As attack techniques evolve and data volumes increase,the integration of artificial intelligence-based security solutions into industrial control systems has become increasingly essential.Artificial intelligence holds...As attack techniques evolve and data volumes increase,the integration of artificial intelligence-based security solutions into industrial control systems has become increasingly essential.Artificial intelligence holds significant potential to improve the operational efficiency and cybersecurity of these systems.However,its dependence on cyber-based infrastructures expands the attack surface and introduces the risk that adversarial manipulations of artificial intelligence models may cause physical harm.To address these concerns,this study presents a comprehensive review of artificial intelligence-driven threat detection methods and adversarial attacks targeting artificial intelligence within industrial control environments,examining both their benefits and associated risks.A systematic literature review was conducted across major scientific databases,including IEEE,Elsevier,Springer Nature,ACM,MDPI,and Wiley,covering peer-reviewed journal and conference papers published between 2017 and 2026.Studies were selected based on predefined inclusion and exclusion criteria following a structured screening process.Based on an analysis of 101 selected studies,this survey categorizes artificial intelligence-based threat detection approaches across the physical,control,and application layers of industrial control systems and examines poisoning,evasion,and extraction attacks targeting industrial artificial intelligence.The findings identify key research trends,highlight unresolved security challenges,and discuss implications for the secure deployment of artificial intelligence-enabled cybersecurity solutions in industrial control systems.展开更多
Industrial operators need reliable communication in high-noise,safety-critical environments where speech or touch input is often impractical.Existing gesture systems either miss real-time deadlines on resourceconstrai...Industrial operators need reliable communication in high-noise,safety-critical environments where speech or touch input is often impractical.Existing gesture systems either miss real-time deadlines on resourceconstrained hardware or lose accuracy under occlusion,vibration,and lighting changes.We introduce Industrial EdgeSign,a dual-path framework that combines hardware-aware neural architecture search(NAS)with large multimodalmodel(LMM)guided semantics to deliver robust,low-latency gesture recognition on edge devices.The searched model uses a truncated ResNet50 front end,a dimensional-reduction network that preserves spatiotemporal structure for tubelet-based attention,and localized Transformer layers tuned for on-device inference.To reduce reliance on gloss annotations and mitigate domain shift,we distill semantics from factory-tuned vision-language models and pre-train with masked language modeling and video-text contrastive objectives,aligning visual features with a shared text space.OnML2HP and SHREC’17,theNAS-derived architecture attains 94.7% accuracywith 86ms inference latency and about 5.9W power on Jetson Nano.Under occlusion,lighting shifts,andmotion blur,accuracy remains above 82%.For safetycritical commands,the emergency-stop gesture achieves 72 ms 99th percentile latency with 99.7% fail-safe triggering.Ablation studies confirm the contribution of the spatiotemporal tubelet extractor and text-side pre-training,and we observe gains in translation quality(BLEU-422.33).These results show that Industrial EdgeSign provides accurate,resource-aware,and safety-aligned gesture recognition suitable for deployment in smart factory settings.展开更多
TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,th...TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping,data tampering,and device impersonation.While digital signatures are indispensable for ensuring authenticity and non-repudiation,conventional schemes such as RSA and ECCare vulnerable to quantumalgorithms,jeopardizing long-termtrust in IIoT deployments.This study proposes a lightweight,stateless,hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT.The design introduces two key optimizations:(1)Forest ofRandomSubsets(FORS)onDemand,where subset secret keys are generated dynamically via a PseudoRandom Function(PRF),thereby minimizing storage overhead and eliminating key-reuse risks;and(2)Winternitz One-Time Signature Plus(WOTS+)partial hash-chain caching,which precomputes intermediate hash values at edge gateways,reducing device-side computations,latency,and energy consumption.The architecture integrates a multi-layerMerkle authentication tree(Merkle tree)and role-based delegation across sensors,gateways,and a Signature Authority Center(SAC),supporting scalable cross-site deployment and key rotation.Froma theoretical perspective,we establish a formal(Existential Unforgeability under Chosen Message Attack)EUF-CMA security proof using a game-based reduction framework.The proof demonstrates that any successful forgerymust reduce to breaking the underlying assumptions of PRF indistinguishability,(second)preimage resistance,or collision resistance,thus quantifying adversarial advantage and ensuring unforgeability.On the implementation side,our design achieves a balanced trade-off between postquantum security and lightweight performance,offering concrete deployment guidelines for real-time industrial systems.In summary,the proposed method contributes both practical system design and formal security guarantees,providing IIoT with a deployable signature substrate that enhances resilience against quantum-era threats and supports future extensions such as device attestation,group signatures,and anomaly detection.展开更多
With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To...With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To solve this problem,a new security model called Zero Trust(ZT)is desired,which believes in“never trust and always verify”.Every time the asset in the industrial network is accessed,the subject is authenticated and its trustworthiness is assessed.In this way,the asset in industrial network can be well protected,whether the subject is in the internal network or the external network.However,in order to construct the zero trust model in the 5G Industrial Internet collaboration system,there are still many problems to be solved.In this paper,we first introduce the security issues in the 5G Industrial Internet collaboration system,and illustrate the zero trust architecture.Then,we analyze the gap between existing security techniques and the zero trust architecture.Finally,we discuss several potential security techniques that can be used to implement the zero trust model.The purpose of this paper is to point out the further direction for the realization of the Zero Trust Architecture(ZTA)in the 5G Industrial Internet collaboration system.展开更多
