期刊文献+
共找到4,671篇文章
< 1 2 234 >
每页显示 20 50 100
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
1
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 Key nodes dynamic model industrial control network SIMULATION
下载PDF
An Industrial Intrusion Detection Method Based on Hybrid Convolutional Neural Networks with Improved TCN
2
作者 Zhihua Liu Shengquan Liu Jian Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第1期411-433,共23页
Network intrusion detection systems(NIDS)based on deep learning have continued to make significant advances.However,the following challenges remain:on the one hand,simply applying only Temporal Convolutional Networks(... Network intrusion detection systems(NIDS)based on deep learning have continued to make significant advances.However,the following challenges remain:on the one hand,simply applying only Temporal Convolutional Networks(TCNs)can lead to models that ignore the impact of network traffic features at different scales on the detection performance.On the other hand,some intrusion detection methods considermulti-scale information of traffic data,but considering only forward network traffic information can lead to deficiencies in capturing multi-scale temporal features.To address both of these issues,we propose a hybrid Convolutional Neural Network that supports a multi-output strategy(BONUS)for industrial internet intrusion detection.First,we create a multiscale Temporal Convolutional Network by stacking TCN of different scales to capture the multiscale information of network traffic.Meanwhile,we propose a bi-directional structure and dynamically set the weights to fuse the forward and backward contextual information of network traffic at each scale to enhance the model’s performance in capturing the multi-scale temporal features of network traffic.In addition,we introduce a gated network for each of the two branches in the proposed method to assist the model in learning the feature representation of each branch.Extensive experiments reveal the effectiveness of the proposed approach on two publicly available traffic intrusion detection datasets named UNSW-NB15 and NSL-KDD with F1 score of 85.03% and 99.31%,respectively,which also validates the effectiveness of enhancing the model’s ability to capture multi-scale temporal features of traffic data on detection performance. 展开更多
关键词 Intrusion detection industrial internet channel spatial attention multiscale features dynamic fusion multi-output learning strategy
下载PDF
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things
3
作者 Senshan Ouyang Xiang Liu +3 位作者 Lei Liu Shangchao Wang Baichuan Shao Yang Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期903-915,共13页
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar... With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle. 展开更多
关键词 KEY-INSULATED SM2 algorithm digital signature industrial Internet of Things(IIoT) provable security
下载PDF
Intelligent Intrusion Detection System for Industrial Internet of Things Environment 被引量:1
4
作者 R.Gopi R.Sheeba +4 位作者 K.Anguraj T.Chelladurai Haya Mesfer Alshahrani Nadhem Nemri Tarek Lamoudan 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1567-1582,共16页
Rapid increase in the large quantity of industrial data,Industry 4.0/5.0 poses several challenging issues such as heterogeneous data generation,data sensing and collection,real-time data processing,and high request ar... Rapid increase in the large quantity of industrial data,Industry 4.0/5.0 poses several challenging issues such as heterogeneous data generation,data sensing and collection,real-time data processing,and high request arrival rates.The classical intrusion detection system(IDS)is not a practical solution to the Industry 4.0 environment owing to the resource limitations and complexity.To resolve these issues,this paper designs a new Chaotic Cuckoo Search Optimiza-tion Algorithm(CCSOA)with optimal wavelet kernel extreme learning machine(OWKELM)named CCSOA-OWKELM technique for IDS on the Industry 4.0 platform.The CCSOA-OWKELM technique focuses on the design of feature selection with classification approach to achieve minimum computation complex-ity and maximum detection accuracy.The CCSOA-OWKELM technique involves the design of CCSOA based feature selection technique,which incorpo-rates the concepts of chaotic maps with CSOA.Besides,the OWKELM technique is applied for the intrusion detection and classification process.In addition,the OWKELM technique is derived by the hyperparameter tuning of the WKELM technique by the use of sunflower optimization(SFO)algorithm.The utilization of CCSOA for feature subset selection and SFO algorithm based hyperparameter tuning leads to better performance.In order to guarantee the supreme performance of the CCSOA-OWKELM technique,a wide range of experiments take place on two benchmark datasets and the experimental outcomes demonstrate the promis-ing performance of the CCSOA-OWKELM technique over the recent state of art techniques. 展开更多
关键词 Intrusion detection system artificial intelligence machine learning industry 4.0 internet of things
下载PDF
Industrial Carbon Emission Distribution and Regional Joint Emission Reduction:A Case Study of Cities in the Pearl River Basin,China 被引量:1
