Efficient unpaired data validation and aggregation protocol in industrial Internet of things
As a cornerstone technology of smart manufacturing, the industrial Internet of things (IIoT) harnesses efficient data sharing to propel the networking, digitization, and intellectualization of industrial production, thereby assisting manufacturing enterprises in cost reduction, efficiency enhancemen...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2024-10-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024215/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537089755152384 |
---|---|
author | MA Rong FENG Tao |
author_facet | MA Rong FENG Tao |
author_sort | MA Rong |
collection | DOAJ |
description | As a cornerstone technology of smart manufacturing, the industrial Internet of things (IIoT) harnesses efficient data sharing to propel the networking, digitization, and intellectualization of industrial production, thereby assisting manufacturing enterprises in cost reduction, efficiency enhancement, and bolstering their core competitiveness. Nevertheless, the limited resources inherent in industrial production field devices have posed significant hurdles to IIoT’s development, primarily due to the high computational costs of maintaining system security and vulnerabilities that render it susceptible to various attacks. To address these challenges and enhance the robustness, security, and efficiency of industrial systems, an efficient unpaired verification and aggregation (EUVA) protocol was proposed. Within the context of an IIoT environment based on elliptic curve cryptography, homomorphic encryption was emploied to safeguard data privacy and a verification key management scheme was introduced, facilitating secure and efficient unpaired verification. Furthermore, security analysis demonstrates that the proposed protocol meets the outlined security objectives. Finally, performance analysis conducted using MIRACL reveals that the EUVA protocol outperforms previous similar mechanisms in terms of computational communication costs and energy consumption. |
format | Article |
id | doaj-art-059edc5d0f764bf3b9201e5f7e463176 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2024-10-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-059edc5d0f764bf3b9201e5f7e4631762025-01-14T08:46:49ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2024-10-0145415079872258Efficient unpaired data validation and aggregation protocol in industrial Internet of thingsMA RongFENG TaoAs a cornerstone technology of smart manufacturing, the industrial Internet of things (IIoT) harnesses efficient data sharing to propel the networking, digitization, and intellectualization of industrial production, thereby assisting manufacturing enterprises in cost reduction, efficiency enhancement, and bolstering their core competitiveness. Nevertheless, the limited resources inherent in industrial production field devices have posed significant hurdles to IIoT’s development, primarily due to the high computational costs of maintaining system security and vulnerabilities that render it susceptible to various attacks. To address these challenges and enhance the robustness, security, and efficiency of industrial systems, an efficient unpaired verification and aggregation (EUVA) protocol was proposed. Within the context of an IIoT environment based on elliptic curve cryptography, homomorphic encryption was emploied to safeguard data privacy and a verification key management scheme was introduced, facilitating secure and efficient unpaired verification. Furthermore, security analysis demonstrates that the proposed protocol meets the outlined security objectives. Finally, performance analysis conducted using MIRACL reveals that the EUVA protocol outperforms previous similar mechanisms in terms of computational communication costs and energy consumption.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024215/industrial Internet of thingsunpaired verificationdata aggregationkey managementsecurity analysis |
spellingShingle | MA Rong FENG Tao Efficient unpaired data validation and aggregation protocol in industrial Internet of things Tongxin xuebao industrial Internet of things unpaired verification data aggregation key management security analysis |
title | Efficient unpaired data validation and aggregation protocol in industrial Internet of things |
title_full | Efficient unpaired data validation and aggregation protocol in industrial Internet of things |
title_fullStr | Efficient unpaired data validation and aggregation protocol in industrial Internet of things |
title_full_unstemmed | Efficient unpaired data validation and aggregation protocol in industrial Internet of things |
title_short | Efficient unpaired data validation and aggregation protocol in industrial Internet of things |
title_sort | efficient unpaired data validation and aggregation protocol in industrial internet of things |
topic | industrial Internet of things unpaired verification data aggregation key management security analysis |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024215/ |
work_keys_str_mv | AT marong efficientunpaireddatavalidationandaggregationprotocolinindustrialinternetofthings AT fengtao efficientunpaireddatavalidationandaggregationprotocolinindustrialinternetofthings |