
“…G 2 had ad hoc SAs without reasoning [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50]. Finally, G 3 possessed a minimal AMP with reasoning [27], [28], [51], [52] and our work.…”
Section: Related Workmentioning
confidence: 97%
“…This section provides a subjective literature survey of blockchain-based manufacturing factory solutions relevant to our research objectives. With respect to the popularity of blockchain-based manufacturing factory solutions, we considered blockchain-based patents [23], [24], [25], [26], [27], [28] and literature [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52]. 1 Our survey matrix was "studying the blockchain-based manufacturing factory solutions for their top-down software architectural initiatives that facilitated hierarchically federated geodistribution while possessing QoS demands beyond default security and privacy."…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The authors, like Zhang, Yan, et al 35 have proposed to combine blockchain technologies with multi‐factor authentication to achieve secure cross‐domain device communication. In addition, the authors have proposed timestamp and hash‐based techniques to prevent replay attacks and preserve the message's integrity.…”
Section: Literature Reviewmentioning
confidence: 99%