S. Goudarzi, S. A. Soleymani, M. H. Anisi, A. Jindal, F. Dinmohammadi, Pei Xiao (2023)Sustainable Edge Node Computing Deployments in Distributed Manufacturing Systems, In: IEEE Transactions on Consumer Electronics Institute of Electrical and Electronics Engineers (IEEE)

The advancement of mobile internet technology has created opportunities for integrating the Industrial Internet of Things (IIoT) and edge computing in smart manufacturing. These sustainable technologies enable intelligent devices to achieve high-performance computing with minimal latency. This paper introduces a novel approach to deploy edge computing nodes in smart manufacturing environments at a low cost. However, the intricate interactions among network sensors, equipment, service levels, and network topologies in smart manufacturing systems pose challenges to node deployment. To address this, the proposed sustainable game theory method identifies the optimal edge computing node for deployment to attain the desired outcome. Additionally, the standard design of Software Defined Network (SDN) in conjunction with edge computing serves as forwarding switches to enhance overall computing services. Simulations demonstrate the effectiveness of this approach in reducing network delay and deployment costs associated with computing resources. Given the significance of sustainability, cost efficiency plays a critical role in establishing resilient edge networks. Our numerical and simulation results validate that the proposed scheme surpasses existing techniques like shortest estimated latency first (SELF), shortest estimated buffer first (SEBF), and random deployment (RD) in minimizing the total cost of deploying edge nodes, network delay, packet loss, and energy consumption.

Seyed Ahmad Soleymani, Shidrokh Goudarzi, Mohammad Hossein Anisi, Anish Jindal, Nazri Kama, Saiful Adli Ismail (2023)A Privacy-Preserving Authentication Scheme for Real-Time Medical Monitoring Systems, In: IEEE journal of biomedical and health informatics27(5)pp. 2314-2322 IEEE

In real-time medical monitoring systems, given the significance of medical data and disease symptoms, a secure and always-on connection with the medical centre over the public channels is essential. To this end, an edge-enabled Internet of Medical Things (IoMT) scheme is designed to improve flexibility and scalability of the network and provide seamless connectivity with minimum latency. The entities involved in such network are vulnerable to various attacks and can potentially be compromised. To address this issue, an authentication scheme comprised of digital signature and Authenticated Key Exchange (AKE) protocol is proposed which guarantees only authorized entities get access to the services available in the medical system. Moreover, to fulfill the privacy-preserving, each entity is mapped to a different pseudo-identity. The non-mathematical and performance analysis show that the proposed scheme is robust against various attacks such as impersonation and replay attacks.

Seyed Ahmad Soleymani, Shidrokh Goudarzi, Mohammad Hossein Anisi, Zeinab Movahedi, Anish Jindal, Nazri Kama (2022)PACMAN: Privacy-Preserving Authentication Scheme for Managing Cybertwin-Based 6G Networking, In: IEEE transactions on industrial informatics18(7)pp. 4902-4911 IEEE

Security and privacy of data-in-transit are critical issues in Industry 4.0, which are further amplified by the use of faster communication technologies such as 6G. Along with security issues, computation and communication costs, as well as data confidentiality, must be also accommodated. In this article, we design a cybertwin-based cloud-centric network architecture to improve the flexibility and scalability of 6G industrial networks. Cybertwin not only enables the deployment of advanced security solutions but also provides an always-on connection. However, the security of data-in-transit over wireless communication between users/things and cybertwin remains a concern. Hence, a privacy-preserving authentication scheme based on digital signature and authenticated key exchange protocol is designed to address the security concerns of data exchanged. In addition, we conduct a security analysis that proves that the scheme resists several attacks in the Industry 4.0 environment. Moreover, the evaluation performed confirmed the superiority of the proposed work comparing to the existing works.