2020
DOI: 10.1002/spe.2832
|View full text |Cite
|
Sign up to set email alerts
|

A community‐based hierarchical user authentication scheme for Industry 4.0

Abstract: Summary The vision of Industry 4.0 is characterized by the amalgamation of cyber‐physical systems and industrial Internet of Things. Such a complex ecosystem urges for the requirement of novel security protocol and mechanisms for access control so as to allow the smart devices to authorize external entities and granting them access rights without depending on centralized authentication entities. The work proposed in this article aims to utilize a community‐based hierarchical approach to define the procedure fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 32 publications
(29 reference statements)
0
6
0
Order By: Relevance
“…That is, they are able to only monitor and test the elasticity of infrastructure (such as VM) and not an individual platform service. Security of IIoT platform services elasticity: While there are multiple literatures that address security in edge and cloud subsystems [22], [23]; there exists little literature that attempt to perform a holistic analysis of the IIoT infrastructure and study the underlying dependence with respect to security attack and elasticity impacts. STRATFram [24] framework allows the users to specify elasticity models and evaluates the elasticity strategies on the cloud.…”
Section: Security-elasticity Dependenciesmentioning
confidence: 99%
“…That is, they are able to only monitor and test the elasticity of infrastructure (such as VM) and not an individual platform service. Security of IIoT platform services elasticity: While there are multiple literatures that address security in edge and cloud subsystems [22], [23]; there exists little literature that attempt to perform a holistic analysis of the IIoT infrastructure and study the underlying dependence with respect to security attack and elasticity impacts. STRATFram [24] framework allows the users to specify elasticity models and evaluates the elasticity strategies on the cloud.…”
Section: Security-elasticity Dependenciesmentioning
confidence: 99%
“…An in-depth understanding of the fundamental content of the applications before forwarding the information in the IoV network is of utmost significance. However, the core network procedures are still dependent upon address-content binding even with several advancements in the communication paradigms [8,9]. In case a user wants to request data, it is required to provide the media access control address as well as the internet protocol address (MAC/IP address) of the node from which the data is to be taken.…”
Section: Introductionmentioning
confidence: 99%
“…It is likely to fall into the hands of adversaries who will exploit cryptographic tools to decrypt the data. In addition, security issues occur due to how users commonly take authorization and authentication for granted when designing their systems (Almaiah et al, 2022;Sinha et al, 2022). In particular, in terms of mobile devices, authentication can play a significant influence in reducing and mitigating several unauthorized access and data breaches (Ullah et al, 2019).…”
Section: Introductionmentioning
confidence: 99%