Since the Ministry of Information Industry promulgated the Third Generation (3G) mobile communication "China Standard" TD-SCDMA as the standard for China's communication industry, the ministry has al... Since the Ministry of Information Industry promulgated the Third Generation (3G) mobile communication "China Standard" TD-SCDMA as the standard for China's communication industry, the ministry has also promulgated WCDMA and CDMA2000 as industrial standards.……展开更多
The progression through which a person acquires ,;kills, understanding, and opinions regarding a particular organization or company is called organizational learning (OL). In this study, the connection between organ...The progression through which a person acquires ,;kills, understanding, and opinions regarding a particular organization or company is called organizational learning (OL). In this study, the connection between organizational innovation (OI) and OL within the inf3rmation and communication technology (ICT) industry in Malaysia is surveyed. These relationships are examined, because various previous inquiries have shown that an imperative precursor to firm performance is OL. Two hundred and seventy-eight surveys were completed by small and medium organizations across Malaysia. The connections existing between the causes of OL and the causes of OI were ascertained by using structural equation modeling (SEM). Amongst the Malaysian small- and medium-sized enterprises (SMEs) that participated in fire study, OI and OL are considerably linked.展开更多
As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their seri...As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their serious privacy.Based on the SDN(Software Defined Network)technology,this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols,and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems.Furthermore,aiming at the unknown protocol specification and message format,this approach first restructures the industrial communication sessions and merges the payloads from industrial communication packets.After that,the feature selection and event sequence extraction can be carried out by using the N-gram model and K-means algorithm.Based on the obtained event sequences,this approach finally trains an event-based HMM(Hidden Markov Model)to identify aberrant industrial communication behaviors.Experimental results clearly show that the proposed approach has obvious advantages of classification accuracy and detection efficiency.展开更多
This paper is a preliminary and illustrative case study of Beijing's emergingmobile communication industrial (MCI) cluster, which helps understand the cluster by qualitativeanalysis and description. Beijing's ...This paper is a preliminary and illustrative case study of Beijing's emergingmobile communication industrial (MCI) cluster, which helps understand the cluster by qualitativeanalysis and description. Beijing's MCI cluster is emerging as far as the competence of the industryand its spatial concentration are concerned, although it is not the type of the cluster describedby PORTER due to the low competence of indigenous firms. The formation of the cluster can beexplained by means of the factor and demand conditions of Beijing. However, it is mostly determinedby the multinationals that promote the growth of the industry and the formation of the cluster, andby the government that also plays a key role in many ways. As a matter of fact, the interactionbetween the multinationals and the local government is the key to understanding the formation of thecluster. All in all, Beijing's emerging MCI cluster is a value-chain, geographically concentratedbut non-localized cluster, which is highly dominated by the multinationals and the local government.Its special characteristics bear some policy implications as to the change of the roles of thelocal government and the localization of multinationals, etc.展开更多
In industrial wireless scenarios,the impulsive noise(IN)incurred by machine running or operation causes a serious influence on the powerlimited industrial wireless communications.It is challenging to ensure efficient ...In industrial wireless scenarios,the impulsive noise(IN)incurred by machine running or operation causes a serious influence on the powerlimited industrial wireless communications.It is challenging to ensure efficient and reliable transmission with quality of service(QoS)guarantee for machinetype communication devices(MTCDs).Considering the IN in the industrial process,this paper establishes the multiuser multiple-input single-output(MU-MISO)orthogonal frequency division multiplexing(OFDM)system model,which combines transmitter and receiver design.Two precoding schemes are designed to improve communication effectiveness at the transmitter.More specifically,the precoder design scheme which combines semi-definite relaxation(SDR)with difference-of-two-convex-function(D.C.)iterative algorithm,is developed by utilizing the Dinkelbach method to improve the system effectiveness.To decrease the computational complexity,we devise the quadratic-based fractional programming(QFP)algorithm,which decouples the variables by using a quadratic transform method.On this basis,the IN mitigation scheme is studied to reduce the system error rate(SER)at the receiver.With the goal of improving the reliability of industrial wireless communications,we propose a hybrid nonlinear IN mitigation(HNINM)scheme and then derive its closed-form expression of SER.The simulation results show that the proposed QFP algorithm achieves superior performance while the HNINM scheme decreases the SER of industrial wireless communications.展开更多
B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maint...B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maintenance and service costs of stand-alone embedded systems can be reduced when they can be展开更多
