期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid
1
作者 Samir M.Umran Songfeng Lu +1 位作者 Zaid Ameen Abduljabbar Xueming Tang 《Computers, Materials & Continua》 SCIE EI 2023年第3期5389-5416,共28页
There are numerous internet-connected devices attached to the industrial process through recent communication technologies,which enable machine-to-machine communication and the sharing of sensitive data through a new ... There are numerous internet-connected devices attached to the industrial process through recent communication technologies,which enable machine-to-machine communication and the sharing of sensitive data through a new technology called the industrial internet of things(IIoTs).Most of the suggested security mechanisms are vulnerable to several cybersecurity threats due to their reliance on cloud-based services,external trusted authorities,and centralized architectures;they have high computation and communication costs,low performance,and are exposed to a single authority of failure and bottleneck.Blockchain technology(BC)is widely adopted in the industrial sector for its valuable features in terms of decentralization,security,and scalability.In our work,we propose a decentralized,scalable,lightweight,trusted and secure private network based on blockchain technology/smart contracts for the overhead circuit breaker of the electrical power grid of the Al-Kufa/Iraq power plant as an industrial application.The proposed scheme offers a double layer of data encryption,device authentication,scalability,high performance,low power consumption,and improves the industry’s operations;provides efficient access control to the sensitive data generated by circuit breaker sensors and helps reduce power wastage.We also address data aggregation operations,which are considered challenging in electric power smart grids.We utilize a multi-chain proof of rapid authentication(McPoRA)as a consensus mechanism,which helps to enhance the computational performance and effectively improve the latency.The advanced reduced instruction set computer(RISC)machinesARMCortex-M33 microcontroller adopted in our work,is characterized by ultra-low power consumption and high performance,as well as efficiency in terms of real-time cryptographic algorithms such as the elliptic curve digital signature algorithm(ECDSA).This improves the computational execution,increases the implementation speed of the asymmetric cryptographic algorithm and provides data integrity and device authenticity at the perceptual layer.Our experimental results show that the proposed scheme achieves excellent performance,data security,real-time data processing,low power consumption(70.880 mW),and very low memory utilization(2.03%read-only memory(RAM)and 0.9%flash memory)and execution time(0.7424 s)for the cryptographic algorithm.This enables autonomous network reconfiguration on-demand and real-time data processing. 展开更多
关键词 Smart grids industrial iots electric power system blockchain technology iot applications industry 4.0 decentralization applications
下载PDF
Efficient Bandwidth Allocation and Computation Configuration in Industrial IoT
2
作者 HUANG Rui LI Huilin ZHANG Yongmin 《ZTE Communications》 2023年第1期55-63,共9页
With the advancement of the Industrial Internet of Things(IoT),the rapidly growing demand for data collection and processing poses a huge challenge to the design of data transmission and computation resources in the i... With the advancement of the Industrial Internet of Things(IoT),the rapidly growing demand for data collection and processing poses a huge challenge to the design of data transmission and computation resources in the industrial scenario.Taking advantage of improved model accuracy by machine learning algorithms,we investigate the inner relationship of system performance and data transmission and computation resources,and then analyze the impacts of bandwidth allocation and computation resources on the accuracy of the system model in this paper.A joint bandwidth allocation and computation resource configuration scheme is proposed and the Karush-Kuhn-Tucker(KKT)conditions are used to get an optimal bandwidth allocation and computation configuration decision,which can minimize the total computation resource requirement and ensure the system accuracy meets the industrial requirements.Simulation results show that the proposed bandwidth allocation and computation resource configuration scheme can reduce the computing resource usage by 10%when compared to the average allocation strategy. 展开更多
关键词 bandwidth allocation computation resource management industrial iot system accuracy
下载PDF
Improving Method of Anomaly Detection Performance for Industrial IoT Environment
3
作者 Junwon Kim Jiho Shin +1 位作者 Ki-Woong Park Jung Taek Seo 《Computers, Materials & Continua》 SCIE EI 2022年第9期5377-5394,共18页
