Mostrar el registro sencillo del ítem
TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT
dc.contributor.author | Dejene, Dawit | |
dc.contributor.author | Tiwari, Basant | |
dc.contributor.author | Tiwari, Vivek | |
dc.date | 2020-12 | |
dc.date.accessioned | 2022-04-05T09:40:11Z | |
dc.date.available | 2022-04-05T09:40:11Z | |
dc.identifier.issn | 1989-1660 | |
dc.identifier.uri | https://reunir.unir.net/handle/123456789/12812 | |
dc.description.abstract | The Internet of Things (IoT) is an emerging technology, which comprises wireless smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart Homes, Smart Cities, Smart Industries, Military, eHealth, and several real-world applications by connecting domain-specific sensors. Designing a security model for these applications is challenging for researchers since attacks (for example, zero-day) are increasing tremendously. Several security methods have been developed to ensure the CIA (Confidentiality, Integrity, and Availability) for Industrial IoT (IIoT). Though these methods have shown promising results, there are still some security issues that are open. Thus, the security and authentication of IoT based applications become quite significant. In this paper, we propose TD2SecIoT (Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT), which incorporates Elliptic Curve Cryptography (ECC) and Nth-degree Truncated Polynomial Ring Units (NTRU) methods to ensure confidentiality and integrity. The proposed method has been evaluated against different attacks and performance measures (quantitative and qualitative) using the Cooja network simulator with Contiki-OS. The TD2SecIoT has shown a higher security level with reduced computational cost and time. | es_ES |
dc.language.iso | eng | es_ES |
dc.publisher | International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI) | es_ES |
dc.relation.ispartofseries | ;vol. 6, nº 4 | |
dc.relation.uri | https://www.ijimai.org/journal/bibcite/reference/2824 | es_ES |
dc.rights | openAccess | es_ES |
dc.subject | cryptography | es_ES |
dc.subject | elliptic curve cryptography (ECC) | es_ES |
dc.subject | internet of things | es_ES |
dc.subject | Nth-degree truncated polynomial ring units (NTRU) | es_ES |
dc.subject | security | es_ES |
dc.subject | confidenciality | es_ES |
dc.subject | integrity | es_ES |
dc.subject | confidentiality, integrity, and Availability (CIA) | es_ES |
dc.subject | IJIMAI | es_ES |
dc.title | TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT | es_ES |
dc.type | article | es_ES |
reunir.tag | ~IJIMAI | es_ES |
dc.identifier.doi | https://doi.org/10.9781/ijimai.2020.10.002 |