B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later secti...B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi-展开更多
D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sen...D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sensors,meters,and actuators.A large number of specialized and partly proprietary commu- nication systems,media,and protocols can be found on this level.Most were developed at a time when security issues were of lesser con- cern than today,and when no practical secu- rity measures were available.展开更多
E. Security of Embedded Systems for Industrial Control and Communication Industrial automation controllers are typically implemented on embedded computers. Such embedded systems have to cope with restrictions on cost,...E. Security of Embedded Systems for Industrial Control and Communication Industrial automation controllers are typically implemented on embedded computers. Such embedded systems have to cope with restrictions on cost, real-time performance, power consumption, and other constraints which are even more demanding than in large workstations. A reference discusses these aspects with the example of a thermostat con-展开更多
The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards...The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards,like ISO 62443,to ensure the quality of the device.However,some industrial proprietary communication protocols can be customized and have complicated structures,the fuzzing system cannot quickly generate test data that adapt to various protocols.It also struggles to define the mutation field without having prior knowledge of the protocols.Therefore,we propose a fuzzing system named ICPFuzzer that uses LSTM(Long short-term memory)to learn the features of a protocol and generates mutated test data automatically.We also use the responses of testing and adjust the weight strategies to further test the device under testing(DUT)to find more data that cause unusual connection status.We verified the effectiveness of the approach by comparing with the open-source and commercial fuzzers.Furthermore,in a real case,we experimented with the DLMS/COSEM for a smart meter and found that the test data can cause a unusual response.In summary,ICPFuzzer is a black-box fuzzing system that can automatically execute the testing process and reveal vulnerabilities that interrupt and crash industrial control communication.Not only improves the quality of ICS but also improves safety.展开更多
Clock synchronization is one of the most fundamental and crucial network communication strategies.With the expansion of the Industrial Internet in numerous industrial applications,a new requirement for the precision,s...Clock synchronization is one of the most fundamental and crucial network communication strategies.With the expansion of the Industrial Internet in numerous industrial applications,a new requirement for the precision,security,complexity,and other features of the clock synchronization mechanism has emerged in various industrial situations.This paper presents a study of standardized clock synchronization protocols and techniques for various types of networks,and a discussion of how these protocols and techniques might be classified.Following that is a description of how certain clock synchronization protocols and technologies,such as PROFINET,Time-Sensitive Networking(TSN),and other well-known industrial networking protocols,can be applied in a number of industrial situations.This study also investigates the possible future development of clock synchronization techniques and technologies.展开更多
文摘 Since the Ministry of Information Industry promulgated the Third Generation (3G) mobile communication "China Standard" TD-SCDMA as the standard for China's communication industry, the ministry has also promulgated WCDMA and CDMA2000 as industrial standards.……
文摘The progression through which a person acquires ,;kills, understanding, and opinions regarding a particular organization or company is called organizational learning (OL). In this study, the connection between organizational innovation (OI) and OL within the inf3rmation and communication technology (ICT) industry in Malaysia is surveyed. These relationships are examined, because various previous inquiries have shown that an imperative precursor to firm performance is OL. Two hundred and seventy-eight surveys were completed by small and medium organizations across Malaysia. The connections existing between the causes of OL and the causes of OI were ascertained by using structural equation modeling (SEM). Amongst the Malaysian small- and medium-sized enterprises (SMEs) that participated in fire study, OI and OL are considerably linked.
基金This work is supported by the Hainan Provincial Natural Science Foundation of China(618QN219)the National Natural Science Foundation of China(Grant No.61501447)the General Project of Scientific Research of Liaoning Provincial Department of Education(LYB201616).
文摘As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations,and it is very difficult to take protective measures due to their serious privacy.Based on the SDN(Software Defined Network)technology,this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols,and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems.Furthermore,aiming at the unknown protocol specification and message format,this approach first restructures the industrial communication sessions and merges the payloads from industrial communication packets.After that,the feature selection and event sequence extraction can be carried out by using the N-gram model and K-means algorithm.Based on the obtained event sequences,this approach finally trains an event-based HMM(Hidden Markov Model)to identify aberrant industrial communication behaviors.Experimental results clearly show that the proposed approach has obvious advantages of classification accuracy and detection efficiency.