Industrial Control System(ICS),which is based on Industrial IoT(IIoT),has an intelligent mobile environment that supports various mobility,but there is a limit to relying only on the physical security of the ICS envir... Industrial Control System(ICS),which is based on Industrial IoT(IIoT),has an intelligent mobile environment that supports various mobility,but there is a limit to relying only on the physical security of the ICS environment.Due to various threat factors that can disrupt the workflow of the IIoT,machine learning-based anomaly detection technologies are being presented;it is also essential to study for increasing detection performance to minimize model errors for promoting stable ICS operation.In this paper,we established the requirements for improving the anomaly detection performance in the IIoT-based ICS environment by analyzing the related cases.After that,we presented an improving method of the performance of a machine learning model specialized for IIoT-based ICS,which increases the detection rate by applying correlation coefficients and clustering;it provides a mechanism to predict thresholds on a per-sequence.Likewise,we adopted the HAI dataset environment that actively reflected the characteristics of IIoT-based ICS and demonstrated that performance could be improved through comparative experiments with the traditional method and our proposed method.The presented method can further improve the performance of commonly applied error-based detection techniques and includes a primary method that can be enhanced over existing detection techniques by analyzing correlation coefficients between features to consider feedback between ICS components.Those can contribute to improving the performance of several detection models applied in ICS and other areas. 展开更多
关键词 industrial iot industrial control system anomaly detection clustering algorithm correlation coefficient
下载PDF
Enabling Industrial Internet of Things(IIoT) towards an emerging smart energy system 被引量:9
4
作者 Ding Zhang Ching Chuen Chan George You Zhou 《Global Energy Interconnection》 2018年第1期39-47,共9页
The increasing penetration of renewable energy on the transmission and distribution power network is driving the adoption of two-way power flow control, data and communications needed to meet the dependency of balanci... The increasing penetration of renewable energy on the transmission and distribution power network is driving the adoption of two-way power flow control, data and communications needed to meet the dependency of balancing generation and load. Thus, creating an environment where power and information flow seamlessly in real time to enable reliable and economically viable energy delivery, the advent of Internet of Energy(IoE) as well as the rising of Internet of Things(IoT) based smart systems.The evolution of IT to Io T has shown that an information network can be connected in an autonomous way via routers from operating system(OS) based computers and devices to build a highly intelligent eco-system. Conceptually, we are applying the same methodology to the Io E concept so that Energy Operating System(EOS) based assets and devices can be developed into a distributed energy network via energy gateway and self-organized into a smart energy eco-system.This paper introduces a laboratory based IIo T driven software and controls platform developed on the NICE Nano-grid as part of a NICE smart system Initiative for Shenhua group. The goal of this effort is to develop an open architecture based Industrial Smart Energy Consortium(ISEC) to attract industrial partners, academic universities, module supplies, equipment vendors and related stakeholder to explore and contribute into a test-bed centric open laboratory template and platform for next generation energy-oriented smart industry applications.In the meanwhile, ISEC will play an important role to drive interoperability standards for the mining industry so that the era of un-manned underground mining operation can become the reality as well as increasing safety regulation enforcement. 展开更多
关键词 Internet of energy industrial iot FRACTAL
下载PDF
Smart contract token-based privacy-preserving access control system for industrial Internet of Things
5
作者 Weizheng Wang Huakun Huang +3 位作者 Zhimeng Yin Thippa Reddy Gadekallu Mamoun Alazab Chunhua Su 《Digital Communications and Networks》 SCIE CSCD 2023年第2期337-346,共10页
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability ... Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device communications.Hence,at present,a reliable and dynamic access control management system for IIoT is in urgent need.Up till now,numerous access control architectures have been proposed for IIoT.However,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be met.In this paper,we offer a smart contract token-based solution for decentralized access control in IIoT systems.Specifically,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT environments.We also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration process.Subsequently,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local blockchain.Finally,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research. 展开更多
关键词 Blockchain Privacy preservation Smart contract industrial iot
下载PDF
An Efficient Intrusion Detection Framework for Industrial Internet of Things Security
6
作者 Samah Alshathri Ayman El-Sayed +1 位作者 Walid El-Shafai Ezz El-Din Hemdan 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期819-834,共16页