5
作者 JIANG Hongtao YIN Jian +4 位作者 ZHANG Bin WEI Danqi LUO Xinyuan DING Yi XIA Ruici 《Chinese Geographical Science》 SCIE CSCD 2024年第2期210-229,共20页
China’s low-carbon development path will make significant contributions to achieving global sustainable development goals.Due to the diverse natural and economic conditions across different regions in China,there exi... China’s low-carbon development path will make significant contributions to achieving global sustainable development goals.Due to the diverse natural and economic conditions across different regions in China,there exists an imbalance in the distribution of car-bon emissions.Therefore,regional cooperation serves as an effective means to attain low-carbon development.This study examined the pattern of carbon emissions and proposed a potential joint emission reduction strategy by utilizing the industrial carbon emission intens-ity(ICEI)as a crucial factor.We utilized social network analysis and Local Indicators of Spatial Association(LISA)space-time trans-ition matrix to investigate the spatiotemporal connections and discrepancies of ICEI in the cities of the Pearl River Basin(PRB),China from 2010 to 2020.The primary drivers of the ICEI were determined through geographical detectors and multi-scale geographically weighted regression.The results were as follows:1)the overall ICEI in the Pearl River Basin is showing a downward trend,and there is a significant spatial imbalance.2)There are numerous network connections between cities regarding the ICEI,but the network structure is relatively fragile and unstable.3)Economically developed cities such as Guangzhou,Foshan,and Dongguan are in the center of the network while playing an intermediary role.4)Energy consumption,industrialization,per capita GDP,urbanization,science and techno-logy,and productivity are found to be the most influential variables in the spatial differentiation of ICEI,and their combination in-creased the explanatory power of the geographic variation of ICEI.Finally,through the analysis of differences and connections in urban carbon emissions under different economic levels and ICEI,the study suggests joint carbon reduction strategies,which are centered on carbon transfer,financial support,and technological assistance among cities. 展开更多
关键词 industrial carbon emission intensity carbon emission social network analysis Location Indicators of Spatial Association(LISA) geographical detector multi-scale geographically weighted regression Pearl River Basin(PRB) China
下载PDF
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network:Architectures,enabling technologies,and opportunities
6
作者 Jinfang Jiang Chuan Lin +3 位作者 Guangjie Han Adnan MAbu-Mahfouz Syed Bilal Hussain Shah Miguel Martínez-García 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1351-1362,共12页
The ongoing expansion of the Industrial Internet of Things(IIoT)is enabling the possibility of effective Industry 4.0,where massive sensing devices in heterogeneous environments are connected through dedicated communi... The ongoing expansion of the Industrial Internet of Things(IIoT)is enabling the possibility of effective Industry 4.0,where massive sensing devices in heterogeneous environments are connected through dedicated communication protocols.This brings forth new methods and models to fuse the information yielded by the various industrial plant elements and generates emerging security challenges that we have to face,providing ad-hoc functions for scheduling and guaranteeing the network operations.Recently,the large development of SoftwareDefined Networking(SDN)and Artificial Intelligence(AI)technologies have made feasible the design and control of scalable and secure IIoT networks.This paper studies how AI and SDN technologies combined can be leveraged towards improving the security and functionality of these IIoT networks.After surveying the state-of-the-art research efforts in the subject,the paper introduces a candidate architecture for AI-enabled Software-Defined IIoT Network(AI-SDIN)that divides the traditional industrial networks into three functional layers.And with this aim in mind,key technologies(Blockchain-based Data Sharing,Intelligent Wireless Data Sensing,Edge Intelligence,Time-Sensitive Networks,Integrating SDN&TSN,Distributed AI)and improve applications based on AISDIN are also discussed.Further,the paper also highlights new opportunities and potential research challenges in control and automation of IIoT networks. 展开更多
关键词 industrial internet of things(IIoT) Industry 4.0 Artificial intelligence(AI) Machine intelligence Software-defined networking(SDN)
下载PDF
Edge Computing Task Scheduling with Joint Blockchain and Task Caching in Industrial Internet
7
作者 Yanping Chen Xuyang Bai +3 位作者 Xiaomin Jin Zhongmin Wang Fengwei Wang Li Ling 《Computers, Materials & Continua》 SCIE EI 2023年第4期2101-2117,共17页
