SwePub
Sök i LIBRIS databas

  Extended search

onr:"swepub:oai:DiVA.org:ltu-92660"
 

Search: onr:"swepub:oai:DiVA.org:ltu-92660" > Federated Hierarchi...

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist
  • Li, ChaoState Key Laboratory of information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, China (author)

Federated Hierarchical Trust-based Interaction Scheme for Cross-domain Industrial IoT

  • Article/chapterEnglish2023

Publisher, publication year, extent ...

  • IEEE,2023
  • printrdacarrier

Numbers

  • LIBRIS-ID:oai:DiVA.org:ltu-92660
  • https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-92660URI
  • https://doi.org/10.1109/jiot.2022.3200854DOI

Supplementary language notes

  • Language:English
  • Summary in:English

Part of subdatabase

Classification

  • Subject category:ref swepub-contenttype
  • Subject category:art swepub-publicationtype

Notes

  • Funder: Beijing Natural Science Foundation (grant no. 4202050); NSFC project (grant no. 61871056 and 62122015); Fund of SKL of IPOC (grant no. IPOC2020A004 and (IPOC2021ZT04)
  • The Industrial Internet of Things (IIoT) is considered to be one of the most promising revolutionary technologies to increase productivity. With the refined development of manufacturing, the entire manufacturing process is split up into several areas of IoT production. Devices from different domains cooperate to perform the same task, which cause security problems in interacted communication among them. Existing authentication methods cause heavy key management overhead or rely on a trusted third party. It is imperative to protect privacy and ensure the credibility of the device during device interaction. This paper proposes a federated hierarchical trust interaction scheme (FHTI) for the cross-domain industrial IoT. It builds a low-privacy network platform through blockchain and protects the data privacy of the IIoT. A hierarchical trust mechanism based on federated detection is designed to realize the unified trust evaluation of cross-domain devices. A trusted cross-domain method based on device trust value is designed to ensure the security and trustworthiness of cross-domain devices. The simulation results show that the FHTI scheme can improve the speed of identity authentication and the detection accuracy of malicious devices.

Subject headings and genre

Added entries (persons, corporate bodies, meetings, titles ...)

  • Yang, HuiState Key Laboratory of information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, China (author)
  • Sun, ZhengjieState Key Laboratory of information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, China (author)
  • Yao, QiuyanState Key Laboratory of information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, China (author)
  • Bao, BowenState Key Laboratory of information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, China (author)
  • Zhang, JieState Key Laboratory of information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, China (author)
  • Vasilakos, AthanasiosCollege of Mathematics and Computer Science, Fuzhou University, Fuzhou, China; Center for AI Research, University of Agder, Grimstad, Norway(Swepub:ltu)thanos (author)
  • State Key Laboratory of information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, ChinaCollege of Mathematics and Computer Science, Fuzhou University, Fuzhou, China; Center for AI Research, University of Agder, Grimstad, Norway (creator_code:org_t)

Related titles

  • In:IEEE Internet of Things Journal: IEEE10:1, s. 447-4572327-46622372-2541

Internet link

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view