TY - GEN
T1 - Authentication and Cryptography solutions for Industrial IoT-A Study
AU - Sukumaran, Rajesh P.
AU - Benedict, Shajulin
N1 - Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - The rapid emergence of Internet of Things (IoT) has fueled the wide acceptance of its own extended version Industrial IoT(IIoT). It provides a real-time, robust, and reliable communication in various domains, including robotics, medical sensors, and other software-defined applications. In general, authentication is considered as the prime security control in IIoT systems to ensure that a right user is accessing resources at any specified time. Many research works have been presented in the literature so far with regard to improving the authentication and security aspects of industrial IIoT systems. This paper aims at presenting a comprehensive study on security and authentication aspects in IIoT systems; it highlights the existing cryptographic methods for such IIoT systems. Further, some of the existing research works on the IIoT systems, along with their strengths and weaknesses, are also been reviewed and presented. The work will be useful for researchers or practitioners while applying authentication techniques on IIoT systems.
AB - The rapid emergence of Internet of Things (IoT) has fueled the wide acceptance of its own extended version Industrial IoT(IIoT). It provides a real-time, robust, and reliable communication in various domains, including robotics, medical sensors, and other software-defined applications. In general, authentication is considered as the prime security control in IIoT systems to ensure that a right user is accessing resources at any specified time. Many research works have been presented in the literature so far with regard to improving the authentication and security aspects of industrial IIoT systems. This paper aims at presenting a comprehensive study on security and authentication aspects in IIoT systems; it highlights the existing cryptographic methods for such IIoT systems. Further, some of the existing research works on the IIoT systems, along with their strengths and weaknesses, are also been reviewed and presented. The work will be useful for researchers or practitioners while applying authentication techniques on IIoT systems.
KW - Authentication
KW - Cryptography
KW - Industrial Internet of Things
KW - Internet of Things
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=85146432046&partnerID=8YFLogxK
U2 - 10.1109/I-SMAC55078.2022.9987278
DO - 10.1109/I-SMAC55078.2022.9987278
M3 - Conference contribution
AN - SCOPUS:85146432046
T3 - 6th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2022 - Proceedings
SP - 76
EP - 81
BT - 6th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2022 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 6th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2022
Y2 - 10 November 2022 through 12 November 2022
ER -