Deploying task caching at edge servers has become an effectiveway to handle compute-intensive and latency-sensitive tasks on the industrialinternet. However, how to select the task scheduling location to reduce taskde... Deploying task caching at edge servers has become an effectiveway to handle compute-intensive and latency-sensitive tasks on the industrialinternet. However, how to select the task scheduling location to reduce taskdelay and cost while ensuring the data security and reliable communicationof edge computing remains a challenge. To solve this problem, this paperestablishes a task scheduling model with joint blockchain and task cachingin the industrial internet and designs a novel blockchain-assisted cachingmechanism to enhance system security. In this paper, the task schedulingproblem, which couples the task scheduling decision, task caching decision,and blockchain reward, is formulated as the minimum weighted cost problemunder delay constraints. This is a mixed integer nonlinear problem, which isproved to be nonconvex and NP-hard. To solve the optimal solution, thispaper proposes a task scheduling strategy algorithm based on an improvedgenetic algorithm (IGA-TSPA) by improving the genetic algorithm initializationand mutation operations to reduce the size of the initial solutionspace and enhance the optimal solution convergence speed. In addition,an Improved Least Frequently Used algorithm is proposed to improve thecontent hit rate. Simulation results show that IGA-TSPA has a faster optimalsolution-solving ability and shorter running time compared with the existingedge computing scheduling algorithms. The established task scheduling modelnot only saves 62.19% of system overhead consumption in comparison withlocal computing but also has great significance in protecting data security,reducing task processing delay, and reducing system cost. 展开更多
关键词 Edge computing task scheduling blockchain task caching industrial security
下载PDF
Smart contract token-based privacy-preserving access control system for industrial Internet of Things
8
作者 Weizheng Wang Huakun Huang +3 位作者 Zhimeng Yin Thippa Reddy Gadekallu Mamoun Alazab Chunhua Su 《Digital Communications and Networks》 SCIE CSCD 2023年第2期337-346,共10页
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability ... Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device communications.Hence,at present,a reliable and dynamic access control management system for IIoT is in urgent need.Up till now,numerous access control architectures have been proposed for IIoT.However,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be met.In this paper,we offer a smart contract token-based solution for decentralized access control in IIoT systems.Specifically,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT environments.We also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration process.Subsequently,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local blockchain.Finally,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research. 展开更多
关键词 Blockchain Privacy preservation Smart contract industrial IoT
下载PDF
Anomaly Detection for Industrial Internet of Things Cyberattacks
9
作者 Rehab Alanazi Ahamed Aljuhani 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2361-2378,共18页
The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diver... The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational andfinancial harm to organizations.To preserve the confidentiality,integrity,and availability of IIoT networks,an anomaly-based intrusion detection system(IDS)can be used to provide secure,reliable,and efficient IIoT ecosystems.In this paper,we propose an anomaly-based IDS for IIoT networks as an effective security solution to efficiently and effectively overcome several IIoT cyberattacks.The proposed anomaly-based IDS is divided into three phases:pre-processing,feature selection,and classification.In the pre-processing phase,data cleaning and nor-malization are performed.In the feature selection phase,the candidates’feature vectors are computed using two feature reduction techniques,minimum redun-dancy maximum relevance and neighborhood components analysis.For thefinal step,the modeling phase,the following classifiers are used to perform the classi-fication:support vector machine,decision tree,k-nearest neighbors,and linear discriminant analysis.The proposed work uses a new data-driven IIoT data set called X-IIoTID.The experimental evaluation demonstrates our proposed model achieved a high accuracy rate of 99.58%,a sensitivity rate of 99.59%,a specificity rate of 99.58%,and a low false positive rate of 0.4%. 展开更多
关键词 Anomaly detection anomaly-based IDS industrial Internet of Things(IIoT) IOT industrial control systems(ICSs) X-IIoTID
下载PDF
SBFT:A BFT Consensus Mechanism Based on DQN Algorithm for Industrial Internet of Thing
10
作者 Ningjie Gao Ru Huo +3 位作者 Shuo Wang Jiang Liu Tao Huang Yunjie Liu 《China Communications》 SCIE CSCD 2023年第10期185-199,共15页