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management cons... Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management console remotely.With the increased use of Industrial IoT(IIoT)applications,the risk of brutal cyber-attacks also increased.This leads researchers worldwide to work on developing effective Intrusion Detection Systems(IDS)for IoT infrastructure against any malicious activities.Therefore,this paper provides effective IDS to detect and classify unpredicted and unpredictable severe attacks in contradiction to the IoT infrastructure.A comprehensive evaluation examined on a new available benchmark TON_IoT dataset is introduced.The data-driven IoT/IIoT dataset incorporates a label feature indicating classes of normal and attack-targeting IoT/IIoT applications.Correspondingly,this data involves IoT/IIoT services-based telemetry data that involves operating systems logs and IoT-based traffic networks collected from a realistic medium-scale IoT network.This is to classify and recognize the intrusion activity and provide the intrusion detection objectives in IoT environments in an efficient fashion.Therefore,several machine learning algorithms such as Logistic Regression(LR),Linear Discriminant Analysis(LDA),K-Nearest Neighbors(KNN),Gaussian Naive Bayes(NB),Classification and Regression Tree(CART),Random Forest(RF),and AdaBoost(AB)are used for the detection intent on thirteen different intrusion datasets.Several performance metrics like accuracy,precision,recall,and F1-score are used to estimate the proposed framework.The experimental results show that the CART surpasses the other algorithms with the highest accuracy values like 0.97,1.00,0.99,0.99,1.00,1.00,and 1.00 for effectively detecting the intrusion activities on the IoT/IIoT infrastructure on most of the employed datasets.In addition,the proposed work accomplishes high performance compared to other recent related works in terms of different security and detection evaluation parameters. 展开更多
关键词 ATTACKS intrusion detection machine learning deep learning industrial iot TON_iot dataset
下载PDF
Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment
7
作者 Khaled M.Alalayah Fatma S.Alrayes +5 位作者 Jaber S.Alzahrani Khadija M.Alaidarous Ibrahim M.Alwayle Heba Mohsen Ibrahim Abdulrab Ahmed Mesfer Al Duhayyim 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3121-3139,共19页
With the increased advancements of smart industries,cybersecurity has become a vital growth factor in the success of industrial transformation.The Industrial Internet of Things(IIoT)or Industry 4.0 has revolutionized ... With the increased advancements of smart industries,cybersecurity has become a vital growth factor in the success of industrial transformation.The Industrial Internet of Things(IIoT)or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether.In industry 4.0,powerful IntrusionDetection Systems(IDS)play a significant role in ensuring network security.Though various intrusion detection techniques have been developed so far,it is challenging to protect the intricate data of networks.This is because conventional Machine Learning(ML)approaches are inadequate and insufficient to address the demands of dynamic IIoT networks.Further,the existing Deep Learning(DL)can be employed to identify anonymous intrusions.Therefore,the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection(HGSODLID)model for the IIoT environment.The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format.The HGSO algorithm is employed for Feature Selection(HGSO-FS)to reduce the curse of dimensionality.Moreover,Sparrow Search Optimization(SSO)is utilized with a Graph Convolutional Network(GCN)to classify and identify intrusions in the network.Finally,the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model.The proposed HGSODL-ID model was experimentally validated using a benchmark dataset,and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches. 展开更多
关键词 industrial iot deep learning network security intrusion detection system attribute selection smart factory
下载PDF
Industrial IoT Based Condition Monitoring for Wind Energy Conversion System 被引量:1
8
作者 Md Liton Hossain Ahmed Abu-Siada +2 位作者 S.M.Muyeen Md Mubashwar Hasan Momtazur Rahman 《CSEE Journal of Power and Energy Systems》 SCIE CSCD 2021年第3期654-664,共11页
Wind energy has been identified as the second dominating source in the world renewable energy generation after hydropower.Conversion and distribution of wind energy has brought technology revolution by developing the ... Wind energy has been identified as the second dominating source in the world renewable energy generation after hydropower.Conversion and distribution of wind energy has brought technology revolution by developing the advanced wind energy conversion system(WECS)including multilevel inverters(MLIs).The conventional rectifier produces ripples in their output waveforms while the MLI suffers from voltage balancing issues across the DC-link capacitor.This paper proposes a simplified proportional integral(PI)-based space vector pulse width modulation(SVPWM)to minimize the output waveform ripples,resolve the voltage balancing issue and produce better-quality output waveforms.WECS experiences various types of faults particularly in the DC-link capacitor and switching devices of the power converter.These faults,if not detected and rectified at an early stage,may lead to catastrophic failures to the WECS and continuity of the power supply.This paper proposes a new algorithm embedded in the proposed PI-based SVPWM controller to identify the fault location in the power converter in real time.Since most wind power plants are located in remote areas or offshore,WECS condition monitoring needs to be developed over the internet of things(IoT)to ensure system reliability.In this paper,an industrial IoT algorithm with an associated hardware prototype is proposed to monitor the condition of WECS in the real-time environment. 展开更多
关键词 Asset management condition monitoring fault diagnosis industrial internet of things(iot) wind energy conversion system
