Titre : |
Security in critical IoMT and IIoT |
Type de document : |
texte imprimé |
Auteurs : |
Yacine Djetoui, Auteur ; Ayoub Boustila, Auteur |
Année de publication : |
2022 |
Importance : |
1 vol (76 f .) |
Format : |
29cm |
Langues : |
Français (fre) |
Catégories : |
Thèses & Mémoires:Informatique
|
Mots-clés : |
Internet of Things(IoT)
Internet of Medical Things(IoMT) |
Index. décimale : |
004 Informatique |
Résumé : |
In recent years, the Internet of Things has received a lot of attention
as it contains billions of connected devices, these devices capture, collect, analyze
and transmit data between them. This huge number is expected to increase in the
next few years, creating many security issues that will have significant risks related to
data privacy and security, especially medical and industrial data. Therefore, safe and
effective systems must be developed to protect this data. We, initially, review various
recent studies available in the literature that are interested in Internet of Things (IoT),
Internet of Medical Things (IoMT) and Industrial Internt of Things (IIoT) security.
We analyze, compare and classify the different security schemes according to where are
applied in. We propose a new joint Quantum computing and Blockchain delay-aware
security scheme. These two core technologies (Quantum encryption/decryption as well
as Blockchain) secure data transmission between IoMT/ IIoT nodes and the edge of
the network as well as storing them in the edge layer, efficiently. Then we validated
and analyzed the security of the proposed scheme using informal and formal security
analysis and AVISPA as the results showed that our proposed scheme is safe against all
security attacks. Comparisons are made between the proposed scheme and other latest
related works where the results show that it outperforms them considerably by 54.54%
and 47.45% in computation and communication costs, respectively. Additionally, the
numerical results of throughput are significant and so its effectiveness and security
compared to relevant modern methods are demonstrated. |
Côte titre : |
MAI/0651 |
En ligne : |
https://drive.google.com/file/d/1U-xjVwmH1VEGuA1Dhsw8HESCF6RgF-wO/view?usp=share [...] |
Format de la ressource électronique : |
pdf |
Security in critical IoMT and IIoT [texte imprimé] / Yacine Djetoui, Auteur ; Ayoub Boustila, Auteur . - 2022 . - 1 vol (76 f .) ; 29cm. Langues : Français ( fre)
Catégories : |
Thèses & Mémoires:Informatique
|
Mots-clés : |
Internet of Things(IoT)
Internet of Medical Things(IoMT) |
Index. décimale : |
004 Informatique |
Résumé : |
In recent years, the Internet of Things has received a lot of attention
as it contains billions of connected devices, these devices capture, collect, analyze
and transmit data between them. This huge number is expected to increase in the
next few years, creating many security issues that will have significant risks related to
data privacy and security, especially medical and industrial data. Therefore, safe and
effective systems must be developed to protect this data. We, initially, review various
recent studies available in the literature that are interested in Internet of Things (IoT),
Internet of Medical Things (IoMT) and Industrial Internt of Things (IIoT) security.
We analyze, compare and classify the different security schemes according to where are
applied in. We propose a new joint Quantum computing and Blockchain delay-aware
security scheme. These two core technologies (Quantum encryption/decryption as well
as Blockchain) secure data transmission between IoMT/ IIoT nodes and the edge of
the network as well as storing them in the edge layer, efficiently. Then we validated
and analyzed the security of the proposed scheme using informal and formal security
analysis and AVISPA as the results showed that our proposed scheme is safe against all
security attacks. Comparisons are made between the proposed scheme and other latest
related works where the results show that it outperforms them considerably by 54.54%
and 47.45% in computation and communication costs, respectively. Additionally, the
numerical results of throughput are significant and so its effectiveness and security
compared to relevant modern methods are demonstrated. |
Côte titre : |
MAI/0651 |
En ligne : |
https://drive.google.com/file/d/1U-xjVwmH1VEGuA1Dhsw8HESCF6RgF-wO/view?usp=share [...] |
Format de la ressource électronique : |
pdf |
|