Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA

Iuon-Chang Lin, Chin-Chen Chang, Yu-Sung Chang
2022 Symmetry  
In the Internet of Things (IoT), many devices can communicate with each other directly through the Internet, and there are already good applications in transportation systems, smart meters, and smart home appliances. Wireless sensor networks are used in these Internet of things applications. Playing a vital role, the upload of data requires multiple layers of transmission to reach the cloud. In the industrial control field, many IoT devices upload data to the cloud for storage, but the upload
more » ... ocess is easily tampered with, and centralized cloud services also have security concerns. In addition, in the local IoT perception layer among them, the security of sensor identity verification is also very important for message transmission. The main reason why the past blockchain technology could not be widely used in industrial control and other application fields is the cost considerations, because the procedures for running blockchain nodes and uploading transactions are too expensive. Therefore, this paper proposes an IoT architecture based on the IOTA Tangle network to solve the centralization problem of IoT storage in the cloud, and uses the method of MAM (Masked Authenticated Message) to trace the information of WSNs, while achieving data security and data preservation. In the edge devices of WSNs, because of the insufficient memory and computing performance of many devices, it is impossible to perform proof of work calculations. Therefore, this paper uses the logical key hierarchy-based method to manage the sensors, and applies symmetric and asymmetric encryption in blockchain. The identity verification of the device can be effectively achieved, and the operating cost can be effectively reduced.
doi:10.3390/sym14020237 fatcat:cgrwfsroqnednas3lviwrz52gi