2021
DOI: 10.1109/comst.2020.3045136
|View full text |Cite
|
Sign up to set email alerts
|

Potential Identity Resolution Systems for the Industrial Internet of Things: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 43 publications
(12 citation statements)
references
References 127 publications
0
9
0
Order By: Relevance
“…Multiple parties with expertise in their particular areas now work together to produce final products using smart manufacturing. A recent research [277] proposed a detailed review of identity and authorization management frameworks for Industrial IoT (IIoT), which is the critical requirement for secure smart manufacturing. To have automated control, the following three major areas of manufacturing must be shifted to data-based automated control [274].…”
Section: Smart Economymentioning
confidence: 99%
“…Multiple parties with expertise in their particular areas now work together to produce final products using smart manufacturing. A recent research [277] proposed a detailed review of identity and authorization management frameworks for Industrial IoT (IIoT), which is the critical requirement for secure smart manufacturing. To have automated control, the following three major areas of manufacturing must be shifted to data-based automated control [274].…”
Section: Smart Economymentioning
confidence: 99%
“…Semantic routing uses the mapping relationship between query keywords and nodes to forward query requests to some nodes that are considered most likely to meet the request. is method is similar to prefix matching, but it directly maps the resource key to the resource index position, and the query key adopts the same semantic representation as the resource key [13]. In this paper, the corresponding relationship between the query key word and the index position of the perception node is established, and the query packet is routed to the corresponding perception node through the query key word.…”
Section: Cross-border E-commerce Frameworkmentioning
confidence: 99%
“…The absence of the identity protocol layer will shift the responsibility of identity verification to service providers, leading to inefficiency. Thirdly, the identity resolution system can achieve better management of various network devices [140]. It can identify various subjects such as terminals, network equipment, service resources and data, thus realizing the joint optimization of multiple systems and the unified scheduling of resources.…”
Section: Information Layermentioning
confidence: 99%