COVID-19 pandemic has accelerated the re-shaping of globalized manufacturing industry.Achieving a high level of resilience is thereby a recognized,essential ability of future manufacturing systems with the advances in...COVID-19 pandemic has accelerated the re-shaping of globalized manufacturing industry.Achieving a high level of resilience is thereby a recognized,essential ability of future manufacturing systems with the advances in smart manufacturing and Industry 4.0.In this work,a conceptual framework for resilient manufacturing strategy enabled by Industrial Internet is proposed.It is elaborated as a four-phase,closed-loop process that centered on proactive industry assessment.Key enabling technologies for the proposed framework are outlined in data acquisition and management,big data analysis,intelligent services,and others.Industrial Internet-enabled implementations in China in response to COVID-19 have then been reviewed and discussed from 3Rs’perspective,i.e.manufacturer capacity Recovery,supply chain Resilience and emergency Response.It is suggested that an industry-specific and comprehensive selection coordinated with the guiding policy and supporting regulations should be performed at the national,at least regional level.展开更多
In order to solve the problems of poor informationflow,low energy utilization rate and energy consumption data reuse in the heavy equipment industrial park,the Internet of Things(IoT)technology is applied to construct...In order to solve the problems of poor informationflow,low energy utilization rate and energy consumption data reuse in the heavy equipment industrial park,the Internet of Things(IoT)technology is applied to construct the intelligent energy management and control system(IEMCS).The application architecture and function module planning are analyzed and designed.Furthermore,the IEMCS scheme is not unique due to the fuzziness of customer demand and the understanding deviation of designer to customer demand in the design stage.Scheme assessment is of great significance for the normal subsequent implementation of the system.A fuzzy assessment method for IEMCS scheme alternatives is proposed to achieve scheme selection.Fuzzy group decision using triangular fuzzy number to express the vague assessment of experts is adopted to determine the index value.TOPSIS is modified by replacing Euclidean distance with contact vector distance in IEMCS scheme alternative assessment.An experiment with eight IEMCS scheme alternatives in a heavy equipment industrial park is given for the validation.The experiment result shows that eight IEMCS scheme alternatives can be assessed.Through the comparisons with other methods,the reliability of the results obtained by the proposed method is discussed.展开更多
With the rapid development of the industrial Internet,the network security environment has become increasingly complex and variable.Intrusion detection,a core technology for ensuring the security of industrial control...With the rapid development of the industrial Internet,the network security environment has become increasingly complex and variable.Intrusion detection,a core technology for ensuring the security of industrial control systems,faces the challenge of unbalanced data samples,particularly the low detection rates for minority class attack samples.Therefore,this paper proposes a data enhancement method for intrusion detection in the industrial Internet based on a Self-Attention Wasserstein Generative Adversarial Network(SA-WGAN)to address the low detection rates of minority class attack samples in unbalanced intrusion detection scenarios.The proposed method integrates a selfattention mechanism with a Wasserstein Generative Adversarial Network(WGAN).The self-attention mechanism automatically learns important features from the input data and assigns different weights to emphasize the key features related to intrusion behaviors,providing strong guidance for subsequent data generation.The WGAN generates new data samples through adversarial training to expand the original dataset.In the SA-WGAN framework,the WGAN directs the data generation process based on the key features extracted by the self-attention mechanism,ensuring that the generated samples exhibit both diversity and similarity to real data.Experimental results demonstrate that the SA-WGAN-based data enhancement method significantly improves detection performance for attack samples from minority classes,addresses issues of insufficient data and category imbalance,and enhances the generalization ability and overall performance of the intrusion detection model.展开更多
Against the backdrop of the new era,the requirements of society and industries for English talents have gradually increased.As an important institution for cultivating high-quality technical and skilled talents,the En...Against the backdrop of the new era,the requirements of society and industries for English talents have gradually increased.As an important institution for cultivating high-quality technical and skilled talents,the English major in higher vocational colleges not only needs to develop students’basic English skills but also to strengthen their English translation capabilities.In the“Internet+”era,English translation teaching in higher vocational colleges has ushered in a new path of reform.This path can effectively solve problems in higher vocational English translation teaching,such as the single practical training scenario,rigid teaching mode,and insufficient technical tools.It innovates teaching methods and improves the quality of talent cultivation.Based on this,this paper aims to enhance students’practical translation skills and career adaptability,providing references for higher vocational English translation teaching to meet the needs of the“Internet+”era and cultivate compound translation talents.展开更多
Under the current background of an information society,the digital transformation of enterprises has become a necessary means to enhance the competitiveness of enterprises.This article is based on the industrial Inter...Under the current background of an information society,the digital transformation of enterprises has become a necessary means to enhance the competitiveness of enterprises.This article is based on the industrial Internet platform,the digital planning and architecture of enterprises research.First,we analyze the current challenges of digital transformation and the development opportunities brought by the industrial Internet.Then,we propose a digital planning method based on the industrial Internet platform,which takes the full connectivity of people,machine and things and intelligent decision making as the core,takes data collection,processing,analysis and application as the main line,and finally forms the top-level design of the digital transformation of enterprises.At the same time,we also built an industrial Internet platform architecture model,including the previous end perception layer,network transmission layer,platform service layer,and application innovation layer for four levels,to support enterprises in innovative applications and decision support under the industrial Internet environment.Research shows that this kind of enterprise digital planning and architecture based on an industrial Internet platform can effectively promote enterprises to achieve business model innovation,system innovation,and strengthen the flexibility and agility of enterprises to respond to market changes.The results of this research not only have important theoretical and practical significance for guiding enterprises to carry out digital planning and build an industrial Internet platform,but also provide useful reference for relevant policy formulation.展开更多
