2023
DOI: 10.3390/math11122710
|View full text |Cite
|
Sign up to set email alerts
|

RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things

Abstract: The Internet of Things (IoT) has experienced significant growth and is now a fundamental part of the next-generation Internet. Alongside improving daily life, IoT devices generate and collect vast amounts of data that can be leveraged by AI-enabled big data analytics for diverse applications. However, due to the machine-to-machine communication inherent in IoT, ensuring data security and privacy is crucial to mitigate various malicious cyber attacks, including man-in-the-middle, impersonation, and data poisoni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 48 publications
(71 reference statements)
0
2
0
Order By: Relevance
“…Alasmary [19] presents an access key agreement (AKA) scheme designed to boost security within the internet of things, with a specific focus on industrial environments. Reliable device-access framework for the industrial IoT (RDAF-IIoT) guarantees user authenticity verification, facilitating secure real-time access to information from industrial IoT devices.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Alasmary [19] presents an access key agreement (AKA) scheme designed to boost security within the internet of things, with a specific focus on industrial environments. Reliable device-access framework for the industrial IoT (RDAF-IIoT) guarantees user authenticity verification, facilitating secure real-time access to information from industrial IoT devices.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, a significant concern arises as even legitimate but curious users may gain access to the gateway's secret key, potentially leading to the execution of various attacks. For example, the ASKG presented in [5] is susceptible to privileged insider attacks, and fails to accomplish the ASKG after performing the password update phase. Moreover, the authentication scheme proposed in [1] stores the gateway key in plaintext form in the database, creating a risk for privileged insider attacks.…”
Section: A Motivation and Research Contributionmentioning
confidence: 99%