Smart City Gnosys

Smart city article details

Title Secure Hierarchical Fog Computing-Based Architecture For Industry 5.0 Using An Attribute-Based Encryption Scheme
ID_Doc 47643
Authors Shruti; Rani S.; Srivastava G.
Year 2024
Published Expert Systems with Applications, 235
DOI http://dx.doi.org/10.1016/j.eswa.2023.121180
Abstract Industry 5.0 is an emerging phase in the industrial field where humans and the latest technologies work together to bring revolutionary changes to work processes. It is the future of the upcoming generation for smart city development. Operations and designing of smart systems for Industrial Internet of Things (IIoT) devices include various types of decision-making at different levels of domains. Highly complex systems have a huge number of variables and decision-making requirements which also needs real-time data gathering from IIoT devices. Fog computing performs a key role by locating IIoT devices close to its proximity and reducing the processing time in comparison to cloud computing for smart systems. It makes smart systems work in a secure, flexible and time-sensitive manner. The presence of sensors makes data-intensive analysis challenging in these systems but fog computing handles it all. Along with other challenges, security is also one of the concerns that can affect the overall system if compromised. The main objective of this article is to introduce hierarchical fog computing-based architecture for smart energy-supplying systems as a part of Industry 5.0. This architecture will be able to support a large number of infrastructural components and provide services efficiently. In this article, validation of the amount of data transmitted by IIoT devices to the cloud per second is done for three different cases: 1. The proposed four-layer fog computing architecture, 2. Fog architecture with only layer three layers with the rest of the computing on the cloud, 3. A traditional system with cloud computing. The proposed approach is validated over state of art approaches in terms of accuracy. Moreover, the security of the architecture is provided using the Attribute-based encryption (ABE) scheme, which ensures data confidentiality with minimum overhead. © 2023 Elsevier Ltd
Author Keywords Fog computing; Industry 5.0; Internet of things (IoT); Sensors; Smart energy supply system; Smart industry


Similar Articles


Id Similarity Authors Title Published
1719 View0.9Zhou H.; Pal S.; Jadidi Z.; Jolfaei A.A Fog-Based Security Framework For Large-Scale Industrial Internet Of Things EnvironmentsIEEE Internet of Things Magazine, 6, 1 (2023)
47616 View0.893Alvi A.N.; Ali B.; Saleh M.S.; Alkhathami M.; Alsadie D.; Alghamdi B.Secure Computing For Fog-Enabled Industrial IotSensors, 24, 7 (2024)
33015 View0.887Abosata N.; Al-Rubaye S.; Inalhan G.; Emmanouilidis C.Internet Of Things For System Integrity: A Comprehensive Survey On Security, Attacks And Countermeasures For Industrial ApplicationsSensors, 21, 11 (2021)
11067 View0.881Shruti; Rani S.; Sah D.K.; Gianini G.Attribute-Based Encryption Schemes For Next Generation Wireless Iot Networks: A Comprehensive SurveySensors, 23, 13 (2023)
12508 View0.872Ajao L.A.; Apeh S.T.Blockchain Integration With Machine Learning For Securing Fog Computing Vulnerability In Smart City Sustainability1st International Conference in Advanced Innovation on Smart City, ICAISC 2023 - Proceedings (2023)
5270 View0.87Aouedi O.; Vu T.-H.; Sacco A.; Nguyen D.C.; Piamrat K.; Marchetto G.; Pham Q.-V.A Survey On Intelligent Internet Of Things: Applications, Security, Privacy, And Future DirectionsIEEE Communications Surveys and Tutorials, 27, 2 (2025)
47023 View0.869Hasan N.; Alam M.Role Of Machine Learning Approach For Industrial Internet Of Things (Iiot) In Cloud Environment-A Systematic ReviewInternational Journal of Advanced Technology and Engineering Exploration, 10, 108 (2023)
21438 View0.867Jedidi A.Dynamic Trust Security Approach For Edge Computing-Based Mobile Iot Devices Using Artificial IntelligenceEngineering Research Express, 6, 2 (2024)
5322 View0.866Mishra N.; Hafizul Islam S.K.; Zeadally S.A Survey On Security And Cryptographic Perspective Of Industrial-Internet-Of-ThingsInternet of Things (Netherlands), 25 (2024)
5221 View0.866Rasori M.; Manna M.L.; Perazzo P.; Dini G.A Survey On Attribute-Based Encryption Schemes Suitable For The Internet Of ThingsIEEE Internet of Things Journal, 9, 11 (2022)