TRUTH: trust and authentication scheme in 5G-IIoT.
Due to the extremely important role of data in the industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this article, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-party authenticated key exchange (AKE) protocol wit...
Main Authors: | Soleymani, Seyed Ahmad, Goudarzi, Shidrokh, Anisi, Mohammad Hossein, Cruickshank, Haitham, Jindal, Anish, Kama, Nazri |
---|---|
Format: | Article |
Published: |
IEEE Computer Society
2023
|
Subjects: |
Similar Items
-
Integrating user experience assessment in Re-CRUD console framework development
by: Wahi Anuar, Muhammad Asyraf, et al.
Published: (2023) -
Strategic approach to build customers trust in adoption of internet banking in Nigeria
by: Popoola, Naimot Folake, et al.
Published: (2015) -
Enhanced security using multiple paths routine scheme in cloud-MANETs.
by: Hai, Tao, et al.
Published: (2023) -
Study on database management system security issues
by: Mohd Yunus, Mohd Amin, et al.
Published: (2017) -
Monolith application to microservices model driven analysis migration: state-of-the-art techniques.
by: Mohd. Rusli, Hazlifah, et al.
Published: (2022)