Ensuring data integrity in industrial Internet of Things systems using error-correcting codes
DOI:
https://doi.org/10.30837/rt.2025.2.221.06Keywords:
Industrial Internet of Things, IIoT, data integrity, error-correcting coding, Goppa codes, code-based cryptosystems, McEliece, post-quantum cryptographyAbstract
The article explores the challenges of ensuring data integrity and error resistance in Industrial Internet of Things (IIoT) systems, which are critically important for the functioning of automated manufacturing processes. A comprehensive analysis of key IIoT security issues is presented, along with an overview of current data protection approaches.
The focus is placed on the use of error-correcting codes, particularly Goppa codes, which demonstrate high efficiency in detecting and correcting errors and show strong potential for integration into cryptographic systems. It is shown that Goppa codes can ensure not only error resistance but also data integrity due to the vast number of encoding rules, making them suitable for use in post-quantum cryptography scenarios.
The results demonstrate that using Goppa codes allows for the preservation of data integrity and a significant reduction in the likelihood of introducing false data while maintaining the required level of error resistance. This confirms the feasibility of integrating such codes into the IIoT environment.
References
Сирадоєв А.О., Можаєв О.О. (2024). Дослідження споживчого і промислового Інтернету речей.
Melenti Y. et al. Development of post-quantum cryptosystems based on the Rao-Nam scheme // Eastern-European Journal of Enterprise Technologies. 2025. 1 (9(133)). Р. 35–48.
Керничний В., Сєвєрінов О.В. Аналіз стійкості криптосистеми McEliece // Global Cyber Security Forum: матеріали Першого міжнародного науково-практичного форуму, 14 – 16 листоп. 2019 р. Харків : ХНУРЕ, 2019. С. 55–56.
Шипілов Д.В., Халімов Г.З. Аналіз постквантової криптосистеми McEliece // Комп’ютерні та інформа-ційні системи і технології. ХНУРЕ, 2019. С. 83–84.
Dam D. T., Tran T. H., Hoang V. P., Pham C. K., & Hoang T. T. A survey of post-quantum cryptography: Start of a new race // Cryptography. 2023. 7(3). Р 40.
Melenti Y., Korol O., Shulha V., Milevskyi S., Sievierinov О., Voitko O., ... & Pashayeva S. DEVELOPMENT OF POST-QUANTUM CRYPTOSYSTEMS BASED ON THE RAO-NAM SCHEME // Eastern-European Journal of Enterprise Technologies. 2025. 133(9).
Blahut R. E. (1983). Theory and practice of error control codes. (No Title).
Goppa V. D. A new class of linear error-correcting codes // Probl. Inf. Transm. 1970. № 6. Р. 300–304.
Tsfasman M.A., Vladut S.G., Zink Th. Modular Gurves, Shimura Gurves and Goppa Codes, Bitter than Var-shamov-Gilbert Bound // Math. Nachrichten. 1982. Vol. 109. P. 21–28.
Diffie W. (1988). The first ten years of public-key cryptography // Proceedings of the IEEE. 1988. № 76(5). Р.560–577.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).


