There are numerous internet-connected devices attached to the industrial process through recent communication technologies,which enable machine-to-machine communication and the sharing of sensitive data through a new ...There are numerous internet-connected devices attached to the industrial process through recent communication technologies,which enable machine-to-machine communication and the sharing of sensitive data through a new technology called the industrial internet of things(IIoTs).Most of the suggested security mechanisms are vulnerable to several cybersecurity threats due to their reliance on cloud-based services,external trusted authorities,and centralized architectures;they have high computation and communication costs,low performance,and are exposed to a single authority of failure and bottleneck.Blockchain technology(BC)is widely adopted in the industrial sector for its valuable features in terms of decentralization,security,and scalability.In our work,we propose a decentralized,scalable,lightweight,trusted and secure private network based on blockchain technology/smart contracts for the overhead circuit breaker of the electrical power grid of the Al-Kufa/Iraq power plant as an industrial application.The proposed scheme offers a double layer of data encryption,device authentication,scalability,high performance,low power consumption,and improves the industry’s operations;provides efficient access control to the sensitive data generated by circuit breaker sensors and helps reduce power wastage.We also address data aggregation operations,which are considered challenging in electric power smart grids.We utilize a multi-chain proof of rapid authentication(McPoRA)as a consensus mechanism,which helps to enhance the computational performance and effectively improve the latency.The advanced reduced instruction set computer(RISC)machinesARMCortex-M33 microcontroller adopted in our work,is characterized by ultra-low power consumption and high performance,as well as efficiency in terms of real-time cryptographic algorithms such as the elliptic curve digital signature algorithm(ECDSA).This improves the computational execution,increases the implementation speed of the asymmetric cryptographic algorithm and provides data integrity and device authenticity at the perceptual layer.Our experimental results show that the proposed scheme achieves excellent performance,data security,real-time data processing,low power consumption(70.880 mW),and very low memory utilization(2.03%read-only memory(RAM)and 0.9%flash memory)and execution time(0.7424 s)for the cryptographic algorithm.This enables autonomous network reconfiguration on-demand and real-time data processing.展开更多
With the advancement of the Industrial Internet of Things(IoT),the rapidly growing demand for data collection and processing poses a huge challenge to the design of data transmission and computation resources in the i...With the advancement of the Industrial Internet of Things(IoT),the rapidly growing demand for data collection and processing poses a huge challenge to the design of data transmission and computation resources in the industrial scenario.Taking advantage of improved model accuracy by machine learning algorithms,we investigate the inner relationship of system performance and data transmission and computation resources,and then analyze the impacts of bandwidth allocation and computation resources on the accuracy of the system model in this paper.A joint bandwidth allocation and computation resource configuration scheme is proposed and the Karush-Kuhn-Tucker(KKT)conditions are used to get an optimal bandwidth allocation and computation configuration decision,which can minimize the total computation resource requirement and ensure the system accuracy meets the industrial requirements.Simulation results show that the proposed bandwidth allocation and computation resource configuration scheme can reduce the computing resource usage by 10%when compared to the average allocation strategy.展开更多
Industrial Control System(ICS),which is based on Industrial IoT(IIoT),has an intelligent mobile environment that supports various mobility,but there is a limit to relying only on the physical security of the ICS envir...Industrial Control System(ICS),which is based on Industrial IoT(IIoT),has an intelligent mobile environment that supports various mobility,but there is a limit to relying only on the physical security of the ICS environment.Due to various threat factors that can disrupt the workflow of the IIoT,machine learning-based anomaly detection technologies are being presented;it is also essential to study for increasing detection performance to minimize model errors for promoting stable ICS operation.In this paper,we established the requirements for improving the anomaly detection performance in the IIoT-based ICS environment by analyzing the related cases.After that,we presented an improving method of the performance of a machine learning model specialized for IIoT-based ICS,which increases the detection rate by applying correlation coefficients and clustering;it provides a mechanism to predict thresholds on a per-sequence.Likewise,we adopted the HAI dataset environment that actively reflected the characteristics of IIoT-based ICS and demonstrated that performance could be improved through comparative experiments with the traditional method and our proposed method.The presented method can further improve the performance of commonly applied error-based detection techniques and includes a primary method that can be enhanced over existing detection techniques by analyzing correlation coefficients between features to consider feedback between ICS components.Those can contribute to improving the performance of several detection models applied in ICS and other areas.展开更多
