Javascript must be enabled to continue!
Ensuring data integrity in industrial Internet of Things systems using error-correcting codes
View through CrossRef
The article explores the challenges of ensuring data integrity and error resistance in Industrial Internet of Things (IIoT) systems, which are critically important for the functioning of automated manufacturing processes. A comprehensive analysis of key IIoT security issues is presented, along with an overview of current data protection approaches.
The focus is placed on the use of error-correcting codes, particularly Goppa codes, which demonstrate high efficiency in detecting and correcting errors and show strong potential for integration into cryptographic systems. It is shown that Goppa codes can ensure not only error resistance but also data integrity due to the vast number of encoding rules, making them suitable for use in post-quantum cryptography scenarios.
The results demonstrate that using Goppa codes allows for the preservation of data integrity and a significant reduction in the likelihood of introducing false data while maintaining the required level of error resistance. This confirms the feasibility of integrating such codes into the IIoT environment.
Kharkiv National University of Radioelectronics
Title: Ensuring data integrity in industrial Internet of Things systems using error-correcting codes
Description:
The article explores the challenges of ensuring data integrity and error resistance in Industrial Internet of Things (IIoT) systems, which are critically important for the functioning of automated manufacturing processes.
A comprehensive analysis of key IIoT security issues is presented, along with an overview of current data protection approaches.
The focus is placed on the use of error-correcting codes, particularly Goppa codes, which demonstrate high efficiency in detecting and correcting errors and show strong potential for integration into cryptographic systems.
It is shown that Goppa codes can ensure not only error resistance but also data integrity due to the vast number of encoding rules, making them suitable for use in post-quantum cryptography scenarios.
The results demonstrate that using Goppa codes allows for the preservation of data integrity and a significant reduction in the likelihood of introducing false data while maintaining the required level of error resistance.
This confirms the feasibility of integrating such codes into the IIoT environment.
Related Results
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Developing guidelines for research institutions
Developing guidelines for research institutions
As introduced in Chapter 1, in this thesis, I developed guidelines to research institutions on how to foster research integrity. I did this by exploring how research institutions c...
Self-healing and secure low-power memory systems
Self-healing and secure low-power memory systems
The main objective of this thesis is to bring new contributions to the self-healing and secure systems domain. In particular, to develop a self-healing technique for memory systems...
Study on the characteristics and synergistic effects of industrial complex networks – empirical evidence from Chinese manufacturing
Study on the characteristics and synergistic effects of industrial complex networks – empirical evidence from Chinese manufacturing
PurposeThe manufacturing industry and the producer service industry have a high degree of industrial correlation, and their integration will cause changes in the complex industrial...
Actualització consistent de bases de dades deductives
Actualització consistent de bases de dades deductives
En aquesta tesi, proposem un nou mètode per a l'actualització consistent de bases de dades deductives. Donada una petició d'actualització, aquest mètode tradueix de forma automàtic...
Key Technologies of IoT Service Security and Privacy Protection
Key Technologies of IoT Service Security and Privacy Protection
The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ide...
NICU Medication Errors: Describing the Cause and Nature of Medication Errors in a NICU in Qatar
NICU Medication Errors: Describing the Cause and Nature of Medication Errors in a NICU in Qatar
IntroductionA medication error can be defined as “any error occurring in the medication use process” and focuses on problems with the delivery of medication to a patient [1]. Medic...
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
BACKGROUND
The internet is widely used across the world and in Sri Lanka for many purposes. Though essential for everyday life there are many negative aspec...