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,whic...With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,which makes task assignment inefficient due to insufficient workers.In this paper,an Intelligent and Trustworthy task assignment method based on Trust and Social relations(ITTS)is proposed for scenarios with many tasks and few workers.Specifically,ITTS first makes initial assignments based on trust and social influences,thereby transforming the complex large-scale industrial task assignment of the platform into the small-scale task assignment for each worker.Then,an intelligent Q-decision mechanism based on workers'social relation is proposed,which adopts the first-exploration-then-utilization principle to allocate tasks.Only when a worker cannot cope with the assigned tasks,it initiates dynamic worker recruitment,thus effectively solving the worker shortage problem as well as the cold start issue.More importantly,we consider trust and security issues,and evaluate the trust and social circles of workers by accumulating task feedback,to provide the platform a reference for worker recruitment,thereby creating a high-quality worker pool.Finally,extensive simulations demonstrate ITTS outperforms two benchmark methods by increasing task completion rates by 56.49%-61.53%and profit by 42.34%-47.19%.展开更多
Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission fo...Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission for cases with large-scale and mobile devices. However, wireless communication gives rise to critical issues related to physical security, such as malicious detections and attacks [1].展开更多
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial environments.Several IIoT nodes operate confidential data(s...Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial environments.Several IIoT nodes operate confidential data(such as medical,transportation,military,etc.)which are reachable targets for hostile intruders due to their openness and varied structure.Intrusion Detection Systems(IDS)based on Machine Learning(ML)and Deep Learning(DL)techniques have got significant attention.However,existing ML and DL-based IDS still face a number of obstacles that must be overcome.For instance,the existing DL approaches necessitate a substantial quantity of data for effective performance,which is not feasible to run on low-power and low-memory devices.Imbalanced and fewer data potentially lead to low performance on existing IDS.This paper proposes a self-attention convolutional neural network(SACNN)architecture for the detection of malicious activity in IIoT networks and an appropriate feature extraction method to extract the most significant features.The proposed architecture has a self-attention layer to calculate the input attention and convolutional neural network(CNN)layers to process the assigned attention features for prediction.The performance evaluation of the proposed SACNN architecture has been done with the Edge-IIoTset and X-IIoTID datasets.These datasets encompassed the behaviours of contemporary IIoT communication protocols,the operations of state-of-the-art devices,various attack types,and diverse attack scenarios.展开更多
The rapid development of the Internet of Things(IoT)in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the...The rapid development of the Internet of Things(IoT)in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the physical and virtual space in order to provide smart,cost-effective,and scalable systems.Although the IIoT has been deployed and integrated into a wide range of industrial control systems,preserving security and privacy of such a technology remains a big challenge.An anomaly-based Intrusion Detection System(IDS)can be an effective security solution for maintaining the confidentiality,integrity,and availability of data transmitted in IIoT environments.In this paper,we propose an intelligent anomalybased IDS framework in the context of fog-to-things communications to decentralize the cloud-based security solution into a distributed architecture(fog nodes)near the edge of the data source.The anomaly detection system utilizes minimum redundancy maximum relevance and principal component analysis as the featured engineering methods to select the most important features,reduce the data dimensionality,and improve detection performance.In the classification stage,anomaly-based ensemble learning techniques such as bagging,LPBoost,RUSBoost,and Adaboost models are implemented to determine whether a given flow of traffic is normal or malicious.To validate the effectiveness and robustness of our proposed model,we evaluate our anomaly detection approach on a new driven IIoT dataset called XIIoTID,which includes new IIoT protocols,various cyberattack scenarios,and different attack protocols.The experimental results demonstrated that our proposed anomaly detection method achieved a higher accuracy rate of 99.91%and a reduced false alarm rate of 0.1%compared to other recently proposed techniques.展开更多
The Internet of Things(IoT)is where almost anything can be controlled and managed remotely by means of sensors.Although the IoT evolution led to quality of life enhancement,many of its devices are insecure.The lack of...The Internet of Things(IoT)is where almost anything can be controlled and managed remotely by means of sensors.Although the IoT evolution led to quality of life enhancement,many of its devices are insecure.The lack of robust key management systems,efficient identity authentication,low fault tolerance,and many other issues lead to IoT devices being easily targeted by attackers.In this paper we propose a new authentication protocol called Authenblue that improve the authentication process of IoT devices and Coordinators of Personal Area Network(CPANs)in an Industrial IoT(IIoT)environment.This study proposed Authenblue protocol as a new Blockchainbased authentication protocol.To enhance the authentication process and make it more secure,Authenblue modified the way of generating IIoT identifiers and the shared secret keys used by the IIoT devices to raise the efficiency of the authentication protocol.Authenblue enhance the authentication protocol that other models rely on by enhancing the approach used to generate the User Identifier(UI).The UI values changed from being static values,sensors MAC addresses,to be generated values in the inception phase.This approach makes the process of renewing the sensor keys more secure by renewing their UI values instead of changing the secret key.In this study,Authenblue has been simulated in the Network Simulator 3(NS3).Simulation results show an improved performance compared to the related work.展开更多
