UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities

نویسندگان

چکیده

With the large-scale deployment of industrial Internet things (IIoT) devices in 5/6G environments, number vulnerabilities threatening IIoT security is growing dramatically, including a mass undisclosed that lack mitigation measures. Coordination vulnerability disclosure (CVD) one most popular sharing solutions, which workers (SWs) can develop patches together. However, CVD assumes SWs are all honest and thus offering chances for dishonest to internally leak vulnerabilities. To combat such internal threats, we propose an protection (UIV-TSP) scheme against leakage. In this paper, dynamic token implicit access credential SW acquire message, only held by system constantly updated with access. The latest be stealthily sneaked into acquired information as traceability prevent quickly distinguish SWs, feedforward neural network (FNN) adopted evaluate trust value SWs. Meanwhile, design blockchain-assisted continuous logs storage method achieve tamper-proofing transparency sharing. simulation results indicate our proposed resilient suppress protect effectively.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Flux-Based Protection Scheme for Power Transformers

Internal Turn-Turn faults (TTF) are the most common failures in power transformers, which could seriously reduce their life expectancy. Although common protection schemes such as current-baseddifferential protection are able to detect some of the internal faults, some other minor ones (such as TTFs andshort circuit near the neutral point) cannot be detected by such schemes. Likewise, these rela...

متن کامل

Blockchain Enabled Privacy Audit Logs

Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper...

متن کامل

A Multi-commodity Pickup and Delivery Open-tour m-TSP Formulation for Bike Sharing Rebalancing Problem

Bike sharing systems (BSSs) offer a mobility service whereby public bikes, located at different stations across an urban area, are available for shared use. An important point is that the distribution of rides between stations is not uniformly distributed and certain stations fill up or empty over time. These empty and full stations lead to demand for bikes and return boxes that cannot be fulfi...

متن کامل

Enhancing Privacy Protection Scheme in Rfid Enabled Banknote

Nowadays, money is one of the familiar talks worldwide, and also money is inseparable among the people in tradition. But money suffers from lack of security through money laundering, counterfeits, privacy protection and speediness in currency counts. Thus, to have these securities in money an application of RFID is a banknote attached a tag to determine the authenticity of money and to stop cou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2022

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2022/2500213