End-to-end encryption for securing communications in Industry 4.0

Sandeep Gupta*, Tommaso Sacchetti, Bruno Crispo

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

In Industry 4.0 (I4.0), reliable data sharing between multiple entities is profoundly significant for both the business-level and the manufacturing operations-level collaboration. Eventually, machine-to-machine (M2M) communication technology can be a key underlying technology for I4.0, where devices (e.g., sensors, actuators, and gateways) can exchange information with each other autonomously, ensuring data confidentiality and integrity. In this paper, we propose a transparent message level end-to-end encryption layer for Message Queue Telemetry Transport (MQTT). We exploit Ciphertext-Policy Attribute-based encryption (CP-ABE) that is implemented using the Fast Attribute Message Encryption (FAME) CP-ABE scheme. We also evaluate the time and space performance of the FAME CP-ABE scheme.

Original languageEnglish
Title of host publication2022 4th IEEE Middle East and North Africa COMMunications Conference, MENACOMM 2022: Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages153-158
Number of pages6
ISBN (Electronic)9781665494113
ISBN (Print)9781665494120
DOIs
Publication statusPublished - 02 Jan 2023
Externally publishedYes
Event4th IEEE Middle East and North Africa COMMunications Conference, MENACOMM 2022 - Amman, Jordan
Duration: 06 Dec 202208 Dec 2022

Publication series

NameProceedings of IEEE Middle East and North Africa COMMunications Conference, MENACOMM

Conference

Conference4th IEEE Middle East and North Africa COMMunications Conference, MENACOMM 2022
Country/TerritoryJordan
CityAmman
Period06/12/202208/12/2022

Bibliographical note

Publisher Copyright:
© 2022 IEEE.

Keywords

  • Encryption
  • Industry 4.0
  • M2M communication
  • Secure MQTT

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Instrumentation

Fingerprint

Dive into the research topics of 'End-to-end encryption for securing communications in Industry 4.0'. Together they form a unique fingerprint.

Cite this