With the development and widespread use of blockchain in recent years,many projects have introduced blockchain technology to solve the growing security issues of the Industrial Internet of Things(IIoT).However,due to ... With the development and widespread use of blockchain in recent years,many projects have introduced blockchain technology to solve the growing security issues of the Industrial Internet of Things(IIoT).However,due to the conflict between the operational performance and security of the blockchain system and the compatibility issues with a large number of IIoT devices running together,the mainstream blockchain system cannot be applied to IIoT scenarios.In order to solve these problems,this paper proposes SBFT(Speculative Byzantine Consensus Protocol),a flexible and scalable blockchain consensus mechanism for the Industrial Internet of Things.SBFT has a consensus process based on speculation,improving the throughput and consensus speed of blockchain systems and reducing communication overhead.In order to improve the compatibility and scalability of the blockchain system,we select some nodes to participate in the consensus,and these nodes have better performance in the network.Since multiple properties determine node performance,we abstract the node selection problem as a joint optimization problem and use Dueling Deep Q Learning(DQL)to solve it.Finally,we evaluate the performance of the scheme through simulation,and the simulation results prove the superiority of our scheme. 展开更多
关键词 industrial Internet of Things Byzantine fault tolerance speculative consensus mechanism Markov decision process deep reinforcement learning
下载PDF
AID4I:An Intrusion Detection Framework for Industrial Internet of Things Using Automated Machine Learning
11
作者 Anil Sezgin Aytug Boyacı 《Computers, Materials & Continua》 SCIE EI 2023年第8期2121-2143,共23页
By identifying and responding to any malicious behavior that could endanger the system,the Intrusion Detection System(IDS)is crucial for preserving the security of the Industrial Internet of Things(IIoT)network.The be... By identifying and responding to any malicious behavior that could endanger the system,the Intrusion Detection System(IDS)is crucial for preserving the security of the Industrial Internet of Things(IIoT)network.The benefit of anomaly-based IDS is that they are able to recognize zeroday attacks due to the fact that they do not rely on a signature database to identify abnormal activity.In order to improve control over datasets and the process,this study proposes using an automated machine learning(AutoML)technique to automate the machine learning processes for IDS.Our groundbreaking architecture,known as AID4I,makes use of automatic machine learning methods for intrusion detection.Through automation of preprocessing,feature selection,model selection,and hyperparameter tuning,the objective is to identify an appropriate machine learning model for intrusion detection.Experimental studies demonstrate that the AID4I framework successfully proposes a suitablemodel.The integrity,security,and confidentiality of data transmitted across the IIoT network can be ensured by automating machine learning processes in the IDS to enhance its capacity to identify and stop threatening activities.With a comprehensive solution that takes advantage of the latest advances in automated machine learning methods to improve network security,AID4I is a powerful and effective instrument for intrusion detection.In preprocessing module,three distinct imputation methods are utilized to handle missing data,ensuring the robustness of the intrusion detection system in the presence of incomplete information.Feature selection module adopts a hybrid approach that combines Shapley values and genetic algorithm.The Parameter Optimization module encompasses a diverse set of 14 classification methods,allowing for thorough exploration and optimization of the parameters associated with each algorithm.By carefully tuning these parameters,the framework enhances its adaptability and accuracy in identifying potential intrusions.Experimental results demonstrate that the AID4I framework can achieve high levels of accuracy in detecting network intrusions up to 14.39%on public datasets,outperforming traditional intrusion detection methods while concurrently reducing the elapsed time for training and testing. 展开更多
关键词 Automated machine learning intrusion detection system industrial internet of things parameter optimization
下载PDF
An Efficient Intrusion Detection Framework for Industrial Internet of Things Security
12
作者 Samah Alshathri Ayman El-Sayed +1 位作者 Walid El-Shafai Ezz El-Din Hemdan 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期819-834,共16页
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management cons... Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management console remotely.With the increased use of Industrial IoT(IIoT)applications,the risk of brutal cyber-attacks also increased.This leads researchers worldwide to work on developing effective Intrusion Detection Systems(IDS)for IoT infrastructure against any malicious activities.Therefore,this paper provides effective IDS to detect and classify unpredicted and unpredictable severe attacks in contradiction to the IoT infrastructure.A comprehensive evaluation examined on a new available benchmark TON_IoT dataset is introduced.The data-driven IoT/IIoT dataset incorporates a label feature indicating classes of normal and attack-targeting IoT/IIoT applications.Correspondingly,this data involves IoT/IIoT services-based telemetry data that involves operating systems logs and IoT-based traffic networks collected from a realistic medium-scale IoT network.This is to classify and recognize the intrusion activity and provide the intrusion