2020
DOI: 10.1002/ett.4137
|View full text |Cite
|
Sign up to set email alerts
|

Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions

Abstract: In a wireless Industrial Internet of Things (IIoT) network, enforcing security is a challenge due to the large number of devices forming the network and their limited computation capabilities. Furthermore, different security attacks require specifically tailored security protocols to prevent their occurrence. As an alternative to these conventional centralized security protocols, the application of Blockchain (BC) and Deep learning (DL) for securing IIoT networks hold great potential. BC facilitates security b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
17
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 46 publications
(48 reference statements)
0
17
0
Order By: Relevance
“…IIoT is creating new generation smart systems by conducting the digital transformation in traditional industries. IIoT dramatically changed and improved industrial procedures by utilizing the cutting‐edge technologies and introducing the latest business models 6‐8 . IIoT promises to enhance the performance of exiting industrial procedures by optimizing the manufacturing process, reducing cost, and increase the efficiency of smart enterprises.…”
Section: Introductionmentioning
confidence: 99%
“…IIoT is creating new generation smart systems by conducting the digital transformation in traditional industries. IIoT dramatically changed and improved industrial procedures by utilizing the cutting‐edge technologies and introducing the latest business models 6‐8 . IIoT promises to enhance the performance of exiting industrial procedures by optimizing the manufacturing process, reducing cost, and increase the efficiency of smart enterprises.…”
Section: Introductionmentioning
confidence: 99%
“…Among these, authentication is one of the security services to be deployed in the network. Techniques based on the Blockchain (M. Sharma et al, 2020), machine learning (Punithavathi et al, 2019), cloud services (D. K. Sharma et al, 2021), biometric (Sui et al, 2011), session keys or session time, cryptography can be utilized for ensuring security via authentication, identity and privacy management. Cryptography is broadly categorized into symmetric key and asymmetric key.…”
Section: Background and Literature Reviewmentioning
confidence: 99%
“…The presented method accomplished a feasible method for containing and detecting intruders in an IoT. In [13], a security architecture helps comprehensive protection for the IIoT through blockchain (BC) and Coalition Formation concept has been introduced. In addition, we support a traditional DL-based classification method for effectively categorizing benign and malicious devices in IIoT.…”
Section: Introductionmentioning
confidence: 99%