TRUTH: trust and authentication scheme in 5G-IIoT.
Due to the extremely important role of data in the industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this article, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-party authenticated key exchange (AKE) protocol wit...
Main Authors: | Soleymani, Seyed Ahmad, Goudarzi, Shidrokh, Anisi, Mohammad Hossein, Cruickshank, Haitham, Jindal, Anish, Kama, Nazri |
---|---|
Format: | Article |
Published: |
IEEE Computer Society
2023
|
Subjects: |
Similar Items
-
Strategic approach to build customers trust in adoption of internet banking in Nigeria
by: Popoola, Naimot Folake, et al.
Published: (2015) -
Study on database management system security issues
by: Mohd Yunus, Mohd Amin, et al.
Published: (2017) -
AGW 616 - MANAGEMENT INFORMATION SYSTEM SEPT. 1999.
by: PPP, Pusat Pengajian Pengurusan
Published: (1999) -
APW 302E - MANAGEMENT INFORMATION SYSTEM APRIL 08.
by: PPP, Pusat Pengajian Pengurusan
Published: (2008) -
AGW 604 - MANAGEMENT INFORMATION SYSTEM OKT-NOV 1996
by: PPP, Pusat Pengajian Pengurusan
Published: (1996)