2019
DOI: 10.1007/978-3-030-12330-7_12
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Techniques for the Industrial Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 61 publications
0
3
0
Order By: Relevance
“…Key establishment techniques are one of the countermeasures that ensure IIoT’s security and privacy. A comprehensive study in [ 10 ] discussed the symmetric and asymmetric key establishment protocols built at the higher layers and the physical layer; they then outline the importance of developing cross-layer key establishment protocols for the IIoT by examining traditional key establishment protocols. The authors provide an analysis in which the cross-layer architecture allows IIoT devices to create communication keys without the need for a trusted person or the assumption of secret sharing.…”
Section: Related Surveys and Contributionmentioning
confidence: 99%
“…Key establishment techniques are one of the countermeasures that ensure IIoT’s security and privacy. A comprehensive study in [ 10 ] discussed the symmetric and asymmetric key establishment protocols built at the higher layers and the physical layer; they then outline the importance of developing cross-layer key establishment protocols for the IIoT by examining traditional key establishment protocols. The authors provide an analysis in which the cross-layer architecture allows IIoT devices to create communication keys without the need for a trusted person or the assumption of secret sharing.…”
Section: Related Surveys and Contributionmentioning
confidence: 99%
“…However, how to manage and coordinate such information among various service providers while preserving the device's privacy is a challenging task. This is due to the lack of dedicated interoperable communication protocols that autonomously trigger actions with or without physical human intervention [125,126].…”
Section: Security Issue 13-cross-domain Jurisdictionsmentioning
confidence: 99%
“…[32] discusses cryptographic algorithms and key management, and the issues regarding their implementation under the constraints of IIoT. A detailed review of cryptographic key establishment protocols is provided in [33]. A survey of existing standards for security and interoperability in Industry 4.0 is presented in [23].…”
Section: Related Work On Security Issues In Iiotmentioning
confidence: 99%