Affiliation:
1. School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing 100876 China
2. Faculty of Information Technology Beijing University of Technology Beijing 100124 China
Abstract
AbstractWhen terminal devices attempt to access the industrial internet of things (IIoT), preventing illegal access from untrusted terminals becomes challenging. This difficulty arises because most devices adopt the commonly used traditional methods of accessing the internet of things. To address this challenge, we propose a perception‐layer‐based IIoT trusted connection architecture, derived from the trusted connection architecture (TCA), and names it TCA‐IIoT. This architecture enables bidirectional identity and platform integrity authentication between access points and terminals, while also ensuring trusted authentication of IIoT terminal behavior. To validate the effectiveness of TCA‐IIoT, the paper details a simulation experiment. This experiment centers on evaluating the success rate of data transmission and measuring the average delay under various conditions, including scenarios with malicious nodes. The results of the study indicate that TCA‐IIoT markedly improves the security and reliability of IIoT networks, advancements that are vital for the sustainable development and broader application of these systems.
Reference20 articles.
1. IndexCVN.Cisco visual networking index: forecast and methodology. CISCO White paper.2017.
2. ChibaudelQ JoaquimB VéroniqueLN MounirM.Human centered design conception applied to the internet of things: Contribution and interest.201811‐22.
3. Towards Sustainable Water Supply: Schematic Development of Big Data Collection Using Internet of Things (IoT)
4. “IoT FOR ENVIRONMENTAL VARIABLES IN URBAN AREAS”
5. The role of big data analytics in industrial Internet of Things