Authentication and Cryptography solutions for Industrial IoT-A Study

Rajesh P. Sukumaran, Shajulin Benedict

Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

1 Zitat (Scopus)

Abstract

The rapid emergence of Internet of Things (IoT) has fueled the wide acceptance of its own extended version Industrial IoT(IIoT). It provides a real-time, robust, and reliable communication in various domains, including robotics, medical sensors, and other software-defined applications. In general, authentication is considered as the prime security control in IIoT systems to ensure that a right user is accessing resources at any specified time. Many research works have been presented in the literature so far with regard to improving the authentication and security aspects of industrial IIoT systems. This paper aims at presenting a comprehensive study on security and authentication aspects in IIoT systems; it highlights the existing cryptographic methods for such IIoT systems. Further, some of the existing research works on the IIoT systems, along with their strengths and weaknesses, are also been reviewed and presented. The work will be useful for researchers or practitioners while applying authentication techniques on IIoT systems.

OriginalspracheEnglisch
Titel6th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2022 - Proceedings
Herausgeber (Verlag)Institute of Electrical and Electronics Engineers Inc.
Seiten76-81
Seitenumfang6
ISBN (elektronisch)9781665469418
DOIs
PublikationsstatusVeröffentlicht - 2022
Extern publiziertJa
Veranstaltung6th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2022 - Dharan, Nepal
Dauer: 10 Nov. 202212 Nov. 2022

Publikationsreihe

Name6th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2022 - Proceedings

Konferenz

Konferenz6th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2022
Land/GebietNepal
OrtDharan
Zeitraum10/11/2212/11/22

Fingerprint

Untersuchen Sie die Forschungsthemen von „Authentication and Cryptography solutions for Industrial IoT-A Study“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren