期刊文献+
共找到307篇文章
< 1 2 16 >
每页显示 20 50 100
Enabling Industrial Internet of Things(IIoT) towards an emerging smart energy system 被引量:10
1
作者 Ding Zhang Ching Chuen Chan George You Zhou 《Global Energy Interconnection》 2018年第1期39-47,共9页
The increasing penetration of renewable energy on the transmission and distribution power network is driving the adoption of two-way power flow control, data and communications needed to meet the dependency of balanci... The increasing penetration of renewable energy on the transmission and distribution power network is driving the adoption of two-way power flow control, data and communications needed to meet the dependency of balancing generation and load. Thus, creating an environment where power and information flow seamlessly in real time to enable reliable and economically viable energy delivery, the advent of Internet of Energy(IoE) as well as the rising of Internet of Things(IoT) based smart systems.The evolution of IT to Io T has shown that an information network can be connected in an autonomous way via routers from operating system(OS) based computers and devices to build a highly intelligent eco-system. Conceptually, we are applying the same methodology to the Io E concept so that Energy Operating System(EOS) based assets and devices can be developed into a distributed energy network via energy gateway and self-organized into a smart energy eco-system.This paper introduces a laboratory based IIo T driven software and controls platform developed on the NICE Nano-grid as part of a NICE smart system Initiative for Shenhua group. The goal of this effort is to develop an open architecture based Industrial Smart Energy Consortium(ISEC) to attract industrial partners, academic universities, module supplies, equipment vendors and related stakeholder to explore and contribute into a test-bed centric open laboratory template and platform for next generation energy-oriented smart industry applications.In the meanwhile, ISEC will play an important role to drive interoperability standards for the mining industry so that the era of un-manned underground mining operation can become the reality as well as increasing safety regulation enforcement. 展开更多
关键词 Internet of energy industrial iot FRACTAL
下载PDF
Cloud control for IIoT in a cloud-edge environment
2
作者 YAN Ce XIA Yuanqing +1 位作者 YANG Hongjiu ZHAN Yufeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期1013-1027,共15页
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for... The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms. 展开更多
关键词 5G and time sensitive network(TSN) industrial Internet of Things(iiot)workflow transmission control protocol(TCP)flows control cloud edge collaboration multi-objective optimal scheduling
下载PDF
Edge Cloud Selection in Mobile Edge Computing(MEC)-Aided Applications for Industrial Internet of Things(IIoT)Services
3
作者 Dae-Young Kim SoYeon Lee +1 位作者 MinSeung Kim Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2049-2060,共12页
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im... In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method. 展开更多
关键词 industrial Internet of Things(iiot)network iiot service mobile edge computing(MEC) edge cloud selection MEC-aided application
下载PDF
基于区块链的边缘计算IIoT架构研究 被引量:9
4
作者 高洁 闫献国 +1 位作者 梁波 郭宏 《计算机应用研究》 CSCD 北大核心 2020年第7期2160-2166,共7页
在智能制造系统中,工业物联网通过先进的管理技术将制造设备互连,实现了信息的实时传输、设备的范在化感知和数据的快速分析处理。但是由于制造设备的异构性、物联网网关(Io T网关)数据分析能力的有限性、制造设备的存储力低下、设备和... 在智能制造系统中,工业物联网通过先进的管理技术将制造设备互连,实现了信息的实时传输、设备的范在化感知和数据的快速分析处理。但是由于制造设备的异构性、物联网网关(Io T网关)数据分析能力的有限性、制造设备的存储力低下、设备和数据的低安全性等缺陷严重阻碍了智能制造的发展。BEIIoT架构从制造企业的实际生产过程与应用角度出发,将区块链技术与边缘计算相结合,通过对服务器进行P2P组网以实现对设备去中心化管理;通过对边缘设备进行服务化封装,增强设备的安全性与实时分析能力,降低设备的异构性;使用DAG双链式数据存储结构,提高数据的冗余度与安全性,实现生产线数据的异步并发备份存储。BEIIoT架构为智能制造的实施提供了体系支持。 展开更多
关键词 工业物联网 边缘计算 区块链 去中心化 DAG双链式存储结构
下载PDF
Intelligent Deep Learning Model for Privacy Preserving IIoT on 6G Environment 被引量:5
5
作者 Anwer Mustafa Hilal Jaber SAlzahrani +5 位作者 Ibrahim Abunadi Nadhem Nemri Fahd NAl-Wesabi Abdelwahed Motwakel Ishfaq Yaseen Abu Sarwar Zamani 《Computers, Materials & Continua》 SCIE EI 2022年第7期333-348,共16页
