2020
DOI: 10.3390/s20071963
|View full text |Cite
|
Sign up to set email alerts
|

Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT

Abstract: The introduction of 5G communication capabilities presents additional challenges for the development of products and services that can fully exploit the opportunities offered by high bandwidth, low latency networking. This is particularly relevant to an emerging interest in the Industrial Internet of Things (IIoT), which is a foundation stone of recent technological revolutions such as Digital Manufacturing. A crucial aspect of this is to securely authenticate complex transactions between IIoT devices, whilst … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 37 publications
(46 reference statements)
0
3
0
Order By: Relevance
“…The greater the size, the greater the number of research papers identified. The solutions addressing different threats focused on design, implementation, security analysis, and security assurance frameworks [13,24,32,50,67,[80][81][82][83][84]; systems for security assurance [47], intrusion detection [29] and security incident management [85]; approaches/mechanisms for security [7,25,28,40,41,43,45,48,[86][87][88][89][90][91] and remote diagnostics [92]; schemes for security assurance [72,73,[93][94][95]; protocols for security assurance [8,16,39,53,62,63,[96][97][98][99][100][101]; algorithms for security assurance [102]; models/algorithms for securi...…”
Section: Proposed Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…The greater the size, the greater the number of research papers identified. The solutions addressing different threats focused on design, implementation, security analysis, and security assurance frameworks [13,24,32,50,67,[80][81][82][83][84]; systems for security assurance [47], intrusion detection [29] and security incident management [85]; approaches/mechanisms for security [7,25,28,40,41,43,45,48,[86][87][88][89][90][91] and remote diagnostics [92]; schemes for security assurance [72,73,[93][94][95]; protocols for security assurance [8,16,39,53,62,63,[96][97][98][99][100][101]; algorithms for security assurance [102]; models/algorithms for securi...…”
Section: Proposed Solutionsmentioning
confidence: 99%
“…Besides, some solutions consider specific vertical applications smart health [31,32,45,64,66], Industrial IoT [29,35,82,91,105,106,119,120], smart cities [25,57,84,101], smart agriculture [108], public services [87], and smart transportation [27,121]. The remaining solutions do not address specific vertical applications, only focusing on IoT [3,8,13,24,39,43,50,51,58,63,74,83,85,86,99,109,112,116,117,[122][123][124][125] or 5G-IoT [16,21,40,41,…”
Section: Proposed Solutionsmentioning
confidence: 99%
“…In [81], the authors used trojan activation methods (TAM), to deal with hardware attacks of IoTs and UAVs by comparing the outputs of devices, communication behavior, and sidechannel leakages. This model was checked in the real-time circuit environment by inserting Trojan in the circuits to evaluates its behavior with Trojan-free circuits in the context of results comparison.…”
Section: A Countermeasure Of Hardware/software Malicious Injection At...mentioning
confidence: 99%
“…Hussain et al [3] combined Physically Unclonable Function (PUF) hardware consuming FPGAs, together with a multi-layer method associated with cloud computing with an aim to enable the development of an enhanced multi-layer validation mechanism. The result of the evaluation of the proposed program provided a significantly higher load of requests to validate nodes using a built-up architecture in less than a second.…”
Section: Related Workmentioning
confidence: 99%