Security and privacy on 6g network edge: A survey

B Mao, J Liu, Y Wu, N Kato - IEEE communications surveys & …, 2023 - ieeexplore.ieee.org
To meet the stringent service requirements of 6G applications such as immersive cloud
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …

Cloud-fog automation: vision, enabling technologies, and future research directions

J Jin, K Yu, J Kua, N Zhang, Z Pang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The Industry 4.0 digital transformation envisages future industrial systems to be fully
automated, including the control, upgrade, and configuration processes of a large number of …

Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things

H Zhong, C Gu, Q Zhang, J Cui, C Gu, D He - Ad Hoc Networks, 2023 - Elsevier
Abstract Industrial Internet of Things (IIoT) is a key technology for building intelligent
manufacturing, optimizing industrial device management, and improving productivity …

Blockchain-based lightweight message authentication for edge-assisted cross-domain industrial internet of things

F Wang, J Cui, Q Zhang, D He, C Gu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In edge-assisted cross-domain Industrial Internet of Things (IIoT), blockchain-based
authentication is an effective way to build cross-domain trust and secure cross-domain data …

SCHEISB: Design of a high efficiency IoMT security model based on sharded chains using bio-inspired optimizations

S Gopikrishnan, P Priakanth, G Srivastava… - Computers and Electrical …, 2023 - Elsevier
Abstract Securing Internet-of-Medical Things (IoMT) devices is a multidomain task that
involves analysis of attack patterns from data & control packets. Existing security models …

Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature Algorithm

T Aljrees, A Kumar, KU Singh, T Singh - Sensors, 2023 - mdpi.com
This research paper introduces a novel paradigm that synergizes innovative algorithms,
namely efficient data encryption, the Quondam Signature Algorithm (QSA), and federated …

Multi-factor based session secret key agreement for the Industrial Internet of Things

J Cui, F Cheng, H Zhong, Q Zhang, C Gu, L Liu - Ad Hoc Networks, 2023 - Elsevier
Abstract Industrial Internet of Things (IIoT) is the main field of application of the Internet of
Things (IoT). The high degree of autonomy and resource constraints of the IIoT network …

A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions

CI Fan, A Karati, SL Wu - IEEE Transactions on Dependable …, 2023 - ieeexplore.ieee.org
For many industrial applications, the smart card is a necessary safety component in user
authentication. Smart cards provided to the users are used in open and public places …

Efficient Revocable Anonymous Authentication Mechanism for Edge Intelligent Controllers

Z Cao, Z Chen, W Shang, Y Zhu - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In the field of industrial control, edge computing puts forward higher requirements for the
local processing ability of data. The traditional industrial programmable logic controller …

Attribute-based Verifiable Outsourcing Decryption Encryption Scheme in IIoT

Y Li, Q Zhang, J Cheng, Y Zhou, J Cui… - … on Networking and …, 2023 - ieeexplore.ieee.org
With the continuous development of the Industrial Internet of Things (IIoT), more and more
private data from IIoT devices is being outsourced to the cloud, and ensuring data privacy is …