TRUTH: trust and authentication scheme in 5G-IIoT.

Due to the extremely important role of data in the industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this article, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-party authenticated key exchange (AKE) protocol wit...

Full description

Bibliographic Details
Main Authors: Soleymani, Seyed Ahmad, Goudarzi, Shidrokh, Anisi, Mohammad Hossein, Cruickshank, Haitham, Jindal, Anish, Kama, Nazri
Format: Article
Published: IEEE Computer Society 2023
Subjects:
_version_ 1796867759458484224
author Soleymani, Seyed Ahmad
Goudarzi, Shidrokh
Anisi, Mohammad Hossein
Cruickshank, Haitham
Jindal, Anish
Kama, Nazri
author_facet Soleymani, Seyed Ahmad
Goudarzi, Shidrokh
Anisi, Mohammad Hossein
Cruickshank, Haitham
Jindal, Anish
Kama, Nazri
author_sort Soleymani, Seyed Ahmad
collection ePrints
description Due to the extremely important role of data in the industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this article, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-party authenticated key exchange (AKE) protocol with privacy-preserving to secure data exchanged via wireless communication, cope with unauthorized entities, and ensure data integrity. Moreover, we develop a trust model based on the Dempster-Shafer theory to check the trustworthiness of data collected by smart devices/sensor nodes. Security analysis performed on our scheme demonstrates that it can withstand different well known attacks in the IIoT environment. We also analyzed the validity of our scheme by using the automated validation of internet security protocols and applications tool. Additionally, the performance evaluation and experimental results prove the effectiveness of the proposed scheme compared to the existing works in terms of accuracy, delay, trust, and throughput.
first_indexed 2024-04-09T03:45:41Z
format Article
id utm.eprints-104953
institution Universiti Teknologi Malaysia - ePrints
last_indexed 2024-04-09T03:45:41Z
publishDate 2023
publisher IEEE Computer Society
record_format dspace
spelling utm.eprints-1049532024-04-01T06:15:05Z http://eprints.utm.my/104953/ TRUTH: trust and authentication scheme in 5G-IIoT. Soleymani, Seyed Ahmad Goudarzi, Shidrokh Anisi, Mohammad Hossein Cruickshank, Haitham Jindal, Anish Kama, Nazri T58.6-58.62 Management information systems Due to the extremely important role of data in the industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this article, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-party authenticated key exchange (AKE) protocol with privacy-preserving to secure data exchanged via wireless communication, cope with unauthorized entities, and ensure data integrity. Moreover, we develop a trust model based on the Dempster-Shafer theory to check the trustworthiness of data collected by smart devices/sensor nodes. Security analysis performed on our scheme demonstrates that it can withstand different well known attacks in the IIoT environment. We also analyzed the validity of our scheme by using the automated validation of internet security protocols and applications tool. Additionally, the performance evaluation and experimental results prove the effectiveness of the proposed scheme compared to the existing works in terms of accuracy, delay, trust, and throughput. IEEE Computer Society 2023-01-19 Article PeerReviewed Soleymani, Seyed Ahmad and Goudarzi, Shidrokh and Anisi, Mohammad Hossein and Cruickshank, Haitham and Jindal, Anish and Kama, Nazri (2023) TRUTH: trust and authentication scheme in 5G-IIoT. IEEE Transactions on Industrial Informatics, 19 (1). pp. 880-889. ISSN 1551-3203 http://dx.doi.org/10.1109/TII.2022.3174718 DOI: 10.1109/TII.2022.3174718
spellingShingle T58.6-58.62 Management information systems
Soleymani, Seyed Ahmad
Goudarzi, Shidrokh
Anisi, Mohammad Hossein
Cruickshank, Haitham
Jindal, Anish
Kama, Nazri
TRUTH: trust and authentication scheme in 5G-IIoT.
title TRUTH: trust and authentication scheme in 5G-IIoT.
title_full TRUTH: trust and authentication scheme in 5G-IIoT.
title_fullStr TRUTH: trust and authentication scheme in 5G-IIoT.
title_full_unstemmed TRUTH: trust and authentication scheme in 5G-IIoT.
title_short TRUTH: trust and authentication scheme in 5G-IIoT.
title_sort truth trust and authentication scheme in 5g iiot
topic T58.6-58.62 Management information systems
work_keys_str_mv AT soleymaniseyedahmad truthtrustandauthenticationschemein5giiot
AT goudarzishidrokh truthtrustandauthenticationschemein5giiot
AT anisimohammadhossein truthtrustandauthenticationschemein5giiot
AT cruickshankhaitham truthtrustandauthenticationschemein5giiot
AT jindalanish truthtrustandauthenticationschemein5giiot
AT kamanazri truthtrustandauthenticationschemein5giiot