The increasing penetration of renewable energy on the transmission and distribution power network is driving the adoption of two-way power flow control, data and communications needed to meet the dependency of balanci...The increasing penetration of renewable energy on the transmission and distribution power network is driving the adoption of two-way power flow control, data and communications needed to meet the dependency of balancing generation and load. Thus, creating an environment where power and information flow seamlessly in real time to enable reliable and economically viable energy delivery, the advent of Internet of Energy(IoE) as well as the rising of Internet of Things(IoT) based smart systems.The evolution of IT to Io T has shown that an information network can be connected in an autonomous way via routers from operating system(OS) based computers and devices to build a highly intelligent eco-system. Conceptually, we are applying the same methodology to the Io E concept so that Energy Operating System(EOS) based assets and devices can be developed into a distributed energy network via energy gateway and self-organized into a smart energy eco-system.This paper introduces a laboratory based IIo T driven software and controls platform developed on the NICE Nano-grid as part of a NICE smart system Initiative for Shenhua group. The goal of this effort is to develop an open architecture based Industrial Smart Energy Consortium(ISEC) to attract industrial partners, academic universities, module supplies, equipment vendors and related stakeholder to explore and contribute into a test-bed centric open laboratory template and platform for next generation energy-oriented smart industry applications.In the meanwhile, ISEC will play an important role to drive interoperability standards for the mining industry so that the era of un-manned underground mining operation can become the reality as well as increasing safety regulation enforcement.展开更多
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability ...Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device communications.Hence,at present,a reliable and dynamic access control management system for IIoT is in urgent need.Up till now,numerous access control architectures have been proposed for IIoT.However,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be met.In this paper,we offer a smart contract token-based solution for decentralized access control in IIoT systems.Specifically,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT environments.We also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration process.Subsequently,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local blockchain.Finally,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research.展开更多
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management cons...Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management console remotely.With the increased use of Industrial IoT(IIoT)applications,the risk of brutal cyber-attacks also increased.This leads researchers worldwide to work on developing effective Intrusion Detection Systems(IDS)for IoT infrastructure against any malicious activities.Therefore,this paper provides effective IDS to detect and classify unpredicted and unpredictable severe attacks in contradiction to the IoT infrastructure.A comprehensive evaluation examined on a new available benchmark TON_IoT dataset is introduced.The data-driven IoT/IIoT dataset incorporates a label feature indicating classes of normal and attack-targeting IoT/IIoT applications.Correspondingly,this data involves IoT/IIoT services-based telemetry data that involves operating systems logs and IoT-based traffic networks collected from a realistic medium-scale IoT network.This is to classify and recognize the intrusion activity and provide the intrusion detection objectives in IoT environments in an efficient fashion.Therefore,several machine learning algorithms such as Logistic Regression(LR),Linear Discriminant Analysis(LDA),K-Nearest Neighbors(KNN),Gaussian Naive Bayes(NB),Classification and Regression Tree(CART),Random Forest(RF),and AdaBoost(AB)are used for the detection intent on thirteen different intrusion datasets.Several performance metrics like accuracy,precision,recall,and F1-score are used to estimate the proposed framework.The experimental results show that the CART surpasses the other algorithms with the highest accuracy values like 0.97,1.00,0.99,0.99,1.00,1.00,and 1.00 for effectively detecting the intrusion activities on the IoT/IIoT infrastructure on most of the employed datasets.In addition,the proposed work accomplishes high performance compared to other recent related works in terms of different security and detection evaluation parameters.展开更多