detection objectives in IoT environments in an efficient fashion.Therefore,several machine learning algorithms such as Logistic Regression(LR),Linear Discriminant Analysis(LDA),K-Nearest Neighbors(KNN),Gaussian Naive Bayes(NB),Classification and Regression Tree(CART),Random Forest(RF),and AdaBoost(AB)are used for the detection intent on thirteen different intrusion datasets.Several performance metrics like accuracy,precision,recall,and F1-score are used to estimate the proposed framework.The experimental results show that the CART surpasses the other algorithms with the highest accuracy values like 0.97,1.00,0.99,0.99,1.00,1.00,and 1.00 for effectively detecting the intrusion activities on the IoT/IIoT infrastructure on most of the employed datasets.In addition,the proposed work accomplishes high performance compared to other recent related works in terms of different security and detection evaluation parameters. 展开更多
关键词 ATTACKS intrusion detection machine learning deep learning industrial IoT TON_IoT dataset
下载PDF
Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment
13
作者 Khaled M.Alalayah Fatma S.Alrayes +5 位作者 Jaber S.Alzahrani Khadija M.Alaidarous Ibrahim M.Alwayle Heba Mohsen Ibrahim Abdulrab Ahmed Mesfer Al Duhayyim 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3121-3139,共19页
With the increased advancements of smart industries,cybersecurity has become a vital growth factor in the success of industrial transformation.The Industrial Internet of Things(IIoT)or Industry 4.0 has revolutionized ... With the increased advancements of smart industries,cybersecurity has become a vital growth factor in the success of industrial transformation.The Industrial Internet of Things(IIoT)or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether.In industry 4.0,powerful IntrusionDetection Systems(IDS)play a significant role in ensuring network security.Though various intrusion detection techniques have been developed so far,it is challenging to protect the intricate data of networks.This is because conventional Machine Learning(ML)approaches are inadequate and insufficient to address the demands of dynamic IIoT networks.Further,the existing Deep Learning(DL)can be employed to identify anonymous intrusions.Therefore,the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection(HGSODLID)model for the IIoT environment.The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format.The HGSO algorithm is employed for Feature Selection(HGSO-FS)to reduce the curse of dimensionality.Moreover,Sparrow Search Optimization(SSO)is utilized with a Graph Convolutional Network(GCN)to classify and identify intrusions in the network.Finally,the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model.The proposed HGSODL-ID model was experimentally validated using a benchmark dataset,and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches. 展开更多
关键词 industrial IoT deep learning network security intrusion detection system attribute selection smart factory
下载PDF
Robust graph‐based localization for industrial Internet of things in the presence of flipping ambiguities
14
作者 Mian Imtiaz ul Haq Ruhul Amin Khalil +3 位作者 Muhannad Almutiry Ahmad Sawalmeh Tanveer Ahmad Nasir Saeed 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第4期1140-1149,共10页
Localisation of machines in harsh Industrial Internet of Things(IIoT)environment is necessary for various applications.Therefore,a novel localisation algorithm is proposed for noisy range measurements in IIoT networks... Localisation of machines in harsh Industrial Internet of Things(IIoT)environment is necessary for various applications.Therefore,a novel localisation algorithm is proposed for noisy range measurements in IIoT networks.The position of an unknown machine device in the network is estimated using the relative distances between blind machines(BMs)and anchor machines(AMs).Moreover,a more practical and challenging scenario with the erroneous position of AM is considered,which brings additional uncertainty to the final position estimation.Therefore,the AMs selection algorithm for the localisation of BMs in the IIoT network is introduced.Only those AMs will participate in the localisation process,which increases the accuracy of the final location estimate.Then,the closed‐form expression of the proposed greedy successive anchorization process is derived,which prevents possible local convergence,reduces computation,and achieves Cramér‐Rao lower bound accuracy for white Gaussian measurement noise.The results are compared with the state‐of‐the‐art and verified through numerous simulations. 展开更多
关键词 Cramér‐Rao lower bound greedy successive anchorization industrial internet of things LOCALIZATION
下载PDF
A New Model for Network Security Situation Assessment of the Industrial Internet
15
作者 Ming Cheng Shiming Li +3 位作者 Yuhe Wang Guohui Zhou Peng Han Yan Zhao 《Computers, Materials & Continua》 SCIE EI 2023年第5期2527-2555,共29页