原文传递
Intelligent Deep Learning Model for Privacy Preserving IIoT on 6G Environment 被引量:4
9
作者 Anwer Mustafa Hilal Jaber SAlzahrani +5 位作者 Ibrahim Abunadi Nadhem Nemri Fahd NAl-Wesabi Abdelwahed Motwakel Ishfaq Yaseen Abu Sarwar Zamani 《Computers, Materials & Continua》 SCIE EI 2022年第7期333-348,共16页
In recent times,Industrial Internet of Things(IIoT)experiences a high risk of cyber attacks which needs to be resolved.Blockchain technology can be incorporated into IIoT system to help the entrepreneurs realize Indus... In recent times,Industrial Internet of Things(IIoT)experiences a high risk of cyber attacks which needs to be resolved.Blockchain technology can be incorporated into IIoT system to help the entrepreneurs realize Industry 4.0 by overcoming such cyber attacks.Although blockchain-based IIoT network renders a significant support and meet the service requirements of next generation network,the performance arrived at,in existing studies still needs improvement.In this scenario,the current research paper develops a new Privacy-Preserving Blockchain with Deep Learning model for Industrial IoT(PPBDL-IIoT)on 6G environment.The proposed PPBDLIIoT technique aims at identifying the existence of intrusions in network.Further,PPBDL-IIoT technique also involves the design of Chaos Game Optimization(CGO)with Bidirectional Gated Recurrent Neural Network(BiGRNN)technique for both detection and classification of intrusions in the network.Besides,CGO technique is applied to fine tune the hyperparameters in BiGRNN model.CGO algorithm is applied to optimally adjust the learning rate,epoch count,and weight decay so as to considerably improve the intrusion detection performance of BiGRNN model.Moreover,Blockchain enabled Integrity Check(BEIC)scheme is also introduced to avoid the misrouting attacks that tamper the OpenFlow rules of SDN-based IIoT system.The performance of the proposed PPBDL-IIoT methodology was validated using Industrial Control System Cyber-attack(ICSCA)dataset and the outcomes were analysed under various measures.The experimental results highlight the supremacy of the presented PPBDL-IIoT technique than the recent state-of-the-art techniques with the higher accuracy of 91.50%. 展开更多
关键词 6G networks industrial iot blockchain SECURITY intrusion detection artificial intelligence
下载PDF
ZTE and Innofidei Achieve Industry's First Field IOT on Multiple TD-LTE USB Dongles in a Mobile Network Cell
10
作者 ZTE Corporation 《ZTE Communications》 2010年第2期54-54,共1页
ZTE Corporation, a leading global provider of telecommunications equipment and networking solutions, announced on May 11,2010 that ZTE Corporation and Innofidei have jointly delivered a significant breakthrough for th... ZTE Corporation, a leading global provider of telecommunications equipment and networking solutions, announced on May 11,2010 that ZTE Corporation and Innofidei have jointly delivered a significant breakthrough for the Time Division Long Term Evolution (TD-LTE) industry with the industry's first successful Inter-Operability Test(IOT) of multiple TD-LTE USB dongles in a single mobile network cell. The successful test was first performed in Hong Kong, 展开更多
关键词 ZTE and Innofidei Achieve Industry’s First Field iot on Multiple TD-LTE USB Dongles in a Mobile Network Cell CELL LTE TD iot USB
下载PDF
Behavior of Delivery Robot in Human-Robot Collaborative Spaces During Navigation
11
作者 Kiran Jot Singh Divneet Singh Kapoor +3 位作者 Mohamed Abouhawwash Jehad F.Al-Amri Shubham Mahajan Amit Kant Pandit 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期795-810,共16页
Navigation is an essential skill for robots.It becomes a cumbersome task for the robot in a human-populated environment,and Industry 5.0 is an emerging trend that focuses on the interaction between humans and robots.R... Navigation is an essential skill for robots.It becomes a cumbersome task for the robot in a human-populated environment,and Industry 5.0 is an emerging trend that focuses on the interaction between humans and robots.Robot behavior in a social setting is the key to human acceptance while ensuring human comfort and safety.With the advancement in robotics technology,the true use cases of robots in the tourism and hospitality industry are expanding in number.There are very few experimental studies focusing on how people perceive the navigation behavior of a delivery robot.A robotic platform named“PI”has been designed,which incorporates proximity and vision sensors.The robot utilizes a real-time object recognition algorithm based on the You Only Look Once(YOLO)algorithm to detect objects and humans during navigation.This study is aimed towards evaluating human experience,for which we conducted a study among 36 participants to explore the perceived social presence,role,and perception of a delivery robot exhibiting different behavior conditions while navigating in a hotel corridor.The participants’responses were collected and compared for different behavior conditions demonstrated by the robot and results show that humans prefer an assistant role of a robot enabled with audio and visual aids exhibiting social behavior.Further,this study can be useful for developers to gain insight into the expected behavior of a delivery robot. 展开更多
关键词 Human-robot interaction robot navigation robot behavior collaborative spaces industrial iot industry 5.0
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部