2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM) 2022
DOI: 10.1109/iciptm54933.2022.9754198
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Authentication via Unclonable Functions for Industrial Internet-of-Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…2) Present remedy and how the EXAI can be useful: Automation and AI-based decisions can assist system experts and module operators to make decisions properly and quickly when their tasks entail complex systems and procedures. However, the processes and product-related decisions require its authentication in terms of certifications and verification [121]. Therefore, explanations must be provided for these decisions for the AI models associated with the digital twin and collaborative robots.…”
Section: B Explainable Ai and Digital Twinsmentioning
confidence: 99%
“…2) Present remedy and how the EXAI can be useful: Automation and AI-based decisions can assist system experts and module operators to make decisions properly and quickly when their tasks entail complex systems and procedures. However, the processes and product-related decisions require its authentication in terms of certifications and verification [121]. Therefore, explanations must be provided for these decisions for the AI models associated with the digital twin and collaborative robots.…”
Section: B Explainable Ai and Digital Twinsmentioning
confidence: 99%
“…109 However, recent trends in security have shown that the majority of the existing CLS methods are vulnerable to several widespread security flaws, including distributed denial-of-service attacks, key generation center-based attacks (master key compromise), and the man-in-the-middle attacks. 110 Thus, conventional CLS schemes are now replaced by advanced crypto primitives and concepts. We present advanced primitives for discussion: redactable blockchains, post-quantum cryptography, lattice-based encryption, and zero-knowledge proofs.…”
Section: Recent Trends In Blockchain Securitymentioning
confidence: 99%
“…Thus, the industrial perimeters must have strong security and privacy in place. Furthermore, as BC technology has matured, it would form a trusted perimeter where the internal applications can have authentication and authorization in place [41]. Thus, the integration of BC in Industry 5.0 verticals is required to be discussed.…”
Section: E Survey Gapsmentioning
confidence: 99%