文摘This paper is a preliminary and illustrative case study of Beijing's emergingmobile communication industrial (MCI) cluster, which helps understand the cluster by qualitativeanalysis and description. Beijing's MCI cluster is emerging as far as the competence of the industryand its spatial concentration are concerned, although it is not the type of the cluster describedby PORTER due to the low competence of indigenous firms. The formation of the cluster can beexplained by means of the factor and demand conditions of Beijing. However, it is mostly determinedby the multinationals that promote the growth of the industry and the formation of the cluster, andby the government that also plays a key role in many ways. As a matter of fact, the interactionbetween the multinationals and the local government is the key to understanding the formation of thecluster. All in all, Beijing's emerging MCI cluster is a value-chain, geographically concentratedbut non-localized cluster, which is highly dominated by the multinationals and the local government.Its special characteristics bear some policy implications as to the change of the roles of thelocal government and the localization of multinationals, etc.
基金supported in part by the National Natural Science Foundation of China under Grant 62071472in part the Program for“Industrial Io T and Emergency Collaboration”Innovative Research Team in CUMT(No.2020ZY002)。
文摘In industrial wireless scenarios,the impulsive noise(IN)incurred by machine running or operation causes a serious influence on the powerlimited industrial wireless communications.It is challenging to ensure efficient and reliable transmission with quality of service(QoS)guarantee for machinetype communication devices(MTCDs).Considering the IN in the industrial process,this paper establishes the multiuser multiple-input single-output(MU-MISO)orthogonal frequency division multiplexing(OFDM)system model,which combines transmitter and receiver design.Two precoding schemes are designed to improve communication effectiveness at the transmitter.More specifically,the precoder design scheme which combines semi-definite relaxation(SDR)with difference-of-two-convex-function(D.C.)iterative algorithm,is developed by utilizing the Dinkelbach method to improve the system effectiveness.To decrease the computational complexity,we devise the quadratic-based fractional programming(QFP)algorithm,which decouples the variables by using a quadratic transform method.On this basis,the IN mitigation scheme is studied to reduce the system error rate(SER)at the receiver.With the goal of improving the reliability of industrial wireless communications,we propose a hybrid nonlinear IN mitigation(HNINM)scheme and then derive its closed-form expression of SER.The simulation results show that the proposed QFP algorithm achieves superior performance while the HNINM scheme decreases the SER of industrial wireless communications.
文摘B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maintenance and service costs of stand-alone embedded systems can be reduced when they can be
文摘B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi-
文摘D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sensors,meters,and actuators.A large number of specialized and partly proprietary commu- nication systems,media,and protocols can be found on this level.Most were developed at a time when security issues were of lesser con- cern than today,and when no practical secu- rity measures were available.
文摘E. Security of Embedded Systems for Industrial Control and Communication Industrial automation controllers are typically implemented on embedded computers. Such embedded systems have to cope with restrictions on cost, real-time performance, power consumption, and other constraints which are even more demanding than in large workstations. A reference discusses these aspects with the example of a thermostat con-
文摘The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets.And ICS(Industrial control system)is currently facing huge security threats and requires security standards,like ISO 62443,to ensure the quality of the device.However,some industrial proprietary communication protocols can be customized and have complicated structures,the fuzzing system cannot quickly generate test data that adapt to various protocols.It also struggles to define the mutation field without having prior knowledge of the protocols.Therefore,we propose a fuzzing system named ICPFuzzer that uses LSTM(Long short-term memory)to learn the features of a protocol and generates mutated test data automatically.We also use the responses of testing and adjust the weight strategies to further test the device under testing(DUT)to find more data that cause unusual connection status.We verified the effectiveness of the approach by comparing with the open-source and commercial fuzzers.Furthermore,in a real case,we experimented with the DLMS/COSEM for a smart meter and found that the test data can cause a unusual response.In summary,ICPFuzzer is a black-box fuzzing system that can automatically execute the testing process and reveal vulnerabilities that interrupt and crash industrial control communication.Not only improves the quality of ICS but also improves safety.
基金supported in part by the National Key Research and Development Program of China under Grant No.2021YFB 2900100.
文摘Clock synchronization is one of the most fundamental and crucial network communication strategies.With the expansion of the Industrial Internet in numerous industrial applications,a new requirement for the precision,security,complexity,and other features of the clock synchronization mechanism has emerged in various industrial situations.This paper presents a study of standardized clock synchronization protocols and techniques for various types of networks,and a discussion of how these protocols and techniques might be classified.Following that is a description of how certain clock synchronization protocols and technologies,such as PROFINET,Time-Sensitive Networking(TSN),and other well-known industrial networking protocols,can be applied in a number of industrial situations.This study also investigates the possible future development of clock synchronization techniques and technologies.