In recent times,Industrial Internet of Things(IIoT)experiences a high risk of cyber attacks which needs to be resolved.Blockchain technology can be incorporated into IIoT system to help the entrepreneurs realize Indus... In recent times,Industrial Internet of Things(IIoT)experiences a high risk of cyber attacks which needs to be resolved.Blockchain technology can be incorporated into IIoT system to help the entrepreneurs realize Industry 4.0 by overcoming such cyber attacks.Although blockchain-based IIoT network renders a significant support and meet the service requirements of next generation network,the performance arrived at,in existing studies still needs improvement.In this scenario,the current research paper develops a new Privacy-Preserving Blockchain with Deep Learning model for Industrial IoT(PPBDL-IIoT)on 6G environment.The proposed PPBDLIIoT technique aims at identifying the existence of intrusions in network.Further,PPBDL-IIoT technique also involves the design of Chaos Game Optimization(CGO)with Bidirectional Gated Recurrent Neural Network(BiGRNN)technique for both detection and classification of intrusions in the network.Besides,CGO technique is applied to fine tune the hyperparameters in BiGRNN model.CGO algorithm is applied to optimally adjust the learning rate,epoch count,and weight decay so as to considerably improve the intrusion detection performance of BiGRNN model.Moreover,Blockchain enabled Integrity Check(BEIC)scheme is also introduced to avoid the misrouting attacks that tamper the OpenFlow rules of SDN-based IIoT system.The performance of the proposed PPBDL-IIoT methodology was validated using Industrial Control System Cyber-attack(ICSCA)dataset and the outcomes were analysed under various measures.The experimental results highlight the supremacy of the presented PPBDL-IIoT technique than the recent state-of-the-art techniques with the higher accuracy of 91.50%. 展开更多
关键词 6G networks industrial iot blockchain SECURITY intrusion detection artificial intelligence
下载PDF
Performance Analysis of Intelligent CR-NOMA Model for Industrial IoT Communications 被引量:5
6
作者 Yinghua Zhang Jian Liu +2 位作者 Yunfeng Peng Yanfang Dong Changming Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第10期239-257,共19页
Aiming for ultra-reliable low-latency wireless communications required in industrial internet of things(IIoT)applications,this paper studies a simple cognitive radio non-orthogonal multiple access(CR-NOMA)downlink sys... Aiming for ultra-reliable low-latency wireless communications required in industrial internet of things(IIoT)applications,this paper studies a simple cognitive radio non-orthogonal multiple access(CR-NOMA)downlink system.This system consists of two secondary users(SUs)dynamically interfered by the primary user(PU),and its performance is characterized by the outage probability of the SU communications.This outage probability is calculated under two conditions where,a)the transmission of PU starts after the channel state information(CSI)is acquired,so the base station(BS)is oblivious of the interference,and b)when the BS is aware of the PU interference,and the NOMA transmission is adapted to the more comprehensive knowledge of the signal to interference plus noise ratio(SINR).These results are verified by simulations,and their good agreement suggests our calculations can be used to reduce the complexity of future analysis.We find the outage probability is reduced when the SUs move further away from the primary transmitter or when the signal from PU is less powerful,and the BS always has better performance when it is aware of the interference.The findings thus emphasize the importance of monitoring the channel quality and realtime feedback to optimize the performance of CR-NOMA system. 展开更多
关键词 industrial internet of things(iiot) non-orthogonal multiple access(NOMA) quality of service(QoS) successive interference cancellation(SIC)
下载PDF
A multi-point collaborative DDoS defense mechanism for IIoT environment 被引量:2
7
作者 Hongcheng Huang Peixin Ye +1 位作者 Min Hu Jun Wu 《Digital Communications and Networks》 SCIE CSCD 2023年第2期590-601,共12页
