Security Challenges for Industrial IoT

Author(s):  
Lehlogonolo P. I. Ledwaba ◽  
Gerhard P. Hancke
Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1428
Author(s):  
Haqi Khalid ◽  
Shaiful Jahari Hashim ◽  
Sharifah Mumtazah Syed Ahmad ◽  
Fazirulhisyam Hashim ◽  
Muhammad Akmal Chaudhary

The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to obtain access to multiple application located in different geographical locations. Fog users at the network’s edge communicate with many fog servers in different fogs and newly joined servers that they had never contacted before. This communication complexity brings enormous security challenges and potential vulnerability to malicious threats. The attacker may replace the edge device with a fake one and authenticate it as a legitimate device. Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. We proved our scheme using Burrows Abdi Needham’s logic (BAN logic) to prove secure mutual authentication. The results show that the SELAMAT scheme provides better security, functionality, communication, and computation cost than the existing schemes.


2018 ◽  
Vol 42 ◽  
pp. 316-321
Author(s):  
Boris I. Ananyev ◽  
Daniil A. Parenkov

The aim of the article is to show the role of parliament in the foreign policy within the framework of the conservative school of thought. The authors examine both Russian and Western traditions of conservatism and come to the conclusion that the essential idea of “the rule of the best” has turned to be one of the basic elements of the modern legislative body per se. What’s more, parliament, according to the conservative approach, tends to be the institution that represents the real spirit of the nation and national interests. Therefore the interaction of parliaments on the international arena appears to be the form of the organic communication between nations. Parliamentary diplomacy today is the tool that has the potential to address to the number of issues that are difficult to deal with within the framework of the traditional forms of IR: international security, challenges posed by new technologies, international sanctions and other.


2012 ◽  
Vol 3 (2) ◽  
pp. 419-423
Author(s):  
JARUPULA RAJESHWAR ◽  
Dr G NARSIMHA

A freely moving nodes forming as group to communicate among themselves are called as Mobile AdHoc Networks (MANET). Many applications are choosing this MANET for effective commutation due to its flexible nature in forming a network. But due to its openness characteristics it is posing many security challenges. As it has highly dynamic network topology security for routing is playing a major role. We have very good routing protocols for route discovery as well as for transporting data packers but most of them lack the feature of security like AODV. In this paper we are studying the basic protocol AODV and identify how it can be made secure. We are studying a protocol S-AODV which is a security extension of AODV which is called Secure AODV (S-AODV) and we are studying enhanced version of S-AODV routing protocol a Adaptive Secure AODV (A-SAODV). Finally we have described about the parameter to be taken for performance evaluation of different secure routing protocols


2018 ◽  
Vol 6 (7) ◽  
pp. 981-985
Author(s):  
Dinesh Singh ◽  
Dayanand . ◽  
Arushi Arya
Keyword(s):  
Big Data ◽  

2018 ◽  
Vol 6 (5) ◽  
pp. 906-915
Author(s):  
Swati Agarwal ◽  
◽  
◽  
◽  
Rupinder Kaur ◽  
...  

2017 ◽  
Vol 6 (1) ◽  
pp. 10
Author(s):  
SHREEKANTH T. ◽  
SOWRABHU D ◽  
◽  

Sign in / Sign up

Export Citation Format

Share Document