收录:
摘要:
When terminal devices attempt to access the industrial internet of things (IIoT), preventing illegal access from untrusted terminals becomes challenging. This difficulty arises because most devices adopt the commonly used traditional methods of accessing the internet of things. To address this challenge, we propose a perception-layer-based IIoT trusted connection architecture, derived from the trusted connection architecture (TCA), and names it TCA-IIoT. This architecture enables bidirectional identity and platform integrity authentication between access points and terminals, while also ensuring trusted authentication of IIoT terminal behavior. To validate the effectiveness of TCA-IIoT, the paper details a simulation experiment. This experiment centers on evaluating the success rate of data transmission and measuring the average delay under various conditions, including scenarios with malicious nodes. The results of the study indicate that TCA-IIoT markedly improves the security and reliability of IIoT networks, advancements that are vital for the sustainable development and broader application of these systems. © 2024 John Wiley & Sons Ltd.
关键词:
通讯作者信息:
电子邮件地址:
来源 :
Concurrency and Computation: Practice and Experience
ISSN: 1532-0626
年份: 2024
期: 25
卷: 36
2 . 0 0 0
JCR@2022
归属院系: