Skip to main content

Research Repository

Advanced Search

TRUTH: Trust and Authentication Scheme in 5G-IIoT

Soleymani, Seyed Ahmad; Goudarzi, Shidrokh; Anisi, Mohammad Hossein; Cruickshank, Haitham; Jindal, Anish; Kama, Nazri

TRUTH: Trust and Authentication Scheme in 5G-IIoT Thumbnail


Authors

Seyed Ahmad Soleymani

Shidrokh Goudarzi

Mohammad Hossein Anisi

Haitham Cruickshank

Nazri Kama



Abstract

Due to the extremely important role of data in the Industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this study, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-party Authenticated Key Exchange (AKE) protocol with privacy-preserving to secure data exchanged via wireless communication, cope with unauthorized entities and ensure data integrity. Moreover, we develop a trust model based on the Dempster-Shafer theory to check the trustworthiness of data collected by smart devices/sensor nodes. Security analysis performed on our scheme demonstrates that it can withstand different well-known attacks in the IIoT environment. We also analyzed the validity of our scheme by using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Additionally, the performance evaluation and experimental results prove the effectiveness of the proposed scheme compared to the existing works in terms of accuracy, delay, trust, and throughput.

Citation

Soleymani, S. A., Goudarzi, S., Anisi, M. H., Cruickshank, H., Jindal, A., & Kama, N. (2023). TRUTH: Trust and Authentication Scheme in 5G-IIoT. IEEE Transactions on Industrial Informatics, 19(1), 880-889. https://doi.org/10.1109/tii.2022.3174718

Journal Article Type Article
Online Publication Date May 12, 2022
Publication Date 2023-01
Deposit Date Oct 28, 2022
Publicly Available Date Oct 31, 2022
Journal IEEE Transactions on Industrial Informatics
Print ISSN 1551-3203
Electronic ISSN 1941-0050
Publisher Institute of Electrical and Electronics Engineers
Peer Reviewed Peer Reviewed
Volume 19
Issue 1
Pages 880-889
DOI https://doi.org/10.1109/tii.2022.3174718
Public URL https://durham-repository.worktribe.com/output/1186816
Related Public URLs http://repository.essex.ac.uk/32841

Files

Accepted Journal Article (1.2 Mb)
PDF

Copyright Statement
© 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.






You might also like



Downloadable Citations