2022
DOI: 10.3390/s22124645
|View full text |Cite
|
Sign up to set email alerts
|

Secure IIoT Information Reinforcement Model Based on IIoT Information Platform Using Blockchain

Abstract: Data created at industrial sites through industrial internet of things devices are now being processed automatically or in real-time in the industrial structure, due to the application of artificial intelligence technology to industrial sites. However, the expenses of autonomous or real-time data processing and steady data processing (analysis, prediction, prescription, and implementation) necessitate a new processing method. We propose a blockchain-based industrial internet of things information reinforcement… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 24 publications
(24 reference statements)
0
3
0
Order By: Relevance
“…Cui et al (2022) proposes a lightweight anonymous cross-domain authentication scheme that introduces edge devices to alleviate the computational pressure on authentication servers and IIoT devices, and combines blockchain and dynamic accumulator techniques to achieve fast authentication. Jeong (2022) proposes an IIoT augmentation model to sense information in real time and ensure the integrity of the generated IIoT information. designs a blockchain-based PUF device authentication framework and proposes two distributed device authentication schemes with PUF.…”
Section: Authentication Solutions For the Industrial Internet And Iiotmentioning
confidence: 99%
“…Cui et al (2022) proposes a lightweight anonymous cross-domain authentication scheme that introduces edge devices to alleviate the computational pressure on authentication servers and IIoT devices, and combines blockchain and dynamic accumulator techniques to achieve fast authentication. Jeong (2022) proposes an IIoT augmentation model to sense information in real time and ensure the integrity of the generated IIoT information. designs a blockchain-based PUF device authentication framework and proposes two distributed device authentication schemes with PUF.…”
Section: Authentication Solutions For the Industrial Internet And Iiotmentioning
confidence: 99%
“…Access control is a method of limiting or prohibiting entry to certain individuals or groups. However, the widespread use of cloud computing for collaborative data sharing is hampered by insufficient security (Jeong, 2022) and access control. Enforcing access control on shared data helps to keep it safe from prying eyes.…”
Section: Introductionmentioning
confidence: 99%
“…Jeong et al proposed a blockchain-based industrial Internet of Things (IIoT) information enhancement model, which can ensure the data integrity of the IIoT generated by the industrial site. The model can process the data that may occur at the end of the industrial site into the blockchain by independently processing the data generated by the same IIoT device, effectively ensuring the security of data information [14]. In order to solve the problem of missing data collection in the industrial internet platform, Yu et al proposed a rule-based optical gradient elevator (LightGBM) algorithm to fill the missing data of the industrial internet according to the operation mechanism of the industrial internet platform.…”
Section: Introductionmentioning
confidence: 99%