Nowadays,a large number of intelligent devices involved in the Industrial Internet of Things(IIoT)environment are posing unprecedented cybersecurity challenges.Due to the limited budget for security protection,the IIo... Nowadays,a large number of intelligent devices involved in the Industrial Internet of Things(IIoT)environment are posing unprecedented cybersecurity challenges.Due to the limited budget for security protection,the IIoT devices are vulnerable and easily compromised to launch Distributed Denial-of-Service(DDoS)attacks,resulting in disastrous results.Unfortunately,considering the particularity of the IIoT environment,most of the defense solutions in traditional networks cannot be directly applied to IIoT with acceptable security performance.Therefore,in this work,we propose a multi-point collaborative defense mechanism against DDoS attacks for IIoT.Specifically,for the single point DDoS defense,we design an edge-centric mechanism termed EdgeDefense for the detection,identification,classification,and mitigation of DDoS attacks and the generation of defense information.For the practical multi-point scenario,we propose a collaborative defense model against DDoS attacks to securely share the defense information across the network through the blockchain.Besides,a fast defense information sharing mechanism is designed to reduce the delay of defense information sharing and provide a responsive cybersecurity guarantee.The simulation results indicate that the identification and classification performance of the two machine learning models designed for EdgeDefense are better than those of the state-of-the-art baseline models,and therefore EdgeDefense can defend against DDoS attacks effectively.The results also verify that the proposed fast sharing mechanism can reduce the propagation delay of the defense information blocks effectively,thereby improving the responsiveness of the multi-point collaborative DDoS defense. 展开更多
关键词 industrial internet of things(iiot) DDOS Deep learning Blockchain Edge computing
下载PDF
Optimization Scheme of Trusted Task Offloading in IIoT Scenario Based on DQN 被引量:2
8
作者 Xiaojuan Wang Zikui Lu +3 位作者 Siyuan Sun Jingyue Wang Luona Song Merveille Nicolas 《Computers, Materials & Continua》 SCIE EI 2023年第1期2055-2071,共17页
With the development of the Industrial Internet of Things(IIoT),end devices(EDs)are equipped with more functions to capture information.Therefore,a large amount of data is generated at the edge of the network and need... With the development of the Industrial Internet of Things(IIoT),end devices(EDs)are equipped with more functions to capture information.Therefore,a large amount of data is generated at the edge of the network and needs to be processed.However,no matter whether these computing tasks are offloaded to traditional central clusters or mobile edge computing(MEC)devices,the data is short of security and may be changed during transmission.In view of this challenge,this paper proposes a trusted task offloading optimization scheme that can offer low latency and high bandwidth services for IIoT with data security.Blockchain technology is adopted to ensure data consistency.Meanwhile,to reduce the impact of low throughput of blockchain on task offloading performance,we design the processes of consensus and offloading as a Markov decision process(MDP)by defining states,actions,and rewards.Deep reinforcement learning(DRL)algorithm is introduced to dynamically select offloading actions.To accelerate the optimization,we design a novel reward function for the DRL algorithm according to the scale and computational complexity of the task.Experiments demonstrate that compared with methods without optimization,our mechanism performs better when it comes to the number of task offloading and throughput of blockchain. 展开更多
关键词 Task offloading blockchain industrial internet of things(iiot) deep reinforcement learning(DRL)network mobile-edge computing(MEC)
下载PDF
A multi-resource scheduling scheme of Kubernetes for IIoT 被引量:1
9
作者 ZHU Lin LI Junjiang +1 位作者 LIU Zijie ZHANG Dengyin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第3期683-692,共10页
