Sökning: L773:2327 4662 >
Federated Hierarchi...
-
Li, ChaoState Key Laboratory of information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, China
(författare)
Federated Hierarchical Trust-based Interaction Scheme for Cross-domain Industrial IoT
- Artikel/kapitelEngelska2023
Förlag, utgivningsår, omfång ...
-
IEEE,2023
-
printrdacarrier
Nummerbeteckningar
-
LIBRIS-ID:oai:DiVA.org:ltu-92660
-
https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-92660URI
-
https://doi.org/10.1109/jiot.2022.3200854DOI
Kompletterande språkuppgifter
-
Språk:engelska
-
Sammanfattning på:engelska
Ingår i deldatabas
Klassifikation
-
Ämneskategori:ref swepub-contenttype
-
Ämneskategori:art swepub-publicationtype
Anmärkningar
-
Funder: Beijing Natural Science Foundation (grant no. 4202050); NSFC project (grant no. 61871056 and 62122015); Fund of SKL of IPOC (grant no. IPOC2020A004 and (IPOC2021ZT04)
-
The Industrial Internet of Things (IIoT) is considered to be one of the most promising revolutionary technologies to increase productivity. With the refined development of manufacturing, the entire manufacturing process is split up into several areas of IoT production. Devices from different domains cooperate to perform the same task, which cause security problems in interacted communication among them. Existing authentication methods cause heavy key management overhead or rely on a trusted third party. It is imperative to protect privacy and ensure the credibility of the device during device interaction. This paper proposes a federated hierarchical trust interaction scheme (FHTI) for the cross-domain industrial IoT. It builds a low-privacy network platform through blockchain and protects the data privacy of the IIoT. A hierarchical trust mechanism based on federated detection is designed to realize the unified trust evaluation of cross-domain devices. A trusted cross-domain method based on device trust value is designed to ensure the security and trustworthiness of cross-domain devices. The simulation results show that the FHTI scheme can improve the speed of identity authentication and the detection accuracy of malicious devices.
Ämnesord och genrebeteckningar
Biuppslag (personer, institutioner, konferenser, titlar ...)
-
Yang, HuiState Key Laboratory of information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, China
(författare)
-
Sun, ZhengjieState Key Laboratory of information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, China
(författare)
-
Yao, QiuyanState Key Laboratory of information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, China
(författare)
-
Bao, BowenState Key Laboratory of information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, China
(författare)
-
Zhang, JieState Key Laboratory of information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, China
(författare)
-
Vasilakos, AthanasiosCollege of Mathematics and Computer Science, Fuzhou University, Fuzhou, China; Center for AI Research, University of Agder, Grimstad, Norway(Swepub:ltu)thanos
(författare)
-
State Key Laboratory of information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, ChinaCollege of Mathematics and Computer Science, Fuzhou University, Fuzhou, China; Center for AI Research, University of Agder, Grimstad, Norway
(creator_code:org_t)
Sammanhörande titlar
-
Ingår i:IEEE Internet of Things Journal: IEEE10:1, s. 447-4572327-46622372-2541
Internetlänk
Hitta via bibliotek
Till lärosätets databas