Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain
This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol. The current system faces significant security risks due to...
Saved in:
| Main Authors: | Vikash Kumar, Santosh Kumar Das |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
KeAi Communications Co., Ltd.
2025-12-01
|
| Series: | Cyber Security and Applications |
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S2772918425000049 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A Blockchain-Assisted Cross-Domain Authentication and Key Negotiation Scheme in IIoT
by: Zhengnan Xu, et al.
Published: (2025-01-01) -
Trust-Based Distributed Resource Allocation in Edge-Enabled IIoT Networks
by: Amit Samanta, et al.
Published: (2025-01-01) -
Federated Transfer Learning for IIoT Devices With Low Computing Power Based on Blockchain and Edge Computing
by: Peiying Zhang, et al.
Published: (2021-01-01) -
Energy-efficient blockchain-IIoT with mobile edge computing: optimizing resource allocation and multi-hop offloading
by: Yiyi Zhang, et al.
Published: (2025-06-01) -
A secure and trustworthy blockchain-assisted edge computing architecture for industrial internet of things
by: Sasikumar Asaithambi, et al.
Published: (2025-05-01)