Green and low-carbon is a new development model that seeks balance between environmental sustainability and high economic growth.If explainable and available carbon emission data can be accurately obtained,it will hel...Green and low-carbon is a new development model that seeks balance between environmental sustainability and high economic growth.If explainable and available carbon emission data can be accurately obtained,it will help policy regulators and enterprise managers to more accurately implement this development strategy.A lot of research has been carried out,but it is still a difficult problem that how to accommodate and adapt the complex carbon emission data computing models and factor libraries developed by different regions,different industries and different enterprises.Meanwhile,with the rapid development of the Industrial Internet,it has not only been used for the supply chain optimization and intelligent scheduling of the manufacturing industry,but also been used by more and more industries as an important way of digital transformation.Especially in China,the Industrial Internet identification and resolution system is becoming an important digital infrastructure to uniquely identify objects and share data.Hence,a compatible carbon efficiency information service framework based on the Industrial Internet Identification is proposed in this paper to address the problem of computing and querying multi-source heterogeneous carbon emission data.We have defined a multi cooperation carbon emission data interaction model consisting of three roles and three basic operations.Further,the implementation of the framework includes carbon emission data identification,modeling,calculation,query and sharing.The practice results show that its capability and effectiveness in improving the responsiveness,accuracy,and credibility of compatible carbon efficiency data query and sharing services.展开更多
With the proportion of intelligent services in the industrial internet of things(IIoT)rising rapidly,its data dependency and decomposability increase the difficulty of scheduling computing resources.In this paper,we p...With the proportion of intelligent services in the industrial internet of things(IIoT)rising rapidly,its data dependency and decomposability increase the difficulty of scheduling computing resources.In this paper,we propose an intelligent service computing framework.In the framework,we take the long-term rewards of its important participants,edge service providers,as the optimization goal,which is related to service delay and computing cost.Considering the different update frequencies of data deployment and service offloading,double-timescale reinforcement learning is utilized in the framework.In the small-scale strategy,the frequent concurrency of services and the difference in service time lead to the fuzzy relationship between reward and action.To solve the fuzzy reward problem,a reward mapping-based reinforcement learning(RMRL)algorithm is proposed,which enables the agent to learn the relationship between reward and action more clearly.The large time scale strategy adopts the improved Monte Carlo tree search(MCTS)algorithm to improve the learning speed.The simulation results show that the strategy is superior to popular reinforcement learning algorithms such as double Q-learning(DDQN)and dueling Q-learning(dueling-DQN)in learning speed,and the reward is also increased by 14%.展开更多
With the development and widespread use of blockchain in recent years,many projects have introduced blockchain technology to solve the growing security issues of the Industrial Internet of Things(IIoT).However,due to ...With the development and widespread use of blockchain in recent years,many projects have introduced blockchain technology to solve the growing security issues of the Industrial Internet of Things(IIoT).However,due to the conflict between the operational performance and security of the blockchain system and the compatibility issues with a large number of IIoT devices running together,the mainstream blockchain system cannot be applied to IIoT scenarios.In order to solve these problems,this paper proposes SBFT(Speculative Byzantine Consensus Protocol),a flexible and scalable blockchain consensus mechanism for the Industrial Internet of Things.SBFT has a consensus process based on speculation,improving the throughput and consensus speed of blockchain systems and reducing communication overhead.In order to improve the compatibility and scalability of the blockchain system,we select some nodes to participate in the consensus,and these nodes have better performance in the network.Since multiple properties determine node performance,we abstract the node selection problem as a joint optimization problem and use Dueling Deep Q Learning(DQL)to solve it.Finally,we evaluate the performance of the scheme through simulation,and the simulation results prove the superiority of our scheme.展开更多
Identifier resolution system in the automotive industrial Internet is necessary for building a fully interconnected infrastructure with people,machines,factories,products and clients.The resolution system can not only...Identifier resolution system in the automotive industrial Internet is necessary for building a fully interconnected infrastructure with people,machines,factories,products and clients.The resolution system can not only ensure the comprehensive interconnection and efficiency of research and development,procurement,production,sales,and after-sales service in automotive industry,but also promote the integration of automotive industrial data,which facilitates the integrated development of traditional automotive manufacturing and the industrial Internet.This paper focuses on processes and methods of building identifier resolution system for the automotive industry and summarizes the construction and development of secondary node in the automotive industrial Internet in order to explore a suitable road to a rich and completed application ecosystem.展开更多
The intersection of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)has garnered ever-increasing attention and research interest.Nevertheless,the dilemma between the strict resource-constrained n...The intersection of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)has garnered ever-increasing attention and research interest.Nevertheless,the dilemma between the strict resource-constrained nature of IIoT devices and the extensive resource demands of AI has not yet been fully addressed with a comprehensive solution.Taking advantage of the lightweight constructive neural network(LightGCNet)in developing fast learner models for IIoT,a convex geometric constructive neural network with a low-complexity control strategy,namely,ConGCNet,is proposed in this article via convex optimization and matrix theory,which enhances the convergence rate and reduces the computational consumption in comparison with LightGCNet.Firstly,a low-complexity control strategy is proposed to reduce the computational consumption during the hidden parameters training process.Secondly,a novel output weights evaluated method based on convex optimization is proposed to guarantee the convergence rate.Finally,the universal approximation property of ConGCNet is proved by the low-complexity control strategy and convex output weights evaluated method.Simulation results,including four benchmark datasets and the real-world ore grinding process,demonstrate that ConGCNet effectively reduces computational consumption in the modelling process and improves the model’s convergence rate.展开更多
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im...In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.展开更多
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(RS-2023-00242528,50%)supported by the Korea Internet&Security Agency(KISA)through the Information Security Specialized University Support Project(50%).
