Efficient unpaired data validation and aggregation protocol in industrial Internet of things

As a cornerstone technology of smart manufacturing, the industrial Internet of things (IIoT) harnesses efficient data sharing to propel the networking, digitization, and intellectualization of industrial production, thereby assisting manufacturing enterprises in cost reduction, efficiency enhancemen...

Full description

Saved in:
Bibliographic Details
Main Authors: MA Rong, FENG Tao
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2024-10-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024215/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537089755152384
author MA Rong
FENG Tao
author_facet MA Rong
FENG Tao
author_sort MA Rong
collection DOAJ
description As a cornerstone technology of smart manufacturing, the industrial Internet of things (IIoT) harnesses efficient data sharing to propel the networking, digitization, and intellectualization of industrial production, thereby assisting manufacturing enterprises in cost reduction, efficiency enhancement, and bolstering their core competitiveness. Nevertheless, the limited resources inherent in industrial production field devices have posed significant hurdles to IIoT’s development, primarily due to the high computational costs of maintaining system security and vulnerabilities that render it susceptible to various attacks. To address these challenges and enhance the robustness, security, and efficiency of industrial systems, an efficient unpaired verification and aggregation (EUVA) protocol was proposed. Within the context of an IIoT environment based on elliptic curve cryptography, homomorphic encryption was emploied to safeguard data privacy and a verification key management scheme was introduced, facilitating secure and efficient unpaired verification. Furthermore, security analysis demonstrates that the proposed protocol meets the outlined security objectives. Finally, performance analysis conducted using MIRACL reveals that the EUVA protocol outperforms previous similar mechanisms in terms of computational communication costs and energy consumption.
format Article
id doaj-art-059edc5d0f764bf3b9201e5f7e463176
institution Kabale University
issn 1000-436X
language zho
publishDate 2024-10-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-059edc5d0f764bf3b9201e5f7e4631762025-01-14T08:46:49ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2024-10-0145415079872258Efficient unpaired data validation and aggregation protocol in industrial Internet of thingsMA RongFENG TaoAs a cornerstone technology of smart manufacturing, the industrial Internet of things (IIoT) harnesses efficient data sharing to propel the networking, digitization, and intellectualization of industrial production, thereby assisting manufacturing enterprises in cost reduction, efficiency enhancement, and bolstering their core competitiveness. Nevertheless, the limited resources inherent in industrial production field devices have posed significant hurdles to IIoT’s development, primarily due to the high computational costs of maintaining system security and vulnerabilities that render it susceptible to various attacks. To address these challenges and enhance the robustness, security, and efficiency of industrial systems, an efficient unpaired verification and aggregation (EUVA) protocol was proposed. Within the context of an IIoT environment based on elliptic curve cryptography, homomorphic encryption was emploied to safeguard data privacy and a verification key management scheme was introduced, facilitating secure and efficient unpaired verification. Furthermore, security analysis demonstrates that the proposed protocol meets the outlined security objectives. Finally, performance analysis conducted using MIRACL reveals that the EUVA protocol outperforms previous similar mechanisms in terms of computational communication costs and energy consumption.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024215/industrial Internet of thingsunpaired verificationdata aggregationkey managementsecurity analysis
spellingShingle MA Rong
FENG Tao
Efficient unpaired data validation and aggregation protocol in industrial Internet of things
Tongxin xuebao
industrial Internet of things
unpaired verification
data aggregation
key management
security analysis
title Efficient unpaired data validation and aggregation protocol in industrial Internet of things
title_full Efficient unpaired data validation and aggregation protocol in industrial Internet of things
title_fullStr Efficient unpaired data validation and aggregation protocol in industrial Internet of things
title_full_unstemmed Efficient unpaired data validation and aggregation protocol in industrial Internet of things
title_short Efficient unpaired data validation and aggregation protocol in industrial Internet of things
title_sort efficient unpaired data validation and aggregation protocol in industrial internet of things
topic industrial Internet of things
unpaired verification
data aggregation
key management
security analysis
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024215/
work_keys_str_mv AT marong efficientunpaireddatavalidationandaggregationprotocolinindustrialinternetofthings
AT fengtao efficientunpaireddatavalidationandaggregationprotocolinindustrialinternetofthings