A Secure Group Data Encryption Scheme in Intelligent Manufacturing Systems for IIoT

A Secure Group Data Encryption Scheme in Intelligent Manufacturing Systems for IIoT

Ming Te Chen
Copyright: © 2022 |Pages: 12
DOI: 10.4018/IJSI.312577
Article PDF Download
Open access articles are freely available for download

Abstract

In recent years, there are many industries that imported intelligent systems to help them make the intelligent factory and get product record analysis to evaluate product rate. These intelligent systems could generate product records, store them to the on-line database, and provide product rate analysis from these records. Due to the rapid development of internet of things (IoT), the stockholder can construct its own smart factory with the smart intelligent system to develop its own industrial internet of things (IIoT) architecture. With the help of IIoT, the smart intelligence system can collect data information with IoT sensors embedded into each machine in the production line. However, there are some security issues arising between smart intelligent systems and IoT devices. In addition, the authors also discovered that there are fewer methodologies to talk about the data security during the machine transmitting its censored data to the other machines under the same network environment.
Article Preview
Top

Introduction

In recent years, intelligent manufacturing is getting popular in the world. Each industry imports intelligent systems to establish their intelligent product line group and also collects product information from these intelligent systems in order to increase product rate by analyzing these records. At the same time, many traditional industries are located in mid of Taiwan and some of them are also beginning to import intelligent systems into their product line. Most stockholders begin to apply Internet of things (IoT) devices to equip their working machines and also fetch the final production data from them. This has also produced the trend called industrial IoT (IIoT), by which the manufacturing machine can equip some proper IoT devices or sensors to fetch the internal production process information and transfer these censored data to the console dashboard of the stockholder’s terminal machine or cloud service Mell et al. (2009). Under this architecture, the stockholder can become familiar with the status of each machine whether it is working or not. At the same time, each machine also needs the wire or wireless network to transmit its own censored data by using network protocols such as transport layer security (TLS) to withstand the security issue trends Chhetri et al. (2017). However, during transferring these data to the other machine, only applying the TLS protocol or other communication protocol is not enough. Sanchez et al. (2020) thought that the data of the transmitted message also need to be protected well. Hence, the author’s goal is confirming data integrity in the transferring process between machines. The author proposes a secure encryption scheme to withstand a chosen cipher-text attack, so that only a designated machine can decrypt the final cipher-text for the IIoT architecture. On one hand, the author’s proposed scheme could offer a secure encryption framework for intelligent systems to withstand a chosen cipher-text attack to deliver their desired messages. In addition, the author’s scheme offers a constant system group size when intelligent systems increase and provides efficiency comparison in this paper.

Complete Article List

Search this Journal:
Reset
Volume 12: 1 Issue (2024)
Volume 11: 1 Issue (2023)
Volume 10: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 9: 4 Issues (2021)
Volume 8: 4 Issues (2020)
Volume 7: 4 Issues (2019)
Volume 6: 4 Issues (2018)
Volume 5: 4 Issues (2017)
Volume 4: 4 Issues (2016)
Volume 3: 4 Issues (2015)
Volume 2: 4 Issues (2014)
Volume 1: 4 Issues (2013)
View Complete Journal Contents Listing