Detailed Information

Cited 1 time in webofscience Cited 3 time in scopus
Metadata Downloads

Decision-Making Model for Securing IoT Devices in Smart Industries

Authors
Rathee, G.Garg, S.Kaddoum, G.Choi, B.J.
Issue Date
Jun-2021
Publisher
IEEE Computer Society
Keywords
Configuration security; decision-making; efficient computing; industrial Internet-of-Things (IIoT); intelligent forensics; real-time data processing; simple additive weighting (SAW); Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS)
Citation
IEEE Transactions on Industrial Informatics, v.17, no.6, pp.4270 - 4278
Journal Title
IEEE Transactions on Industrial Informatics
Volume
17
Number
6
Start Page
4270
End Page
4278
URI
http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/40702
DOI
10.1109/TII.2020.3005252
ISSN
1551-3203
Abstract
The industrial Internet-of-Things (IIoT) is a powerful Internet of Things (IoT) application that enables industrial growth by ensuring transparent communication among the various entities of a company such as the manufacturing locations, design hubs, and packaging units. However, current industrial architectures are unable to efficiently deal with advanced security issues that come with this communication due to the distributed and expandable nature of IIoT networks. Furthermore, from a security perspective, malicious devices with the objective of modifying data from within the premises of the network pose a high risk for the IIoT. Therefore, introducing intelligent decision-making models to the IIoT can enhance our ability to examine any collected data in a more structured, efficient, and secure manner. In this article, we provide a decision-making model for securing IIoT data. The proposed model, based on the Technique for Order Preference by Similarity to the Ideal Solution, can provide secure information transmission and recording/storage using various communicating parameters. The degree of trust of the IoT devices is analyzed using these parameters. Simple additive weighting is integrated into the proposed model to remove inefficient and ill-structured parameters. The proposed model is validated using various spectrum sensing and security parameters against a baseline method for the IIoT. Simulation results show that the proposed model is approximately 85% more efficient in identifying malicious nodes and denial-of-service threats compared to the baseline method. © 2005-2012 IEEE.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Choi, Bong Jun photo

Choi, Bong Jun
College of Information Technology (School of Computer Science and Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE