TRUTH: trust and authentication scheme in 5G-IIoT.
Due to the extremely important role of data in the industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this article, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-party authenticated key exchange (AKE) protocol wit...
Saved in:
Main Authors: | Soleymani, Seyed Ahmad, Goudarzi, Shidrokh, Anisi, Mohammad Hossein, Cruickshank, Haitham, Jindal, Anish, Kama, Nazri |
---|---|
Format: | Article |
Published: |
IEEE Computer Society
2023
|
Subjects: | |
Online Access: | http://eprints.utm.my/104953/ http://dx.doi.org/10.1109/TII.2022.3174718 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
An evaluation on the comprehensibility of UML activity and state chart diagrams with regard to manual test generation
by: Ibrahim, Haitham Raed
Published: (2017) -
Strategic approach to build customers trust in adoption of internet banking in Nigeria
by: Popoola, Naimot Folake, et al.
Published: (2015) -
Information systems success model in mandatory system usage
by: Monem, Hossein
Published: (2013) -
Integrating user experience assessment in Re-CRUD console framework development
by: Wahi Anuar, Muhammad Asyraf, et al.
Published: (2023) -
Enhancing user acceptance of feedback in reputation systems using social factors
by: Ehsaei, Fereshteh Ghazizadeh
Published: (2013)