Journals / CMC / Vol.,
Table of Content

Research Article

BEST PAPER 2021

Security Issues in Industrial Internet of Things


Submission Deadline: 15 November 2020 (closed)

Abstract

This article has no abstract.

Keywords

Industrial IoT, Security, Machine Learning, Threat
  • Research Article

    BEST PAPER 2021

    Secure Multifactor Remote Access User Authentication Framework for IoT Networks

    Mohammed Mujib Alshahrani* CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3235-3254, 2021, DOI:10.32604/cmc.2021.015310
    Abstract The term IoT refers to the interconnection and exchange of data among devices/sensors. IoT devices are often small, low cost, and have limited resources. The IoT issues and challenges are growing increasingly. Security and privacy issues are among the most important concerns in IoT applications, such as smart buildings. Remote cybersecurity attacks are the attacks which do not require physical access to the IoT networks, where the attacker can remotely access and communicate with the IoT devices through a wireless communication channel. Thus, remote cybersecurity attacks are a significant threat. Emerging applications in smart environments such as smart buildings require… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    An Intelligent Hybrid Mutual Authentication Scheme for Industrial Internet of Thing Networks

    Muhammad Adil1, Jehad Ali2, Muhammad Sajjad Khan3, Junsu Kim3, Ryan Alturki4, Mohammad Zakarya4, Mukhtaj Khan4, Rahim Khan4, Su Min Kim3,* CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 447-470, 2021, DOI:10.32604/cmc.2021.014967
    Abstract Internet of Things (IoT) network used for industrial management is vulnerable to different security threats due to its unstructured deployment, and dynamic communication behavior. In literature various mechanisms addressed the security issue of Industrial IoT networks, but proper maintenance of the performance reliability is among the common challenges. In this paper, we proposed an intelligent mutual authentication scheme leveraging authentication aware node (AAN) and base station (BS) to identify routing attacks in Industrial IoT networks. The AAN and BS uses the communication parameter such as a route request (RREQ), node-ID, received signal strength (RSS), and round-trip time (RTT) information to… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    Service-Aware Access Control Procedure for Blockchain Assisted Real-Time Applications

    Alaa Omran Almagrabi1,*, A. K. Bashir2 CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3649-3667, 2021, DOI:10.32604/cmc.2021.015056
    Abstract The design of distributed ledger, Asymmetric Key Algorithm (AKA) blockchain systems, is prominent in administering security and access control in various real-time services and applications. The assimilation of blockchain systems leverages the reliable access and secure service provisioning of the services. However, the distributed ledger technology’s access control and chained decisions are defaced by pervasive and service unawareness. It results in degrading security through unattended access control for limited-service users. In this article, a service-aware access control procedure (SACP) is introduced to address the afore-mentioned issue. The proposed SACP defines attended access control for all the service session by identifying… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    SAPEM: Secure Attestation of Program Execution and Program Memory for IoT Applications

    Nafisa Ahmed1, Manar Abu Talib2,*, Qassim Nasir3 CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 23-49, 2021, DOI:10.32604/cmc.2021.014523
    Abstract Security is one of the major challenges that devices connected to the Internet of Things (IoT) face today. Remote attestation is used to measure these devices’ trustworthiness on the network by measuring the device platform’s integrity. Several software-based attestation mechanisms have been proposed, but none of them can detect runtime attacks. Although some researchers have attempted to tackle these attacks, the proposed techniques require additional secured hardware parts to be integrated with the attested devices to achieve their aim. These solutions are expensive and not suitable in many cases. This paper proposes a dual attestation process, SAPEM, with two phases:… More >

    Graphic Abstract

Share Link

WeChat scan