Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things

2018 ◽  
Vol 14 (8) ◽  
pp. 3618-3627 ◽  
Author(s):  
Debiao He ◽  
Mimi Ma ◽  
Sherali Zeadally ◽  
Neeraj Kumar ◽  
Kaitai Liang
2021 ◽  
Vol 17 (3) ◽  
pp. 25-45
Author(s):  
Muthukumaran V. ◽  
Manimozhi I. ◽  
Praveen Sundar P. V. ◽  
Karthikeyan T. ◽  
Magesh Gopu

Organizations have moved from the conventional industries to smart industries by embracing the approach of industrial internet of things (IIoT), which has provided an avenue for the integration of smart devices and communication technologies. In this context, this work presents a public key encryption with equality test based on DLP with decomposition problems over near-ring. The proposed method is highly secure, and it solves the problem of quantum algorithm attacks in industrial internet of thing systems. Further, the proposed system is highly secure, and it prevents the chosen-ciphertext attack in type-I adversary and it is indistinguishable against the random oracle model for the type-II adversary. The proposed scheme is highly secure, and the security analysis measures are comparatively stronger than existing techniques.


Author(s):  
Ganesh Gopal Deverajan ◽  
V. Muthukumaran ◽  
Ching‐Hsien Hsu ◽  
Marimuthu Karuppiah ◽  
Yeh‐Ching Chung ◽  
...  

2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Tianyu Chi ◽  
Baodong Qin ◽  
Dong Zheng

In recent years, it has become popular to upload patients’ medical data to a third-party cloud server (TCS) for storage through medical Internet of things. It can reduce the local maintenance burden of the medical data and importantly improve accuracy in the medical treatment. As remote TCS cannot be fully trusted, medical data should be encrypted before uploading, to protect patients’ privacy. However, encryption makes search capabilities difficult for patients and doctors. To address this issue, Huang et al. recently put forward the notion of Public-key Authenticated Encryption with Keyword Search (PAEKS) against inside keyword guessing attacks. However, the existing PAEKS schemes rely on time-consuming computation of parings. Moreover, some PAEKS schemes still have security issues in a multiuser setting. In this paper, we propose a new and efficient PAEKS scheme, which uses the idea of Diffie-Hellman key agreement to generate a shared secret key between each sender and receiver. The shared key will be used to encrypt keywords by the sender and to generate search trapdoors by the receiver. We prove that our scheme is semantically secure against inside keyword guessing attacks in a multiuser setting, under the oracle Diffie-Hellman assumption. Experimental results demonstrate that our PAEKS scheme is more efficient than that of previous ones, especially in terms of keyword searching time.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 20849-20861 ◽  
Author(s):  
Yulei Zhang ◽  
Xiangzhen Liu ◽  
Xiaoli Lang ◽  
Yongjie Zhang ◽  
Caifen Wang

2020 ◽  
Author(s):  
Karthik Muthineni

The new industrial revolution Industry 4.0, connecting manufacturing process with digital technologies that can communicate, analyze, and use information for intelligent decision making includes Industrial Internet of Things (IIoT) to help manufactures and consumers for efficient controlling and monitoring. This work presents the design and implementation of an IIoT ecosystem for smart factories. The design is based on Siemens Simatic IoT2040, an intelligent industrial gateway that is connected to modbus sensors publishing data onto Network Platform for Internet of Everything (NETPIE). The design demonstrates the capabilities of Simatic IoT2040 by taking Python, Node-Red, and Mosca into account that works simultaneously on the device.


Author(s):  
С.Л. Добрынин ◽  
В.Л. Бурковский

Произведен обзор технологий в рамках концепции четвертой промышленной революции, рассмотрены примеры реализации новых моделей управления технологическими процессами на базе промышленного интернета вещей. Описано техническое устройство основных подсистем системы мониторинга и контроля, служащей для повышения осведомленности о фактическом состоянии производственных ресурсов в особенности станков и аддитивного оборудования в режиме реального времени. Архитектура предлагаемой системы состоит из устройства сбора данных (УСД), реализующего быстрый и эффективный сбор данных от станков и шлюза, передающего ликвидную часть информации в облачное хранилище для дальнейшей обработки и анализа. Передача данных выполняется на двух уровнях: локально в цехе, с использованием беспроводной сенсорной сети (WSN) на базе стека протоколов ZigBee от устройства сбора данных к шлюзам и от шлюзов в облако с использованием интернет-протоколов. Разработан алгоритм инициализации протоколов связи между устройством сбора данных и шлюзом, а также алгоритм выявления неисправностей в сети. Расчет фактического времени обработки станочных подсистем позволяет более эффективно планировать профилактическое обслуживание вместо того, чтобы выполнять задачи обслуживания в фиксированные интервалы без учета времени использования оборудования We carried out a review of technologies within the framework of the concept of the fourth industrial revolution; we considered examples of the implementation of new models of process control based on the industrial Internet of things. We described the technical structure of the main subsystems of the monitoring and control system to increase awareness of the actual state of production resources in particular machine tools and additive equipment in real time. The architecture of the proposed system consists of a data acquisition device (DAD) that implements fast and efficient data collection from machines and a gateway that transfers the liquid part of information to the cloud storage for further processing and analysis. We carried out the data transmission at two levels, locally in the workshop, using a wireless sensor network (WSN) based on ZigBee protocol stack from the data acquisition device to the gateways and from the gateways to the cloud using Internet protocols. An algorithm was developed for initializing communication protocols between a data acquisition device and a gateway, as well as an algorithm for detecting network malfunctions. Calculating the actual machining time of machine subsystems allows us to more efficiently scheduling preventive maintenance rather than performing maintenance tasks at fixed intervals without considering equipment usage


Sign in / Sign up

Export Citation Format

Share Document