To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First... To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First,this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge.Second,the evaluation indicators are fused with expert knowledge and the ER algorithm.According to the fusion results,a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established,and the projection covariance matrix adaptive evolution strategy(P-CMA-ES)is used to optimize the model parameters.This method can not only utilize semiquantitative information effectively but also use more uncertain information and prevent the problem of combinatorial explosion.Moreover,it solves the problem of the uncertainty of expert knowledge and overcomes the problem of low modeling accuracy caused by insufficient data.Finally,a network security situation assessment case of the Industrial Internet is analyzed to verify the effectiveness and superiority of the method.The research results showthat this method has strong applicability to the network security situation assessment of complex Industrial Internet systems.It can accurately reflect the actual network security situation of Industrial Internet systems and provide safe and reliable suggestions for network administrators to take timely countermeasures,thereby improving the risk monitoring and emergency response capabilities of the Industrial Internet. 展开更多
关键词 industrial internet network security situation assessment evidential reasoning belief rule base projection covariance matrix adaptive evolution strategy
下载PDF
Intelligent Intrusion Detection for Industrial Internet of Things Using Clustering Techniques
16
作者 Noura Alenezi Ahamed Aljuhani 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2899-2915,共17页
The rapid growth of the Internet of Things(IoT)in the industrial sector has given rise to a new term:the Industrial Internet of Things(IIoT).The IIoT is a collection of devices,apps,and services that connect physical ... The rapid growth of the Internet of Things(IoT)in the industrial sector has given rise to a new term:the Industrial Internet of Things(IIoT).The IIoT is a collection of devices,apps,and services that connect physical and virtual worlds to create smart,cost-effective,and scalable systems.Although the IIoT has been implemented and incorporated into a wide range of industrial control systems,maintaining its security and privacy remains a significant concern.In the IIoT contexts,an intrusion detection system(IDS)can be an effective security solution for ensuring data confidentiality,integrity,and availability.In this paper,we propose an intelligent intrusion detection technique that uses principal components analysis(PCA)as a feature engineering method to choose the most significant features,minimize data dimensionality,and enhance detection performance.In the classification phase,we use clustering algorithms such as K-medoids and K-means to determine whether a given flow of IIoT traffic is normal or attack for binary classification and identify the group of cyberattacks according to its specific type for multi-class classification.To validate the effectiveness and robustness of our proposed model,we validate the detection method on a new driven IIoT dataset called X-IIoTID.The performance results showed our proposed detection model obtained a higher accuracy rate of 99.79%and reduced error rate of 0.21%when compared to existing techniques. 展开更多
关键词 Anomaly detection anomaly-based IDS industrial internet of things(IIoT) internet of things
下载PDF
Edge Cloud Selection in Mobile Edge Computing(MEC)-Aided Applications for Industrial Internet of Things(IIoT)Services
17
作者 Dae-Young Kim SoYeon Lee +1 位作者 MinSeung Kim Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2049-2060,共12页
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im... In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method. 展开更多
关键词 industrial Internet of Things(IIoT)network IIoT service mobile edge computing(MEC) edge cloud selection MEC-aided application
下载PDF
Hybrid Power Bank Deployment Model for Energy Supply Coverage Optimization in Industrial Wireless Sensor Network
18
作者 Hang Yang Xunbo Li Witold Pedrycz 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1531-1551,共21页
Energy supply is one of the most critical challenges of wireless sensor networks(WSNs)and industrial wireless sensor networks(IWSNs).While research on coverage optimization problem(COP)centers on the network’s monito... Energy supply is one of the most critical challenges of wireless sensor networks(WSNs)and industrial wireless sensor networks(IWSNs).While research on coverage optimization problem(COP)centers on the network’s monitoring coverage,this research focuses on the power banks’energy supply coverage.The study of 2-D and 3-D spaces is typical in IWSN,with the realistic environment being more complex with obstacles(i.e.,machines).A 3-D surface is the field of interest(FOI)in this work with the established hybrid power bank deployment model for the energy supply COP optimization of IWSN.The hybrid power bank deployment model is highly adaptive and flexible for new or existing plants already using the IWSN system.The model improves the power supply to a more considerable extent with the least number of power bank deployments.The main innovation in this work is the utilization of a more practical surface model with obstacles and training while improving the convergence speed and quality of the heuristic algorithm.An overall probabilistic coverage