With the increased advancements of smart industries,cybersecurity has become a vital growth factor in the success of industrial transformation.The Industrial Internet of Things(IIoT)or Industry 4.0 has revolutionized ...With the increased advancements of smart industries,cybersecurity has become a vital growth factor in the success of industrial transformation.The Industrial Internet of Things(IIoT)or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether.In industry 4.0,powerful IntrusionDetection Systems(IDS)play a significant role in ensuring network security.Though various intrusion detection techniques have been developed so far,it is challenging to protect the intricate data of networks.This is because conventional Machine Learning(ML)approaches are inadequate and insufficient to address the demands of dynamic IIoT networks.Further,the existing Deep Learning(DL)can be employed to identify anonymous intrusions.Therefore,the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection(HGSODLID)model for the IIoT environment.The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format.The HGSO algorithm is employed for Feature Selection(HGSO-FS)to reduce the curse of dimensionality.Moreover,Sparrow Search Optimization(SSO)is utilized with a Graph Convolutional Network(GCN)to classify and identify intrusions in the network.Finally,the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model.The proposed HGSODL-ID model was experimentally validated using a benchmark dataset,and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.展开更多
Wind energy has been identified as the second dominating source in the world renewable energy generation after hydropower.Conversion and distribution of wind energy has brought technology revolution by developing the ...Wind energy has been identified as the second dominating source in the world renewable energy generation after hydropower.Conversion and distribution of wind energy has brought technology revolution by developing the advanced wind energy conversion system(WECS)including multilevel inverters(MLIs).The conventional rectifier produces ripples in their output waveforms while the MLI suffers from voltage balancing issues across the DC-link capacitor.This paper proposes a simplified proportional integral(PI)-based space vector pulse width modulation(SVPWM)to minimize the output waveform ripples,resolve the voltage balancing issue and produce better-quality output waveforms.WECS experiences various types of faults particularly in the DC-link capacitor and switching devices of the power converter.These faults,if not detected and rectified at an early stage,may lead to catastrophic failures to the WECS and continuity of the power supply.This paper proposes a new algorithm embedded in the proposed PI-based SVPWM controller to identify the fault location in the power converter in real time.Since most wind power plants are located in remote areas or offshore,WECS condition monitoring needs to be developed over the internet of things(IoT)to ensure system reliability.In this paper,an industrial IoT algorithm with an associated hardware prototype is proposed to monitor the condition of WECS in the real-time environment.展开更多
In recent times,Industrial Internet of Things(IIoT)experiences a high risk of cyber attacks which needs to be resolved.Blockchain technology can be incorporated into IIoT system to help the entrepreneurs realize Indus...In recent times,Industrial Internet of Things(IIoT)experiences a high risk of cyber attacks which needs to be resolved.Blockchain technology can be incorporated into IIoT system to help the entrepreneurs realize Industry 4.0 by overcoming such cyber attacks.Although blockchain-based IIoT network renders a significant support and meet the service requirements of next generation network,the performance arrived at,in existing studies still needs improvement.In this scenario,the current research paper develops a new Privacy-Preserving Blockchain with Deep Learning model for Industrial IoT(PPBDL-IIoT)on 6G environment.The proposed PPBDLIIoT technique aims at identifying the existence of intrusions in network.Further,PPBDL-IIoT technique also involves the design of Chaos Game Optimization(CGO)with Bidirectional Gated Recurrent Neural Network(BiGRNN)technique for both detection and classification of intrusions in the network.Besides,CGO technique is applied to fine tune the hyperparameters in BiGRNN model.CGO algorithm is applied to optimally adjust the learning rate,epoch count,and weight decay so as to considerably improve the intrusion detection performance of BiGRNN model.Moreover,Blockchain enabled Integrity Check(BEIC)scheme is also introduced to avoid the misrouting attacks that tamper the OpenFlow rules of SDN-based IIoT system.The performance of the proposed PPBDL-IIoT methodology was validated using Industrial Control System Cyber-attack(ICSCA)dataset and the outcomes were analysed under various measures.The experimental results highlight the supremacy of the presented PPBDL-IIoT technique than the recent state-of-the-art techniques with the higher accuracy of 91.50%.展开更多