文摘As attack techniques evolve and data volumes increase,the integration of artificial intelligence-based security solutions into industrial control systems has become increasingly essential.Artificial intelligence holds significant potential to improve the operational efficiency and cybersecurity of these systems.However,its dependence on cyber-based infrastructures expands the attack surface and introduces the risk that adversarial manipulations of artificial intelligence models may cause physical harm.To address these concerns,this study presents a comprehensive review of artificial intelligence-driven threat detection methods and adversarial attacks targeting artificial intelligence within industrial control environments,examining both their benefits and associated risks.A systematic literature review was conducted across major scientific databases,including IEEE,Elsevier,Springer Nature,ACM,MDPI,and Wiley,covering peer-reviewed journal and conference papers published between 2017 and 2026.Studies were selected based on predefined inclusion and exclusion criteria following a structured screening process.Based on an analysis of 101 selected studies,this survey categorizes artificial intelligence-based threat detection approaches across the physical,control,and application layers of industrial control systems and examines poisoning,evasion,and extraction attacks targeting industrial artificial intelligence.The findings identify key research trends,highlight unresolved security challenges,and discuss implications for the secure deployment of artificial intelligence-enabled cybersecurity solutions in industrial control systems.
文摘Industrial operators need reliable communication in high-noise,safety-critical environments where speech or touch input is often impractical.Existing gesture systems either miss real-time deadlines on resourceconstrained hardware or lose accuracy under occlusion,vibration,and lighting changes.We introduce Industrial EdgeSign,a dual-path framework that combines hardware-aware neural architecture search(NAS)with large multimodalmodel(LMM)guided semantics to deliver robust,low-latency gesture recognition on edge devices.The searched model uses a truncated ResNet50 front end,a dimensional-reduction network that preserves spatiotemporal structure for tubelet-based attention,and localized Transformer layers tuned for on-device inference.To reduce reliance on gloss annotations and mitigate domain shift,we distill semantics from factory-tuned vision-language models and pre-train with masked language modeling and video-text contrastive objectives,aligning visual features with a shared text space.OnML2HP and SHREC’17,theNAS-derived architecture attains 94.7% accuracywith 86ms inference latency and about 5.9W power on Jetson Nano.Under occlusion,lighting shifts,andmotion blur,accuracy remains above 82%.For safetycritical commands,the emergency-stop gesture achieves 72 ms 99th percentile latency with 99.7% fail-safe triggering.Ablation studies confirm the contribution of the spatiotemporal tubelet extractor and text-side pre-training,and we observe gains in translation quality(BLEU-422.33).These results show that Industrial EdgeSign provides accurate,resource-aware,and safety-aligned gesture recognition suitable for deployment in smart factory settings.
文摘TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping,data tampering,and device impersonation.While digital signatures are indispensable for ensuring authenticity and non-repudiation,conventional schemes such as RSA and ECCare vulnerable to quantumalgorithms,jeopardizing long-termtrust in IIoT deployments.This study proposes a lightweight,stateless,hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT.The design introduces two key optimizations:(1)Forest ofRandomSubsets(FORS)onDemand,where subset secret keys are generated dynamically via a PseudoRandom Function(PRF),thereby minimizing storage overhead and eliminating key-reuse risks;and(2)Winternitz One-Time Signature Plus(WOTS+)partial hash-chain caching,which precomputes intermediate hash values at edge gateways,reducing device-side computations,latency,and energy consumption.The architecture integrates a multi-layerMerkle authentication tree(Merkle tree)and role-based delegation across sensors,gateways,and a Signature Authority Center(SAC),supporting scalable cross-site deployment and key rotation.Froma theoretical perspective,we establish a formal(Existential Unforgeability under Chosen Message Attack)EUF-CMA security proof using a game-based reduction framework.The proof demonstrates that any successful forgerymust reduce to breaking the underlying assumptions of PRF indistinguishability,(second)preimage resistance,or collision resistance,thus quantifying adversarial advantage and ensuring unforgeability.On the implementation side,our design achieves a balanced trade-off between postquantum security and lightweight performance,offering concrete deployment guidelines for real-time industrial systems.In summary,the proposed method contributes both practical system design and formal security guarantees,providing IIoT with a deployable signature substrate that enhances resilience against quantum-era threats and supports future extensions such as device attestation,group signatures,and anomaly detection.
基金supported by the National Natural Science Foundation of China(U22B2026)the ZTE Industry-Academia-Research Project(HC-CN-20221029003,IA20230628015)。
文摘With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To solve this problem,a new security model called Zero Trust(ZT)is desired,which believes in“never trust and always verify”.Every time the asset in the industrial network is accessed,the subject is authenticated and its trustworthiness is assessed.In this way,the asset in industrial network can be well protected,whether the subject is in the internal network or the external network.However,in order to construct the zero trust model in the 5G Industrial Internet collaboration system,there are still many problems to be solved.In this paper,we first introduce the security issues in the 5G Industrial Internet collaboration system,and illustrate the zero trust architecture.Then,we analyze the gap between existing security techniques and the zero trust architecture.Finally,we discuss several potential security techniques that can be used to implement the zero trust model.The purpose of this paper is to point out the further direction for the realization of the Zero Trust Architecture(ZTA)in the 5G Industrial Internet collaboration system.