With the rapid development of data applications in the scene of Industrial Internet of Things(IIoT),how to schedule resources in IIoT environment has become an urgent problem to be solved.Due to benefit of its strong ... With the rapid development of data applications in the scene of Industrial Internet of Things(IIoT),how to schedule resources in IIoT environment has become an urgent problem to be solved.Due to benefit of its strong scalability and compatibility,Kubernetes has been applied to resource scheduling in IIoT scenarios.However,the limited types of resources,the default scheduling scoring strategy,and the lack of delay control module limit its resource scheduling performance.To address these problems,this paper proposes a multi-resource scheduling(MRS)scheme of Kubernetes for IIoT.The MRS scheme dynamically balances resource utilization by taking both requirements of tasks and the current system state into consideration.Furthermore,the experiments demonstrate the effectiveness of the MRS scheme in terms of delay control and resource utilization. 展开更多
关键词 industrial Internet of Things(iiot) Kubernetes resource scheduling time delay
下载PDF
Efficient Bandwidth Allocation and Computation Configuration in Industrial IoT 被引量:1
10
作者 HUANG Rui LI Huilin ZHANG Yongmin 《ZTE Communications》 2023年第1期55-63,共9页
With the advancement of the Industrial Internet of Things(IoT),the rapidly growing demand for data collection and processing poses a huge challenge to the design of data transmission and computation resources in the i... With the advancement of the Industrial Internet of Things(IoT),the rapidly growing demand for data collection and processing poses a huge challenge to the design of data transmission and computation resources in the industrial scenario.Taking advantage of improved model accuracy by machine learning algorithms,we investigate the inner relationship of system performance and data transmission and computation resources,and then analyze the impacts of bandwidth allocation and computation resources on the accuracy of the system model in this paper.A joint bandwidth allocation and computation resource configuration scheme is proposed and the Karush-Kuhn-Tucker(KKT)conditions are used to get an optimal bandwidth allocation and computation configuration decision,which can minimize the total computation resource requirement and ensure the system accuracy meets the industrial requirements.Simulation results show that the proposed bandwidth allocation and computation resource configuration scheme can reduce the computing resource usage by 10%when compared to the average allocation strategy. 展开更多
关键词 bandwidth allocation computation resource management industrial iot system accuracy
下载PDF
基于IIoT思维的智能工厂架构及实践 被引量:1
11
作者 徐英 《仪器仪表用户》 2020年第8期99-105,共7页
依据目前新兴工业物联网、大数据、AR增强现实、ML机器学习等技术的发展,为满足客户需求与挑战,由浅入深地阐述了智能工厂的架构、功能、特点以及实践应用场景。重点强调智能工厂是由3个维度智能化构成的,而且是针对不同的人群而言的,... 依据目前新兴工业物联网、大数据、AR增强现实、ML机器学习等技术的发展,为满足客户需求与挑战,由浅入深地阐述了智能工厂的架构、功能、特点以及实践应用场景。重点强调智能工厂是由3个维度智能化构成的,而且是针对不同的人群而言的,操作维度智能化是基础,满足了专业人员的智能化需求;运营维度智能化是核心,满足了管理人员的智能化需求;决策维度智能化是提升和增强,满足了决策人员的智能化需求。智能工厂的建设,消除了信息孤岛,使数据互联互通,业务敏捷协同,决策实时科学。 展开更多
关键词 两化融合 工业物联网 大数据 增强现实AR 机器学习ML 智能工厂 智能化
下载PDF
A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid
12
作者 Samir M.Umran Songfeng Lu +1 位作者 Zaid Ameen Abduljabbar Xueming Tang 《Computers, Materials & Continua》 SCIE EI 2023年第3期5389-5416,共28页
There are numerous internet-connected devices attached to the industrial process through recent communication technologies,which enable machine-to-machine communication and the sharing of sensitive data through a new ... There are numerous internet-connected devices attached to the industrial process through recent communication technologies,which enable machine-to-machine communication and the sharing of sensitive data through a new technology called the industrial internet of things(IIoTs).Most of the suggested security mechanisms are vulnerable to several cybersecurity threats due to their reliance on cloud-based services,external trusted authorities,and centralized architectures;they have high computation and communication costs,low performance,and are exposed to a single authority of failure and bottleneck.Blockchain technology(BC)is widely adopted in the industrial sector for its valuable features in terms of decentralization,security,and scalability.In our work,we propose a decentralized,scalable,lightweight,trusted and secure private network based on blockchain technology/smart contracts