With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar...With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle.展开更多
In order processing in the industrial Internet platform for textile and clothing,assigning optimal order quantities to each factory is the focus and the existing difficulty.The order allocation is a typical NP⁃hard pr...In order processing in the industrial Internet platform for textile and clothing,assigning optimal order quantities to each factory is the focus and the existing difficulty.The order allocation is a typical NP⁃hard problem in combinatorial optimization,and typical research of this kind is still at the initial stage.This paper aims to improve the optimization approach to select factories and to allocate proper orders to each one.It designs a genetic algorithm by making a deviation constraint rule for the initial population and introducing a penalty function to improve convergence.Remarkably,the objective functions of total cost along with the related constraints undergo optimization in the model.The experimental results indicate that the proposed algorithm can effectively solve the model and provide an optimal order allocation for multi⁃factories with less cost and computational duration.展开更多
The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated...The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated to cyber security threats that need to be addressed.This work investigates hybrid cyber threats(HCTs),which are now working on an entirely new level with the increasingly adopted IIoT.This work focuses on emerging methods to model,detect,and defend against hybrid cyber attacks using machine learning(ML)techniques.Specifically,a novel ML-based HCT modelling and analysis framework was proposed,in which L1 regularisation and Random Forest were used to cluster features and analyse the importance and impact of each feature in both individual threats and HCTs.A grey relation analysis-based model was employed to construct the correlation between IIoT components and different threats.展开更多
文章提出一种基于XGBoost算法的自适应网络切换方法,优化工业物联网(Industrial Internet of Things,IIoT)环境中Wi-Fi与5G网络的切换效率。通过XGBoost模型深度学习历史网络性能数据和环境参数,智能预测最优网络切换时机和目标网络类...文章提出一种基于XGBoost算法的自适应网络切换方法,优化工业物联网(Industrial Internet of Things,IIoT)环境中Wi-Fi与5G网络的切换效率。通过XGBoost模型深度学习历史网络性能数据和环境参数,智能预测最优网络切换时机和目标网络类型。该方法实现了动态网络选择,并结合动态缓存系统利用历史数据优化决策,提高了切换效率和响应速度。引入的回滚检查机制确保在网络性能下降或切换失败时能够迅速恢复到稳定状态,保障通信质量。实验评估表明,该方法在切换成功率、平均延迟和系统开销方面表现优异,为提高IIoT设备的通信性能提供了有效解决方案。展开更多
基金This work was supported in part by the National Natural Science Foundation of China(Nos.62072074,62076054,62027827,62002047)the Sichuan Science and Technology Innovation Platform and Talent Plan(Nos.2020JDJQ0020,2022JDJQ0039)+2 种基金the Sichuan Science and Technology Support Plan(Nos.2020YFSY0010,2022YFQ0045,2022YFS0220,2023YFG0148,2021YFG0131)the YIBIN Science and Technology Support Plan(No.2021CG003)the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
文摘With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle.
基金Shanghai Foundation for Development of Industrial Internet Innovation,China(No.2019⁃GYHLW⁃004)。
文摘In order processing in the industrial Internet platform for textile and clothing,assigning optimal order quantities to each factory is the focus and the existing difficulty.The order allocation is a typical NP⁃hard problem in combinatorial optimization,and typical research of this kind is still at the initial stage.This paper aims to improve the optimization approach to select factories and to allocate proper orders to each one.It designs a genetic algorithm by making a deviation constraint rule for the initial population and introducing a penalty function to improve convergence.Remarkably,the objective functions of total cost along with the related constraints undergo optimization in the model.The experimental results indicate that the proposed algorithm can effectively solve the model and provide an optimal order allocation for multi⁃factories with less cost and computational duration.
文摘The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated to cyber security threats that need to be addressed.This work investigates hybrid cyber threats(HCTs),which are now working on an entirely new level with the increasingly adopted IIoT.This work focuses on emerging methods to model,detect,and defend against hybrid cyber attacks using machine learning(ML)techniques.Specifically,a novel ML-based HCT modelling and analysis framework was proposed,in which L1 regularisation and Random Forest were used to cluster features and analyse the importance and impact of each feature in both individual threats and HCTs.A grey relation analysis-based model was employed to construct the correlation between IIoT components and different threats.
文摘文章提出一种基于XGBoost算法的自适应网络切换方法,优化工业物联网(Industrial Internet of Things,IIoT)环境中Wi-Fi与5G网络的切换效率。通过XGBoost模型深度学习历史网络性能数据和环境参数,智能预测最优网络切换时机和目标网络类型。该方法实现了动态网络选择,并结合动态缓存系统利用历史数据优化决策,提高了切换效率和响应速度。引入的回滚检查机制确保在网络性能下降或切换失败时能够迅速恢复到稳定状态,保障通信质量。实验评估表明,该方法在切换成功率、平均延迟和系统开销方面表现优异,为提高IIoT设备的通信性能提供了有效解决方案。