基金Supported by Natural Science Foundation of Zhejiang Province(Grant No.LY19E050019).
文摘COVID-19 pandemic has accelerated the re-shaping of globalized manufacturing industry.Achieving a high level of resilience is thereby a recognized,essential ability of future manufacturing systems with the advances in smart manufacturing and Industry 4.0.In this work,a conceptual framework for resilient manufacturing strategy enabled by Industrial Internet is proposed.It is elaborated as a four-phase,closed-loop process that centered on proactive industry assessment.Key enabling technologies for the proposed framework are outlined in data acquisition and management,big data analysis,intelligent services,and others.Industrial Internet-enabled implementations in China in response to COVID-19 have then been reviewed and discussed from 3Rs’perspective,i.e.manufacturer capacity Recovery,supply chain Resilience and emergency Response.It is suggested that an industry-specific and comprehensive selection coordinated with the guiding policy and supporting regulations should be performed at the national,at least regional level.
文摘In order to solve the problems of poor informationflow,low energy utilization rate and energy consumption data reuse in the heavy equipment industrial park,the Internet of Things(IoT)technology is applied to construct the intelligent energy management and control system(IEMCS).The application architecture and function module planning are analyzed and designed.Furthermore,the IEMCS scheme is not unique due to the fuzziness of customer demand and the understanding deviation of designer to customer demand in the design stage.Scheme assessment is of great significance for the normal subsequent implementation of the system.A fuzzy assessment method for IEMCS scheme alternatives is proposed to achieve scheme selection.Fuzzy group decision using triangular fuzzy number to express the vague assessment of experts is adopted to determine the index value.TOPSIS is modified by replacing Euclidean distance with contact vector distance in IEMCS scheme alternative assessment.An experiment with eight IEMCS scheme alternatives in a heavy equipment industrial park is given for the validation.The experiment result shows that eight IEMCS scheme alternatives can be assessed.Through the comparisons with other methods,the reliability of the results obtained by the proposed method is discussed.
基金supported by the National Natural Science Foundation of China(62473341)Key Technologies R&D Program of Henan Province(242102211071,252102211086,252102210166).
文摘With the rapid development of the industrial Internet,the network security environment has become increasingly complex and variable.Intrusion detection,a core technology for ensuring the security of industrial control systems,faces the challenge of unbalanced data samples,particularly the low detection rates for minority class attack samples.Therefore,this paper proposes a data enhancement method for intrusion detection in the industrial Internet based on a Self-Attention Wasserstein Generative Adversarial Network(SA-WGAN)to address the low detection rates of minority class attack samples in unbalanced intrusion detection scenarios.The proposed method integrates a selfattention mechanism with a Wasserstein Generative Adversarial Network(WGAN).The self-attention mechanism automatically learns important features from the input data and assigns different weights to emphasize the key features related to intrusion behaviors,providing strong guidance for subsequent data generation.The WGAN generates new data samples through adversarial training to expand the original dataset.In the SA-WGAN framework,the WGAN directs the data generation process based on the key features extracted by the self-attention mechanism,ensuring that the generated samples exhibit both diversity and similarity to real data.Experimental results demonstrate that the SA-WGAN-based data enhancement method significantly improves detection performance for attack samples from minority classes,addresses issues of insufficient data and category imbalance,and enhances the generalization ability and overall performance of the intrusion detection model.
基金Analysis of the Reform Trend and Innovative Strategy of English Translation Teaching in Higher Vocational Colleges under the Background of"Internet+"(XJQG2025138)。
文摘Against the backdrop of the new era,the requirements of society and industries for English talents have gradually increased.As an important institution for cultivating high-quality technical and skilled talents,the English major in higher vocational colleges not only needs to develop students’basic English skills but also to strengthen their English translation capabilities.In the“Internet+”era,English translation teaching in higher vocational colleges has ushered in a new path of reform.This path can effectively solve problems in higher vocational English translation teaching,such as the single practical training scenario,rigid teaching mode,and insufficient technical tools.It innovates teaching methods and improves the quality of talent cultivation.Based on this,this paper aims to enhance students’practical translation skills and career adaptability,providing references for higher vocational English translation teaching to meet the needs of the“Internet+”era and cultivate compound translation talents.
文摘Under the current background of an information society,the digital transformation of enterprises has become a necessary means to enhance the competitiveness of enterprises.This article is based on the industrial Internet platform,the digital planning and architecture of enterprises research.First,we analyze the current challenges of digital transformation and the development opportunities brought by the industrial Internet.Then,we propose a digital planning method based on the industrial Internet platform,which takes the full connectivity of people,machine and things and intelligent decision making as the core,takes data collection,processing,analysis and application as the main line,and finally forms the top-level design of the digital transformation of enterprises.At the same time,we also built an industrial Internet platform architecture model,including the previous end perception layer,network transmission layer,platform service layer,and application innovation layer for four levels,to support enterprises in innovative applications and decision support under the industrial Internet environment.Research shows that this kind of enterprise digital planning and architecture based on an industrial Internet platform can effectively promote enterprises to achieve business model innovation,system innovation,and strengthen the flexibility and agility of enterprises to respond to market changes.The results of this research not only have important theoretical and practical significance for guiding enterprises to carry out digital planning and build an industrial Internet platform,but also provide useful reference for relevant policy formulation.
