UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities
نویسندگان
چکیده
With the large-scale deployment of industrial Internet things (IIoT) devices in 5/6G environments, number vulnerabilities threatening IIoT security is growing dramatically, including a mass undisclosed that lack mitigation measures. Coordination vulnerability disclosure (CVD) one most popular sharing solutions, which workers (SWs) can develop patches together. However, CVD assumes SWs are all honest and thus offering chances for dishonest to internally leak vulnerabilities. To combat such internal threats, we propose an protection (UIV-TSP) scheme against leakage. In this paper, dynamic token implicit access credential SW acquire message, only held by system constantly updated with access. The latest be stealthily sneaked into acquired information as traceability prevent quickly distinguish SWs, feedforward neural network (FNN) adopted evaluate trust value SWs. Meanwhile, design blockchain-assisted continuous logs storage method achieve tamper-proofing transparency sharing. simulation results indicate our proposed resilient suppress protect effectively.
منابع مشابه
A Novel Flux-Based Protection Scheme for Power Transformers
Internal Turn-Turn faults (TTF) are the most common failures in power transformers, which could seriously reduce their life expectancy. Although common protection schemes such as current-baseddifferential protection are able to detect some of the internal faults, some other minor ones (such as TTFs andshort circuit near the neutral point) cannot be detected by such schemes. Likewise, these rela...
متن کاملBlockchain Enabled Privacy Audit Logs
Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper...
متن کاملA Multi-commodity Pickup and Delivery Open-tour m-TSP Formulation for Bike Sharing Rebalancing Problem
Bike sharing systems (BSSs) offer a mobility service whereby public bikes, located at different stations across an urban area, are available for shared use. An important point is that the distribution of rides between stations is not uniformly distributed and certain stations fill up or empty over time. These empty and full stations lead to demand for bikes and return boxes that cannot be fulfi...
متن کاملEnhancing Privacy Protection Scheme in Rfid Enabled Banknote
Nowadays, money is one of the familiar talks worldwide, and also money is inseparable among the people in tradition. But money suffers from lack of security through money laundering, counterfeits, privacy protection and speediness in currency counts. Thus, to have these securities in money an application of RFID is a banknote attached a tag to determine the authenticity of money and to stop cou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2022
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2022/2500213