for the overhead circuit breaker of the electrical power grid of the Al-Kufa/Iraq power plant as an industrial application.The proposed scheme offers a double layer of data encryption,device authentication,scalability,high performance,low power consumption,and improves the industry’s operations;provides efficient access control to the sensitive data generated by circuit breaker sensors and helps reduce power wastage.We also address data aggregation operations,which are considered challenging in electric power smart grids.We utilize a multi-chain proof of rapid authentication(McPoRA)as a consensus mechanism,which helps to enhance the computational performance and effectively improve the latency.The advanced reduced instruction set computer(RISC)machinesARMCortex-M33 microcontroller adopted in our work,is characterized by ultra-low power consumption and high performance,as well as efficiency in terms of real-time cryptographic algorithms such as the elliptic curve digital signature algorithm(ECDSA).This improves the computational execution,increases the implementation speed of the asymmetric cryptographic algorithm and provides data integrity and device authenticity at the perceptual layer.Our experimental results show that the proposed scheme achieves excellent performance,data security,real-time data processing,low power consumption(70.880 mW),and very low memory utilization(2.03%read-only memory(RAM)and 0.9%flash memory)and execution time(0.7424 s)for the cryptographic algorithm.This enables autonomous network reconfiguration on-demand and real-time data processing. 展开更多
关键词 Smart grids industrial iots electric power system blockchain technology iot applications industry 4.0 decentralization applications
下载PDF
Improving Method of Anomaly Detection Performance for Industrial IoT Environment
13
作者 Junwon Kim Jiho Shin +1 位作者 Ki-Woong Park Jung Taek Seo 《Computers, Materials & Continua》 SCIE EI 2022年第9期5377-5394,共18页
Industrial Control System(ICS),which is based on Industrial IoT(IIoT),has an intelligent mobile environment that supports various mobility,but there is a limit to relying only on the physical security of the ICS envir... Industrial Control System(ICS),which is based on Industrial IoT(IIoT),has an intelligent mobile environment that supports various mobility,but there is a limit to relying only on the physical security of the ICS environment.Due to various threat factors that can disrupt the workflow of the IIoT,machine learning-based anomaly detection technologies are being presented;it is also essential to study for increasing detection performance to minimize model errors for promoting stable ICS operation.In this paper,we established the requirements for improving the anomaly detection performance in the IIoT-based ICS environment by analyzing the related cases.After that,we presented an improving method of the performance of a machine learning model specialized for IIoT-based ICS,which increases the detection rate by applying correlation coefficients and clustering;it provides a mechanism to predict thresholds on a per-sequence.Likewise,we adopted the HAI dataset environment that actively reflected the characteristics of IIoT-based ICS and demonstrated that performance could be improved through comparative experiments with the traditional method and our proposed method.The presented method can further improve the performance of commonly applied error-based detection techniques and includes a primary method that can be enhanced over existing detection techniques by analyzing correlation coefficients between features to consider feedback between ICS components.Those can contribute to improving the performance of several detection models applied in ICS and other areas. 展开更多
关键词 industrial iot industrial control system anomaly detection clustering algorithm correlation coefficient
下载PDF
Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT
14
作者 Anichur Rahman Md Jahidul Islam +3 位作者 Shahab S.Band Ghulam Muhammad Kamrul Hasan Prayag Tiwari 《Digital Communications and Networks》 SCIE CSCD 2023年第2期411-421,共11页