基金supported by the National Natural Science Foundation of China under Grant No.62072475 and No.62302062in part by the Hunan Provincial Natural Science Foundation of China under Grant Number 2023JJ40081。
文摘With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,which makes task assignment inefficient due to insufficient workers.In this paper,an Intelligent and Trustworthy task assignment method based on Trust and Social relations(ITTS)is proposed for scenarios with many tasks and few workers.Specifically,ITTS first makes initial assignments based on trust and social influences,thereby transforming the complex large-scale industrial task assignment of the platform into the small-scale task assignment for each worker.Then,an intelligent Q-decision mechanism based on workers'social relation is proposed,which adopts the first-exploration-then-utilization principle to allocate tasks.Only when a worker cannot cope with the assigned tasks,it initiates dynamic worker recruitment,thus effectively solving the worker shortage problem as well as the cold start issue.More importantly,we consider trust and security issues,and evaluate the trust and social circles of workers by accumulating task feedback,to provide the platform a reference for worker recruitment,thereby creating a high-quality worker pool.Finally,extensive simulations demonstrate ITTS outperforms two benchmark methods by increasing task completion rates by 56.49%-61.53%and profit by 42.34%-47.19%.
基金partly supported by the National Natural Science Foundation of China(62273298,62273295)Hebei Natural Science Foundation(F2023203063,F2022203025)+1 种基金China Scholarship Council(CSC)(202308130180)Provincial Key Laboratory Performance Subsidy Project(22567612H)
文摘Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission for cases with large-scale and mobile devices. However, wireless communication gives rise to critical issues related to physical security, such as malicious detections and attacks [1].
基金Deputy for Research and Innovation-Ministry of Education,Kingdom of Saudi Arabia,Grant/Award Number:NU/IFC/02/SERC/-/31Institutional Funding Committee at Najran University,Kingdom of Saudi Arabia。
文摘Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial environments.Several IIoT nodes operate confidential data(such as medical,transportation,military,etc.)which are reachable targets for hostile intruders due to their openness and varied structure.Intrusion Detection Systems(IDS)based on Machine Learning(ML)and Deep Learning(DL)techniques have got significant attention.However,existing ML and DL-based IDS still face a number of obstacles that must be overcome.For instance,the existing DL approaches necessitate a substantial quantity of data for effective performance,which is not feasible to run on low-power and low-memory devices.Imbalanced and fewer data potentially lead to low performance on existing IDS.This paper proposes a self-attention convolutional neural network(SACNN)architecture for the detection of malicious activity in IIoT networks and an appropriate feature extraction method to extract the most significant features.The proposed architecture has a self-attention layer to calculate the input attention and convolutional neural network(CNN)layers to process the assigned attention features for prediction.The performance evaluation of the proposed SACNN architecture has been done with the Edge-IIoTset and X-IIoTID datasets.These datasets encompassed the behaviours of contemporary IIoT communication protocols,the operations of state-of-the-art devices,various attack types,and diverse attack scenarios.
文摘The rapid development of the Internet of Things(IoT)in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the physical and virtual space in order to provide smart,cost-effective,and scalable systems.Although the IIoT has been deployed and integrated into a wide range of industrial control systems,preserving security and privacy of such a technology remains a big challenge.An anomaly-based Intrusion Detection System(IDS)can be an effective security solution for maintaining the confidentiality,integrity,and availability of data transmitted in IIoT environments.In this paper,we propose an intelligent anomalybased IDS framework in the context of fog-to-things communications to decentralize the cloud-based security solution into a distributed architecture(fog nodes)near the edge of the data source.The anomaly detection system utilizes minimum redundancy maximum relevance and principal component analysis as the featured engineering methods to select the most important features,reduce the data dimensionality,and improve detection performance.In the classification stage,anomaly-based ensemble learning techniques such as bagging,LPBoost,RUSBoost,and Adaboost models are implemented to determine whether a given flow of traffic is normal or malicious.To validate the effectiveness and robustness of our proposed model,we evaluate our anomaly detection approach on a new driven IIoT dataset called XIIoTID,which includes new IIoT protocols,various cyberattack scenarios,and different attack protocols.The experimental results demonstrated that our proposed anomaly detection method achieved a higher accuracy rate of 99.91%and a reduced false alarm rate of 0.1%compared to other recently proposed techniques.
文摘The Internet of Things(IoT)is where almost anything can be controlled and managed remotely by means of sensors.Although the IoT evolution led to quality of life enhancement,many of its devices are insecure.The lack of robust key management systems,efficient identity authentication,low fault tolerance,and many other issues lead to IoT devices being easily targeted by attackers.In this paper we propose a new authentication protocol called Authenblue that improve the authentication process of IoT devices and Coordinators of Personal Area Network(CPANs)in an Industrial IoT(IIoT)environment.This study proposed Authenblue protocol as a new Blockchainbased authentication protocol.To enhance the authentication process and make it more secure,Authenblue modified the way of generating IIoT identifiers and the shared secret keys used by the IIoT devices to raise the efficiency of the authentication protocol.Authenblue enhance the authentication protocol that other models rely on by enhancing the approach used to generate the User Identifier(UI).The UI values changed from being static values,sensors MAC addresses,to be generated values in the inception phase.This approach makes the process of renewing the sensor keys more secure by renewing their UI values instead of changing the secret key.In this study,Authenblue has been simulated in the Network Simulator 3(NS3).Simulation results show an improved performance compared to the related work.