ZTE Corporation, a leading global provider of telecommunications equipment and networking solutions, announced on May 11,2010 that ZTE Corporation and Innofidei have jointly delivered a significant breakthrough for th...ZTE Corporation, a leading global provider of telecommunications equipment and networking solutions, announced on May 11,2010 that ZTE Corporation and Innofidei have jointly delivered a significant breakthrough for the Time Division Long Term Evolution (TD-LTE) industry with the industry's first successful Inter-Operability Test(IOT) of multiple TD-LTE USB dongles in a single mobile network cell. The successful test was first performed in Hong Kong,展开更多
Navigation is an essential skill for robots.It becomes a cumbersome task for the robot in a human-populated environment,and Industry 5.0 is an emerging trend that focuses on the interaction between humans and robots.R...Navigation is an essential skill for robots.It becomes a cumbersome task for the robot in a human-populated environment,and Industry 5.0 is an emerging trend that focuses on the interaction between humans and robots.Robot behavior in a social setting is the key to human acceptance while ensuring human comfort and safety.With the advancement in robotics technology,the true use cases of robots in the tourism and hospitality industry are expanding in number.There are very few experimental studies focusing on how people perceive the navigation behavior of a delivery robot.A robotic platform named“PI”has been designed,which incorporates proximity and vision sensors.The robot utilizes a real-time object recognition algorithm based on the You Only Look Once(YOLO)algorithm to detect objects and humans during navigation.This study is aimed towards evaluating human experience,for which we conducted a study among 36 participants to explore the perceived social presence,role,and perception of a delivery robot exhibiting different behavior conditions while navigating in a hotel corridor.The participants’responses were collected and compared for different behavior conditions demonstrated by the robot and results show that humans prefer an assistant role of a robot enabled with audio and visual aids exhibiting social behavior.Further,this study can be useful for developers to gain insight into the expected behavior of a delivery robot.展开更多
基金This work is supported by the National Key R&D Program of China under Grand No.2021YFB2012202the Key Research Development Plan of Hubei Province of China under Grant No.2021BAA171,2021BAA038the project of Science Technology and Innovation Commission of Shenzhen Municipality of China under Grant No.JCYJ20210324120002006 and JSGG20210802153009028.
文摘There are numerous internet-connected devices attached to the industrial process through recent communication technologies,which enable machine-to-machine communication and the sharing of sensitive data through a new technology called the industrial internet of things(IIoTs).Most of the suggested security mechanisms are vulnerable to several cybersecurity threats due to their reliance on cloud-based services,external trusted authorities,and centralized architectures;they have high computation and communication costs,low performance,and are exposed to a single authority of failure and bottleneck.Blockchain technology(BC)is widely adopted in the industrial sector for its valuable features in terms of decentralization,security,and scalability.In our work,we propose a decentralized,scalable,lightweight,trusted and secure private network based on blockchain technology/smart contracts for the overhead circuit breaker of the electrical power grid of the Al-Kufa/Iraq power plant as an industrial application.The proposed scheme offers a double layer of data encryption,device authentication,scalability,high performance,low power consumption,and improves the industry’s operations;provides efficient access control to the sensitive data generated by circuit breaker sensors and helps reduce power wastage.We also address data aggregation operations,which are considered challenging in electric power smart grids.We utilize a multi-chain proof of rapid authentication(McPoRA)as a consensus mechanism,which helps to enhance the computational performance and effectively improve the latency.The advanced reduced instruction set computer(RISC)machinesARMCortex-M33 microcontroller adopted in our work,is characterized by ultra-low power consumption and high performance,as well as efficiency in terms of real-time cryptographic algorithms such as the elliptic curve digital signature algorithm(ECDSA).This improves the computational execution,increases the implementation speed of the asymmetric cryptographic algorithm and provides data integrity and device authenticity at the perceptual layer.Our experimental results show that the proposed scheme achieves excellent performance,data security,real-time data processing,low power consumption(70.880 mW),and very low memory utilization(2.03%read-only memory(RAM)and 0.9%flash memory)and execution time(0.7424 s)for the cryptographic algorithm.This enables autonomous network reconfiguration on-demand and real-time data processing.