Some of the significant new technologies researched in recent studies include BlockChain(BC),Software Defined Networking(SDN),and Smart Industrial Internet of Things(IIoT).All three technologies provide data integrity... Some of the significant new technologies researched in recent studies include BlockChain(BC),Software Defined Networking(SDN),and Smart Industrial Internet of Things(IIoT).All three technologies provide data integrity,confidentiality,and integrity in their respective use cases(especially in industrial fields).Additionally,cloud computing has been in use for several years now.Confidential information is exchanged with cloud infrastructure to provide clients with access to distant resources,such as computing and storage activities in the IIoT.There are also significant security risks,concerns,and difficulties associated with cloud computing.To address these challenges,we propose merging BC and SDN into a cloud computing platform for the IIoT.This paper introduces“DistB-SDCloud”,an architecture for enhanced cloud security for smart IIoT applications.The proposed architecture uses a distributed BC method to provide security,secrecy,privacy,and integrity while remaining flexible and scalable.Customers in the industrial sector benefit from the dispersed or decentralized,and efficient environment of BC.Additionally,we described an SDN method to improve the durability,stability,and load balancing of cloud infrastructure.The efficacy of our SDN and BC-based implementation was experimentally tested by using various parameters including throughput,packet analysis,response time,bandwidth,and latency analysis,as well as the monitoring of several attacks on the system itself. 展开更多
关键词 Smart iiot Blockchain SDN iot Security PRIVACY OpenFlow SDN-Controller Data security Cloud computing Cloud management
下载PDF
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network:Architectures,enabling technologies,and opportunities
15
作者 Jinfang Jiang Chuan Lin +3 位作者 Guangjie Han Adnan MAbu-Mahfouz Syed Bilal Hussain Shah Miguel Martínez-García 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1351-1362,共12页
The ongoing expansion of the Industrial Internet of Things(IIoT)is enabling the possibility of effective Industry 4.0,where massive sensing devices in heterogeneous environments are connected through dedicated communi... The ongoing expansion of the Industrial Internet of Things(IIoT)is enabling the possibility of effective Industry 4.0,where massive sensing devices in heterogeneous environments are connected through dedicated communication protocols.This brings forth new methods and models to fuse the information yielded by the various industrial plant elements and generates emerging security challenges that we have to face,providing ad-hoc functions for scheduling and guaranteeing the network operations.Recently,the large development of SoftwareDefined Networking(SDN)and Artificial Intelligence(AI)technologies have made feasible the design and control of scalable and secure IIoT networks.This paper studies how AI and SDN technologies combined can be leveraged towards improving the security and functionality of these IIoT networks.After surveying the state-of-the-art research efforts in the subject,the paper introduces a candidate architecture for AI-enabled Software-Defined IIoT Network(AI-SDIN)that divides the traditional industrial networks into three functional layers.And with this aim in mind,key technologies(Blockchain-based Data Sharing,Intelligent Wireless Data Sensing,Edge Intelligence,Time-Sensitive Networks,Integrating SDN&TSN,Distributed AI)and improve applications based on AISDIN are also discussed.Further,the paper also highlights new opportunities and potential research challenges in control and automation of IIoT networks. 展开更多
关键词 industrial internet of things(iiot) Industry 4.0 Artificial intelligence(AI) Machine intelligence Software-defined networking(SDN)
下载PDF
Robust Attack Detection Approach for IIoT Using Ensemble Classifier
16
作者 V.Priya I.Sumaiya Thaseen +2 位作者 Thippa Reddy Gadekallu Mohamed K.Aboudaif Emad Abouel Nasr 《Computers, Materials & Continua》 SCIE EI 2021年第3期2457-2470,共14页
