An Intelligent Hybrid Mutual Authentication Scheme for Industrial Internet of Thing Networks |
| |
Authors: | Muhammad Adil Jehad Ali Muhammad Sajjad Khan Junsu Kim Ryan Alturki Mohammad Zakarya Mukhtaj Khan Rahim Khan Su Min Kim |
| |
Affiliation: | 1.Department of Computer Science, Virtual University of Pakistan, Lahore, 54000, Pakistan2 Department of Computer Engineering, Department of AI Convergence Network, Ajou University, Suwon, 16499, South Korea3 Department of Electronics Engineering, Korea Polytechnic University, Slheung, South Korea4 Department of Computer Science, Abdul Wali Khan University Mardan, 23200, Pakistan |
| |
Abstract: | Internet of Things (IoT) network used for industrial management is vulnerable to different security threats due to its unstructured deployment, and dynamic communication behavior. In literature various mechanisms addressed the security issue of Industrial IoT networks, but proper maintenance of the performance reliability is among the common challenges. In this paper, we proposed an intelligent mutual authentication scheme leveraging authentication aware node (AAN) and base station (BS) to identify routing attacks in Industrial IoT networks. The AAN and BS uses the communication parameter such as a route request (RREQ), node-ID, received signal strength (RSS), and round-trip time (RTT) information to identify malicious devices and routes in the deployed network. The feasibility of the proposed model is validated in the simulation environment, where OMNeT++ was used as a simulation tool. We compare the results of the proposed model with existing field-proven schemes in terms of routing attacks detection, communication cost, latency, computational cost, and throughput. The results show that our proposed scheme surpasses the previous schemes regarding these performance parameters with the attack detection rate of 97.7 %. |
| |
Keywords: | Security industrial Internet of Things routing attacks routing protocols base station authentication aware nodes |
|
| 点击此处可从《》浏览原始摘要信息 |
|
点击此处可从《》下载全文 |
|