Ajou University repository

An Intelligent HybridMutual Authentication Scheme for Industrial Internet of Thing Networksoa mark
  • Adil, Muhammad ;
  • Ali, Jehad ;
  • Khan, Muhammad Sajjad ;
  • Kim, Junsu ;
  • Alturki, Ryan ;
  • Zakarya, Mohammad ;
  • Khan, Mukhtaj ;
  • Khan, Rahim ;
  • Kim, Su Min
Citations

SCOPUS

11

Citation Export

Publication Year
2021-03-22
Publisher
Tech Science Press
Citation
Computers, Materials and Continua, Vol.68, pp.447-470
Keyword
authentication aware nodesbase stationindustrial Internet of Thingsrouting attacksrouting protocolsSecurity
Mesh Keyword
Authentication schemeCommunication parametersDynamic communicationInternet of Things (IOT)Performance parametersPerformance reliabilityReceived signal strengthSimulation environment
All Science Classification Codes (ASJC)
BiomaterialsModeling and SimulationMechanics of MaterialsComputer Science ApplicationsElectrical and Electronic Engineering
Abstract
Internet of Things (IoT) network used for industrial management is vulnerable to different security threats due to its unstructured deployment, and dynamic communication behavior. In literature various mechanisms addressed the security issue of Industrial IoT networks, but proper maintenance of the performance reliability is among the common challenges. In this paper, we proposed an intelligent mutual authentication scheme leveraging authentication aware node (AAN) and base station (BS) to identify routing attacks in Industrial IoT networks. TheAANand BS uses the communication parameter such as a route request (RREQ), node-ID, received signal strength (RSS), and round-trip time (RTT) information to identify malicious devices and routes in the deployed network. The feasibility of the proposed model is validated in the simulation environment, where OMNeT++ was used as a simulation tool.We compare the results of the proposed model with existing field-proven schemes in terms of routing attacks detection, communication cost, latency, computational cost, and throughput. The results show that our proposed scheme surpasses the previous schemes regarding these performance parameters with the attack detection rate of 97.7 %.
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/31953
DOI
https://doi.org/10.32604/cmc.2021.014967
Fulltext

Type
Article
Funding
(NRF) funded by theFunding Statement: This research was supported by the MSIT (Ministry of Science and ICT), Korea under the ITRC (Information Technology Research Center) support program (IITP-2020-2018-0-01426) supervised by IITP (Institute for Information and Communication Technology Planning & Evaluation) and in part by the National Research Korea government (MSIT) (No. 2019R1F1A1059125).
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

ALI JEHAD Image
ALI JEHADJEHAD, ALI
Department of Software and Computer Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.