2022
DOI: 10.1155/2022/7336279
|View full text |Cite
|
Sign up to set email alerts
|

Certificate-Based Signature Scheme for Industrial Internet of Things Using Hyperelliptic Curve Cryptography

Abstract: The Industrial Internet of Things (IIoT) is a technology that uses the Internet of Things (IoT) infrastructure to sense, process, and communicate real-time events in the industrial system to cut down on unnecessary operating costs and to speed up industrial automation of internal and external working processes. Since the IIoT system inherits the same cyber-physical vulnerabilities that the IoT system already encounters, it requires additional work to address security concerns owing to its heterogeneous nature.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Then, IoT devices give the updated key and generated data to the controller by using Bluetooth technology. Bluetooth technology enables wireless communication between devices without the use of wires or cables [6]. It is based on short-range radio frequency, and any device equipped with the technology can communicate if it is within a specified distance.…”
Section: Network Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Then, IoT devices give the updated key and generated data to the controller by using Bluetooth technology. Bluetooth technology enables wireless communication between devices without the use of wires or cables [6]. It is based on short-range radio frequency, and any device equipped with the technology can communicate if it is within a specified distance.…”
Section: Network Modelmentioning
confidence: 99%
“…The forward signature may be public key infrastructure-based (PKI-based) or identity-based (IDbased); however, in a PKI-based digital forward signature, there are certificate revocation Moreover, drones are also used by most border patrol officers that monitor criminal activity on the border, mainly smuggling of drugs. This huge variation, the increasing management and interaction of devices, and the usage of public networks for the transfer of massive volumes of data make IoT systems an ideal target for hacker attacks [6]. IoT privacy and the safety of devices are linked, e.g., producing accidents by interrupting automotive networks, placing farms in danger by tampering with a farming network, invasion of privacy, power consumption, and poor data security in smart cities, the bricksized batteries consumed by drones being heavy and losing energy quickly, memory limitations, and chances of malware and virus threats in the information shared by drones, etc.…”
Section: Introductionmentioning
confidence: 99%