基金supported in part by the National Natural Science Foundation of China under Grant No. 62172445in part by the Young Talents Plan of Hunan Province,China
文摘With the advancement of the Industrial Internet of Things(IoT),the rapidly growing demand for data collection and processing poses a huge challenge to the design of data transmission and computation resources in the industrial scenario.Taking advantage of improved model accuracy by machine learning algorithms,we investigate the inner relationship of system performance and data transmission and computation resources,and then analyze the impacts of bandwidth allocation and computation resources on the accuracy of the system model in this paper.A joint bandwidth allocation and computation resource configuration scheme is proposed and the Karush-Kuhn-Tucker(KKT)conditions are used to get an optimal bandwidth allocation and computation configuration decision,which can minimize the total computation resource requirement and ensure the system accuracy meets the industrial requirements.Simulation results show that the proposed bandwidth allocation and computation resource configuration scheme can reduce the computing resource usage by 10%when compared to the average allocation strategy.
基金This work was supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(No.NRF-2020R1A2C1012187,50%)the Nuclear Safety Research Program through the Korea Foundation of Nuclear Safety(KoFONS)using the financial resource granted by the Nuclear Safety and Security Commission(NSSC)of the Republic of Korea(No.2101058,25%)+1 种基金the Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.2021-0-00493)5G Massive Next Generation Cyber Attack Deception Technology Development,25%).
文摘Industrial Control System(ICS),which is based on Industrial IoT(IIoT),has an intelligent mobile environment that supports various mobility,but there is a limit to relying only on the physical security of the ICS environment.Due to various threat factors that can disrupt the workflow of the IIoT,machine learning-based anomaly detection technologies are being presented;it is also essential to study for increasing detection performance to minimize model errors for promoting stable ICS operation.In this paper,we established the requirements for improving the anomaly detection performance in the IIoT-based ICS environment by analyzing the related cases.After that,we presented an improving method of the performance of a machine learning model specialized for IIoT-based ICS,which increases the detection rate by applying correlation coefficients and clustering;it provides a mechanism to predict thresholds on a per-sequence.Likewise,we adopted the HAI dataset environment that actively reflected the characteristics of IIoT-based ICS and demonstrated that performance could be improved through comparative experiments with the traditional method and our proposed method.The presented method can further improve the performance of commonly applied error-based detection techniques and includes a primary method that can be enhanced over existing detection techniques by analyzing correlation coefficients between features to consider feedback between ICS components.Those can contribute to improving the performance of several detection models applied in ICS and other areas.
基金supported by National Key Research and Development Program(2016YFE0102600)National Natural Science Foundation of China(51577096,51477082)
文摘The increasing penetration of renewable energy on the transmission and distribution power network is driving the adoption of two-way power flow control, data and communications needed to meet the dependency of balancing generation and load. Thus, creating an environment where power and information flow seamlessly in real time to enable reliable and economically viable energy delivery, the advent of Internet of Energy(IoE) as well as the rising of Internet of Things(IoT) based smart systems.The evolution of IT to Io T has shown that an information network can be connected in an autonomous way via routers from operating system(OS) based computers and devices to build a highly intelligent eco-system. Conceptually, we are applying the same methodology to the Io E concept so that Energy Operating System(EOS) based assets and devices can be developed into a distributed energy network via energy gateway and self-organized into a smart energy eco-system.This paper introduces a laboratory based IIo T driven software and controls platform developed on the NICE Nano-grid as part of a NICE smart system Initiative for Shenhua group. The goal of this effort is to develop an open architecture based Industrial Smart Energy Consortium(ISEC) to attract industrial partners, academic universities, module supplies, equipment vendors and related stakeholder to explore and contribute into a test-bed centric open laboratory template and platform for next generation energy-oriented smart industry applications.In the meanwhile, ISEC will play an important role to drive interoperability standards for the mining industry so that the era of un-manned underground mining operation can become the reality as well as increasing safety regulation enforcement.
