Authentication and Cryptography solutions for Industrial IoT-A Study

Rajesh P. Sukumaran, Shajulin Benedict

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The rapid emergence of Internet of Things (IoT) has fueled the wide acceptance of its own extended version Industrial IoT(IIoT). It provides a real-time, robust, and reliable communication in various domains, including robotics, medical sensors, and other software-defined applications. In general, authentication is considered as the prime security control in IIoT systems to ensure that a right user is accessing resources at any specified time. Many research works have been presented in the literature so far with regard to improving the authentication and security aspects of industrial IIoT systems. This paper aims at presenting a comprehensive study on security and authentication aspects in IIoT systems; it highlights the existing cryptographic methods for such IIoT systems. Further, some of the existing research works on the IIoT systems, along with their strengths and weaknesses, are also been reviewed and presented. The work will be useful for researchers or practitioners while applying authentication techniques on IIoT systems.

Original languageEnglish
Title of host publication6th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2022 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages76-81
Number of pages6
ISBN (Electronic)9781665469418
DOIs
StatePublished - 2022
Externally publishedYes
Event6th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2022 - Dharan, Nepal
Duration: 10 Nov 202212 Nov 2022

Publication series

Name6th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2022 - Proceedings

Conference

Conference6th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2022
Country/TerritoryNepal
CityDharan
Period10/11/2212/11/22

Keywords

  • Authentication
  • Cryptography
  • Industrial Internet of Things
  • Internet of Things
  • Security

Fingerprint

Dive into the research topics of 'Authentication and Cryptography solutions for Industrial IoT-A Study'. Together they form a unique fingerprint.

Cite this