Abstract
Keywords
1. Introduction
2. Related surveys
3. Preliminaries
4. Taxonomy for the proposed survey
5. Certificateless signature solutions for IIoT
6. Comparative analysis
7. Challenges and open research issues
8. Future work
9. Conclusion
CRediT authorship contribution statement
Declaration of Competing Interest
Acknowledgments
References
Abstract
Internet of Things (IoT), which is a growing domain, provides a universal connection to the Internet by spinning common objects to connected ones by changing the way people communicate and interact with the things around them. This type of setup paves the way for the creation of interconnected infrastructure to support innovative services that ensure improved efficiency and flexibility. Such benefits are attractive for user applications and industrial domain. The entry of the IoT domain into the industrial market, also termed as Industrial Internet of Things (IIoT), was recently observed. However, security threats are increasing daily with the prevalent use of IIoT technology. An efficient security solution that can help in the prevention of malicious attacks is researched despite the existence of multiple security solutions. The current study will help the research community to understand the security flaws and causes by classifying and comparing the different certificateless signature schemes of IIoT domain. This survey aims to provide a comparative analysis of the available solutions to improve security. The multi-criteria decision-making approach is utilized for the comparative analysis of the existing certificateless signature schemes by employing the EDAS technique to evaluate the previously suggested solution proposed for IIoT. The authors believe that this technique has never been previously used for any cryptographic solutions. In addition, the study addresses some of the public research issues for technologists, academia, and researchers to develop the security aspects of IIoT.
1. Introduction
The Internet of Things (IoT) is a self-configuring universal network architecture based on standard interoperable communication protocols that allows things to connect with one another and share information and make collaborative decisions [1]. To understand the dynamic information exchange, various sorts of items in the IoT with independent addresses are commonly connected through heterogeneous transmission networks. Industry 4.0, also known as Industrial IoT (IIoT), is a new study topic that has emerged as a result of IoT applications in the industrial sector [2], [3], [4]. Industry 4.0 has had a substantial positive impact on the adoption of IoT across all industries. As a result, smart startups can construct transportation, resource management, manufacturing, renewable energy resources, and smart cities using the IIoT. Digital/connected factories, automated production flow management, industrial security systems, industrial configuration alarms, management security, and worker health (status) monitoring have all gained unexpected attention in the field of smart manufacturing [5], [6], [7]. The IIoT system, like any other cyber–physical system, is made up of cyber and physical subsystems that help with data gathering, transmission, and analysis. According to the findings of the investigation, the system can increase monitoring, control, automation, and intelligent event response. Due to the daily increase in the number of devices connected to IIoT, an insecure environment for digital communication may emerge.