文摘Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device communications.Hence,at present,a reliable and dynamic access control management system for IIoT is in urgent need.Up till now,numerous access control architectures have been proposed for IIoT.However,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be met.In this paper,we offer a smart contract token-based solution for decentralized access control in IIoT systems.Specifically,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT environments.We also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration process.Subsequently,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local blockchain.Finally,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research.
文摘Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management console remotely.With the increased use of Industrial IoT(IIoT)applications,the risk of brutal cyber-attacks also increased.This leads researchers worldwide to work on developing effective Intrusion Detection Systems(IDS)for IoT infrastructure against any malicious activities.Therefore,this paper provides effective IDS to detect and classify unpredicted and unpredictable severe attacks in contradiction to the IoT infrastructure.A comprehensive evaluation examined on a new available benchmark TON_IoT dataset is introduced.The data-driven IoT/IIoT dataset incorporates a label feature indicating classes of normal and attack-targeting IoT/IIoT applications.Correspondingly,this data involves IoT/IIoT services-based telemetry data that involves operating systems logs and IoT-based traffic networks collected from a realistic medium-scale IoT network.This is to classify and recognize the intrusion activity and provide the intrusion detection objectives in IoT environments in an efficient fashion.Therefore,several machine learning algorithms such as Logistic Regression(LR),Linear Discriminant Analysis(LDA),K-Nearest Neighbors(KNN),Gaussian Naive Bayes(NB),Classification and Regression Tree(CART),Random Forest(RF),and AdaBoost(AB)are used for the detection intent on thirteen different intrusion datasets.Several performance metrics like accuracy,precision,recall,and F1-score are used to estimate the proposed framework.The experimental results show that the CART surpasses the other algorithms with the highest accuracy values like 0.97,1.00,0.99,0.99,1.00,1.00,and 1.00 for effectively detecting the intrusion activities on the IoT/IIoT infrastructure on most of the employed datasets.In addition,the proposed work accomplishes high performance compared to other recent related works in terms of different security and detection evaluation parameters.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R319)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:22UQU4340237DSR44The authors are thankful to the Deanship of Scientific Research at Najran University for funding thiswork under theResearch Groups Funding program Grant Code(NU/RG/SERC/11/4).
文摘With the increased advancements of smart industries,cybersecurity has become a vital growth factor in the success of industrial transformation.The Industrial Internet of Things(IIoT)or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether.In industry 4.0,powerful IntrusionDetection Systems(IDS)play a significant role in ensuring network security.Though various intrusion detection techniques have been developed so far,it is challenging to protect the intricate data of networks.This is because conventional Machine Learning(ML)approaches are inadequate and insufficient to address the demands of dynamic IIoT networks.Further,the existing Deep Learning(DL)can be employed to identify anonymous intrusions.Therefore,the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection(HGSODLID)model for the IIoT environment.The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format.The HGSO algorithm is employed for Feature Selection(HGSO-FS)to reduce the curse of dimensionality.Moreover,Sparrow Search Optimization(SSO)is utilized with a Graph Convolutional Network(GCN)to classify and identify intrusions in the network.Finally,the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model.The proposed HGSODL-ID model was experimentally validated using a benchmark dataset,and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.
