Version 1
: Received: 11 July 2024 / Approved: 11 July 2024 / Online: 11 July 2024 (11:38:25 CEST)
How to cite:
El-Hajj, M.; GEBREMARIAM, T. H. Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0. Preprints2024, 2024070963. https://doi.org/10.20944/preprints202407.0963.v1
El-Hajj, M.; GEBREMARIAM, T. H. Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0. Preprints 2024, 2024070963. https://doi.org/10.20944/preprints202407.0963.v1
El-Hajj, M.; GEBREMARIAM, T. H. Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0. Preprints2024, 2024070963. https://doi.org/10.20944/preprints202407.0963.v1
APA Style
El-Hajj, M., & GEBREMARIAM, T. H. (2024). Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0. Preprints. https://doi.org/10.20944/preprints202407.0963.v1
Chicago/Turabian Style
El-Hajj, M. and Teklit H. GEBREMARIAM. 2024 "Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0" Preprints. https://doi.org/10.20944/preprints202407.0963.v1
Abstract
The persistent security challenges in Industry 4.0 due to resource-constrained IoT devices necessitate innovative solutions. Addressing this, a study introduces the ASCON algorithm for lightweight Authenticated Encryption with Associated Data, enhancing confidentiality, integrity, and authenticity within IoT limitations. By integrating Digital Twins, the framework emphasizes the need for robust security in Industry 4.0, with ASCON ensuring secure data transmission, bolstering system resilience against cyber threats. Practical validation using MQTT protocol confirms ASCON’s efficacy over AES-GCM, highlighting its potential for enhanced security in Industry 4.0. Future research should focus on optimizing ASCON for microprocessors and developing secure remote access tailored to resource-constrained devices, ensuring adaptability in the digital era
Keywords
Digital Twins; DT; LightWeight; ASCON; IIoT; ESP32
Subject
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.