基金supported by the 2018 Industrial Internet Innovation and Development Project——Industrial Internet Identification Resolution Sys⁃tem:National Top-Level Node Construction Project(Phase I).
文摘Green and low-carbon is a new development model that seeks balance between environmental sustainability and high economic growth.If explainable and available carbon emission data can be accurately obtained,it will help policy regulators and enterprise managers to more accurately implement this development strategy.A lot of research has been carried out,but it is still a difficult problem that how to accommodate and adapt the complex carbon emission data computing models and factor libraries developed by different regions,different industries and different enterprises.Meanwhile,with the rapid development of the Industrial Internet,it has not only been used for the supply chain optimization and intelligent scheduling of the manufacturing industry,but also been used by more and more industries as an important way of digital transformation.Especially in China,the Industrial Internet identification and resolution system is becoming an important digital infrastructure to uniquely identify objects and share data.Hence,a compatible carbon efficiency information service framework based on the Industrial Internet Identification is proposed in this paper to address the problem of computing and querying multi-source heterogeneous carbon emission data.We have defined a multi cooperation carbon emission data interaction model consisting of three roles and three basic operations.Further,the implementation of the framework includes carbon emission data identification,modeling,calculation,query and sharing.The practice results show that its capability and effectiveness in improving the responsiveness,accuracy,and credibility of compatible carbon efficiency data query and sharing services.
基金supported by the National Natural Science Foundation of China(No.62171051)。
文摘With the proportion of intelligent services in the industrial internet of things(IIoT)rising rapidly,its data dependency and decomposability increase the difficulty of scheduling computing resources.In this paper,we propose an intelligent service computing framework.In the framework,we take the long-term rewards of its important participants,edge service providers,as the optimization goal,which is related to service delay and computing cost.Considering the different update frequencies of data deployment and service offloading,double-timescale reinforcement learning is utilized in the framework.In the small-scale strategy,the frequent concurrency of services and the difference in service time lead to the fuzzy relationship between reward and action.To solve the fuzzy reward problem,a reward mapping-based reinforcement learning(RMRL)algorithm is proposed,which enables the agent to learn the relationship between reward and action more clearly.The large time scale strategy adopts the improved Monte Carlo tree search(MCTS)algorithm to improve the learning speed.The simulation results show that the strategy is superior to popular reinforcement learning algorithms such as double Q-learning(DDQN)and dueling Q-learning(dueling-DQN)in learning speed,and the reward is also increased by 14%.
文摘With the development and widespread use of blockchain in recent years,many projects have introduced blockchain technology to solve the growing security issues of the Industrial Internet of Things(IIoT).However,due to the conflict between the operational performance and security of the blockchain system and the compatibility issues with a large number of IIoT devices running together,the mainstream blockchain system cannot be applied to IIoT scenarios.In order to solve these problems,this paper proposes SBFT(Speculative Byzantine Consensus Protocol),a flexible and scalable blockchain consensus mechanism for the Industrial Internet of Things.SBFT has a consensus process based on speculation,improving the throughput and consensus speed of blockchain systems and reducing communication overhead.In order to improve the compatibility and scalability of the blockchain system,we select some nodes to participate in the consensus,and these nodes have better performance in the network.Since multiple properties determine node performance,we abstract the node selection problem as a joint optimization problem and use Dueling Deep Q Learning(DQL)to solve it.Finally,we evaluate the performance of the scheme through simulation,and the simulation results prove the superiority of our scheme.
文摘Identifier resolution system in the automotive industrial Internet is necessary for building a fully interconnected infrastructure with people,machines,factories,products and clients.The resolution system can not only ensure the comprehensive interconnection and efficiency of research and development,procurement,production,sales,and after-sales service in automotive industry,but also promote the integration of automotive industrial data,which facilitates the integrated development of traditional automotive manufacturing and the industrial Internet.This paper focuses on processes and methods of building identifier resolution system for the automotive industry and summarizes the construction and development of secondary node in the automotive industrial Internet in order to explore a suitable road to a rich and completed application ecosystem.
文摘The intersection of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)has garnered ever-increasing attention and research interest.Nevertheless,the dilemma between the strict resource-constrained nature of IIoT devices and the extensive resource demands of AI has not yet been fully addressed with a comprehensive solution.Taking advantage of the lightweight constructive neural network(LightGCNet)in developing fast learner models for IIoT,a convex geometric constructive neural network with a low-complexity control strategy,namely,ConGCNet,is proposed in this article via convex optimization and matrix theory,which enhances the convergence rate and reduces the computational consumption in comparison with LightGCNet.Firstly,a low-complexity control strategy is proposed to reduce the computational consumption during the hidden parameters training process.Secondly,a novel output weights evaluated method based on convex optimization is proposed to guarantee the convergence rate.Finally,the universal approximation property of ConGCNet is proved by the low-complexity control strategy and convex output weights evaluated method.Simulation results,including four benchmark datasets and the real-world ore grinding process,demonstrate that ConGCNet effectively reduces computational consumption in the modelling process and improves the model’s convergence rate.
基金supported by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MSIT) (No.2021R1C1C1013133)supported by the Institute of Information and Communications Technology Planning and Evaluation (IITP)grant funded by the Korea Government (MSIT) (RS-2022-00167197,Development of Intelligent 5G/6G Infrastructure Technology for The Smart City)supported by the Soonchunhyang University Research Fund.
文摘In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.