Keywords:-

Keywords: Decentralized networks; Authentication and Encryption; Post-quantum security; Security of Edge Devices; Industry 4.0 and IIoT; Interoperability

Article Content:-

Abstract

The Fourth Industrial Revolution, Industry 4.0, promises trillions of dollars of value creation by connecting billions of sensors and actuators to analytical engines, thereby creating the Industrial Internet of Things (IIoT). This revolution will push decision making to the edge and connect the edge to the center. The revolution faces three major technical challenges: interoperability between devices, security of edge devices and legacy infrastructure. This paper describes an implementation of a fundamentally new authentication and encryption technology (“dOISP™), that allows devices to connect regardless of operating system and transport technology. With dOISP™ a network manages its own security without use of certificates or Trusted Third Parties or any centralized or externalized source of trust and without human intervention – the network itself maintains a distributed source of trust that changes continuously and always assumes that authentication must be refreshed for every session. This technology enables the acceleration of Industry 4.0 initiatives thereby increasing their net present value as well as reducing the organizational costs of network security and reducing the risk of successful attack.

References:-

References

Leurent, H., de Boer, E. 2018. The Next Economic Growth Engine, Scaling Fourth Industrial Revolution Technologies in Production. World Economic Forum in collaboration with McKinsey & Company.

Dobbs, R., Manyika, J., Woetzel, J., 2015. The Internet of Things: Mapping the Value Beyond the Hype. McKinsey Global Institute, McKinsey & Company.

Roscoe, A. W., Nguyen, L. H. 2008. Authenticating ad-hoc networks by comparison of short digests. Science Direct, Information and Computation 206 (2008) 250-271.

Downloads

Citation Tools

How to Cite
Henderson, W., Magal, M., & Autry, C. (2022). Fully Decentralised, Post-Quantum Secure Networks. International Journal Of Mathematics And Computer Research, 10(4), 2644-2645. https://doi.org/10.47191/ijmcr/v10i4.01