Generally,the risks associated with malicious threats are increasing for the Internet of Things(IoT)and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices.T... Generally,the risks associated with malicious threats are increasing for the Internet of Things(IoT)and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices.Thus,anomaly-based intrusion detection models for IoT networks are vital.Distinct detection methodologies need to be developed for the Industrial Internet of Things(IIoT)network as threat detection is a significant expectation of stakeholders.Machine learning approaches are considered to be evolving techniques that learn with experience,and such approaches have resulted in superior performance in various applications,such as pattern recognition,outlier analysis,and speech recognition.Traditional techniques and tools are not adequate to secure IIoT networks due to the use of various protocols in industrial systems and restricted possibilities of upgradation.In this paper,the objective is to develop a two-phase anomaly detection model to enhance the reliability of an IIoT network.In the first phase,SVM and Naïve Bayes,are integrated using an ensemble blending technique.K-fold cross-validation is performed while training the data with different training and testing ratios to obtain optimized training and test sets.Ensemble blending uses a random forest technique to predict class labels.An Artificial Neural Network(ANN)classifier that uses the Adam optimizer to achieve better accuracy is also used for prediction.In the second phase,both the ANN and random forest results are fed to the model’s classification unit,and the highest accuracy value is considered the final result.The proposed model is tested on standard IoT attack datasets,such as WUSTL_IIOT-2018,N_BaIoT,and Bot_IoT.The highest accuracy obtained is 99%.A comparative analysis of the proposed model using state-of-the-art ensemble techniques is performed to demonstrate the superiority of the results.The results also demonstrate that the proposed model outperforms traditional techniques and thus improves the reliability of an IIoT network. 展开更多
关键词 BLENDING ENSEMBLE intrusion detection industrial Internet of Things(iiot)
下载PDF
Smart and collaborative industrial IoT: A federated learning and data space approach
17
作者 Bahar Farahani Amin Karimi Monsefi 《Digital Communications and Networks》 SCIE CSCD 2023年第2期436-447,共12页
Industry 4.0 has become a reality by fusing the Industrial Internet of Things(IIoT)and Artificial Intelligence(AI),providing huge opportunities in the way manufacturing companies operate.However,the adoption of this p... Industry 4.0 has become a reality by fusing the Industrial Internet of Things(IIoT)and Artificial Intelligence(AI),providing huge opportunities in the way manufacturing companies operate.However,the adoption of this paradigm shift,particularly in the field of smart factories and production,is still in its infancy,suffering from various issues,such as the lack of high-quality data,data with high-class imbalance,or poor diversity leading to inaccurate AI models.However,data is severely fragmented across different silos owned by several parties for a range of reasons,such as compliance and legal concerns,preventing discovery and insight-driven IIoT innovation.Notably,valuable and even vital information often remains unutilized as the rise and adoption of AI and IoT in parallel with the concerns and challenges associated with privacy and security.This adversely influences interand intra-organization collaborative use of IIoT data.To tackle these challenges,this article leverages emerging multi-party technologies,privacy-enhancing techniques(e.g.,Federated Learning),and AI approaches to present a holistic,decentralized architecture to form a foundation and cradle for a cross-company collaboration platform and a federated data space to tackle the creeping fragmented data landscape.Moreover,to evaluate the efficiency of the proposed reference model,a collaborative predictive diagnostics and maintenance case study is mapped to an edge-enabled IIoT architecture.Experimental results show the potential advantages of using the proposed approach for multi-party applications accelerating sovereign data sharing through Findable,Accessible,Interoperable,and Reusable(FAIR)principles. 展开更多