文摘Wind energy has been identified as the second dominating source in the world renewable energy generation after hydropower.Conversion and distribution of wind energy has brought technology revolution by developing the advanced wind energy conversion system(WECS)including multilevel inverters(MLIs).The conventional rectifier produces ripples in their output waveforms while the MLI suffers from voltage balancing issues across the DC-link capacitor.This paper proposes a simplified proportional integral(PI)-based space vector pulse width modulation(SVPWM)to minimize the output waveform ripples,resolve the voltage balancing issue and produce better-quality output waveforms.WECS experiences various types of faults particularly in the DC-link capacitor and switching devices of the power converter.These faults,if not detected and rectified at an early stage,may lead to catastrophic failures to the WECS and continuity of the power supply.This paper proposes a new algorithm embedded in the proposed PI-based SVPWM controller to identify the fault location in the power converter in real time.Since most wind power plants are located in remote areas or offshore,WECS condition monitoring needs to be developed over the internet of things(IoT)to ensure system reliability.In this paper,an industrial IoT algorithm with an associated hardware prototype is proposed to monitor the condition of WECS in the real-time environment.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP 2/23/42).
文摘In recent times,Industrial Internet of Things(IIoT)experiences a high risk of cyber attacks which needs to be resolved.Blockchain technology can be incorporated into IIoT system to help the entrepreneurs realize Industry 4.0 by overcoming such cyber attacks.Although blockchain-based IIoT network renders a significant support and meet the service requirements of next generation network,the performance arrived at,in existing studies still needs improvement.In this scenario,the current research paper develops a new Privacy-Preserving Blockchain with Deep Learning model for Industrial IoT(PPBDL-IIoT)on 6G environment.The proposed PPBDLIIoT technique aims at identifying the existence of intrusions in network.Further,PPBDL-IIoT technique also involves the design of Chaos Game Optimization(CGO)with Bidirectional Gated Recurrent Neural Network(BiGRNN)technique for both detection and classification of intrusions in the network.Besides,CGO technique is applied to fine tune the hyperparameters in BiGRNN model.CGO algorithm is applied to optimally adjust the learning rate,epoch count,and weight decay so as to considerably improve the intrusion detection performance of BiGRNN model.Moreover,Blockchain enabled Integrity Check(BEIC)scheme is also introduced to avoid the misrouting attacks that tamper the OpenFlow rules of SDN-based IIoT system.The performance of the proposed PPBDL-IIoT methodology was validated using Industrial Control System Cyber-attack(ICSCA)dataset and the outcomes were analysed under various measures.The experimental results highlight the supremacy of the presented PPBDL-IIoT technique than the recent state-of-the-art techniques with the higher accuracy of 91.50%.
文摘ZTE Corporation, a leading global provider of telecommunications equipment and networking solutions, announced on May 11,2010 that ZTE Corporation and Innofidei have jointly delivered a significant breakthrough for the Time Division Long Term Evolution (TD-LTE) industry with the industry's first successful Inter-Operability Test(IOT) of multiple TD-LTE USB dongles in a single mobile network cell. The successful test was first performed in Hong Kong,
基金supported by Taif University Researchers Supporting Projects(TURSP).Under number(TURSP-2020/211),Taif University,Taif,Saudi Arabia.
文摘Navigation is an essential skill for robots.It becomes a cumbersome task for the robot in a human-populated environment,and Industry 5.0 is an emerging trend that focuses on the interaction between humans and robots.Robot behavior in a social setting is the key to human acceptance while ensuring human comfort and safety.With the advancement in robotics technology,the true use cases of robots in the tourism and hospitality industry are expanding in number.There are very few experimental studies focusing on how people perceive the navigation behavior of a delivery robot.A robotic platform named“PI”has been designed,which incorporates proximity and vision sensors.The robot utilizes a real-time object recognition algorithm based on the You Only Look Once(YOLO)algorithm to detect objects and humans during navigation.This study is aimed towards evaluating human experience,for which we conducted a study among 36 participants to explore the perceived social presence,role,and perception of a delivery robot exhibiting different behavior conditions while navigating in a hotel corridor.The participants’responses were collected and compared for different behavior conditions demonstrated by the robot and results show that humans prefer an assistant role of a robot enabled with audio and visual aids exhibiting social behavior.Further,this study can be useful for developers to gain insight into the expected behavior of a delivery robot.