rate analysis of every point on the FOI is provided,not limiting the scope to target points or areas.Bresenham’s algorithm is extended from 2-D to 3-D surface to enhance the probabilistic covering model for coverage measurement.A dynamic search strategy(DSS)is proposed to modify the artificial bee colony(ABC)and balance the exploration and exploitation ability for better convergence toward eliminating NP-hard deployment problems.Further,the cellular automata(CA)is utilized to enhance the convergence speed.The case study based on two typical FOI in the IWSN shows that the CA scheme effectively speeds up the optimization process.Comparative experiments are conducted on four benchmark functions to validate the effectiveness of the proposed method.The experimental results show that the proposed algorithm outperforms the ABC and gbest-guided ABC(GABC)algorithms.The results show that the proposed energy coverage optimization method based on the hybrid power bank deployment model generates more accurate results than the results obtained by similar algorithms(i.e.,ABC,GABC).The proposed model is,therefore,effective and efficient for optimization in the IWSN. 展开更多
关键词 industrial wireless sensor network hybrid power bank deployment model:energy supply coverage optimization artificial bee colony algorithm radio frequency numerical function optimization
下载PDF
Can Industrial Structure Upgrading Restrain Industrial Land Expansion?Evidence from China
19
作者 CHEN Wei LI Qiao +1 位作者 ZHANG Sun ZHOU Xue 《Chinese Geographical Science》 SCIE CSCD 2024年第3期504-518,共15页
China has made great achievements in industrial development and is transforming into a powerful manufacturing country.Meanwhile,the industrial land scale is also expanding.However,whether industrial structure upgradin... China has made great achievements in industrial development and is transforming into a powerful manufacturing country.Meanwhile,the industrial land scale is also expanding.However,whether industrial structure upgrading achieves the purpose of restraining industrial land expansion remains unanswered.By calculating the industrial land structure index(ILSI)and industrial land expansion scale(ILES),this study analyzed their temporal and spatial distribution characteristics at both regional and city levels from 2007to 2020 in China.Results show that industrial land expansion presents a different trend in the four regions,the ILES in the eastern region is the largest,and the speed of industrial land expansion has declined since 2013,but it has gradually increased since 2016.The ILSI of the eastern and central regions is higher than that of the western and northeastern regions.Furthermore,a spatial Durbin model(SDM)has been established to estimate the spatial effect of industrial structure upgrading on industrial land expansion from 2007 to2020.Notably,industrial structure upgrading has not slowed industrial land expansion.The eastern and western regions require a greater amount of industrial land while upgrading the industrial structure.The improvement of the infrastructure level and international trade level has promoted industrial land expansion. 展开更多
关键词 industrial development industrial structure upgrading industrial land expansion regional differences China
下载PDF
How can technology and efficiency alleviate the dilemma of economic growth and carbon emissions in China's industrial economy? A metafrontier decoupling decomposition analysis
20
作者 Miao Wang Chao Feng 《Petroleum Science》 SCIE EI CAS CSCD 2024年第2期1415-1428,共14页
This paper attempts to explore the decoupling relationship and its drivers between industrial economic increase and energy-related CO_(2) emissions(ICE). Firstly, the decoupling relationship was evaluated by Tapio ind... This paper attempts to explore the decoupling relationship and its drivers between industrial economic increase and energy-related CO_(2) emissions(ICE). Firstly, the decoupling relationship was evaluated by Tapio index. Then, based on the DEA meta-frontier theory framework which taking into account the regional and industrial heterogeneity and index decomposition method, the driving factors of decoupling process were explored mainly from the view of technology and efficiency. The results show that during2000-2019, weak decoupling was the primary state. Investment scale expansion was the largest reason hindering decoupling process of industrial increase from ICE. Both energy saving and production technology achieved significant progress, which facilitated the decoupling process. Simultaneously, the energy technology gap and production technology gap among regions have been narrowed, and played a role in promoting decoupling process. On the contrary, both scale economy efficiency and pure technical efficiency have inhibiting effects on decoupling process. The former indicates that the scale economy of China's industry was not conducive to improve energy efficiency and production efficiency, while the latter indicates that resource misallocation problem may exist in both energy market and product market. 展开更多
关键词 China's industrial sector Decoupling process Meta-frontier DEA Index decomposition method Driving factors
下载PDF
上一页 1 2 234 下一页 到第
使用帮助 返回顶部