关键词 Industry 4.0 industrial internet of things(iiot) Artificial intelligence(AI) Predictive maintenance(PdM) Condition monitoring(CM) Federated learning(FL) Privacy preservinig machine learning(PPML) Edge computing Fog computing Cloud computing
下载PDF
面向IIOT的数字化车间数据通信研究及应用 被引量:3
18
作者 张蕾 《电子工业专用设备》 2021年第2期52-56,共5页
为了满足工业制造车间的数据智能化采集需求,在工业物联网(IIOT)体系结构中应用监控与数据采集(SCADA)系统,通过IIOT的支撑实现设备、人、订单计划的有机互联,采用过程控制统一架构(OPC UA)协议增强了数据通信的规范性,提高了模型的可... 为了满足工业制造车间的数据智能化采集需求,在工业物联网(IIOT)体系结构中应用监控与数据采集(SCADA)系统,通过IIOT的支撑实现设备、人、订单计划的有机互联,采用过程控制统一架构(OPC UA)协议增强了数据通信的规范性,提高了模型的可重用性和扩展性,为制造执行和企业决策以及大数据应用提供数据支撑。 展开更多
关键词 工业技术 过程控制统一架构通信 监控与数据采集系统 工业互联网 智能制造
下载PDF
Blockchain Based Secure Solution for Cloud Storage:A Model for Synchronizing Industry 4.0 and IIoT
19
作者 Prakhar Sahu S.K.Singh Arun Kumar Singh 《Journal of Cyber Security》 2021年第2期107-115,共9页
Industry 4.0 is one of the hot topic of today’s world where everything in the industry will be data driven and technological advancements will take place accordingly.In the fourth phase of industrial revolution,manuf... Industry 4.0 is one of the hot topic of today’s world where everything in the industry will be data driven and technological advancements will take place accordingly.In the fourth phase of industrial revolution,manufacturers are dependent upon data produced by the consumers to invent,innovate or change anything for the product.Internet of things devices like OBD,RFID,IIoT,Smart devices are the major source of data generation and represents trends in the industry.Since the IoT device are vulnerable to hackers due to its limitation,consumer data security should be tighten up and enhanced.This paper gives an overview of industrial revolutions as well as proposes Blockchain Cloud Computing as a solution to store data for Industry 4.0. 展开更多
关键词 Industry 4.0 iiot AUTHENTICATION smart contract ledger P2P iot
下载PDF
A Novel Approach for Network Vulnerability Analysis in IIoT
20
作者 K.Sudhakar S.Senthilkumar 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期263-277,共15页
Industrial Internet of Things(IIoT)offers efficient communication among business partners and customers.With an enlargement of IoT tools connected through the internet,the ability of web traffic gets increased.Due to ... Industrial Internet of Things(IIoT)offers efficient communication among business partners and customers.With an enlargement of IoT tools connected through the internet,the ability of web traffic gets increased.Due to the raise in the size of network traffic,discovery of attacks in IIoT and malicious traffic in the early stages is a very demanding issues.A novel technique called Maximum Posterior Dichotomous Quadratic Discriminant Jaccardized Rocchio Emphasis Boost Classification(MPDQDJREBC)is introduced for accurate attack detection wi th minimum time consumption in IIoT.The proposed MPDQDJREBC technique includes feature selection and categorization.First,the network traffic features are collected from the dataset.Then applying the Maximum Posterior Dichotomous Quadratic Discriminant analysis to find the significant features for accurate classification and minimize the time consumption.After the significant features selection,classification is performed using the Jaccardized Rocchio Emphasis Boost technique.Jaccardized Rocchio Emphasis Boost Classification technique combines the weak learner result into strong output.Jaccardized Rocchio classification technique is considered as the weak learners to identify the normal and attack.Thus,proposed MPDQDJREBC technique gives strong classification results through lessening the quadratic error.This assists for proposed MPDQDJREBC technique to get better the accuracy for attack detection with reduced time usage.Experimental assessment is carried out with UNSW_NB15 Dataset using different factors such as accuracy,precision,recall,F-measure and attack detection time.The observed results exhibit the MPDQDJREBC technique provides higher accuracy and lesser time consumption than the conventional techniques. 展开更多
关键词 industrial internet of things(iiot) attack detection features selection maximum posterior dichotomous quadratic discriminant analysis jaccardized rocchio emphasis boost classification
下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部