为解决现代建筑照明系统能耗冗余、管控滞后、全生命周期经济性不足的核心问题,文章构建了一套工业物联网(industrial internet of things,IIoT)驱动的四层智能照明架构体系,利用感知层、网络层、平台层与应用层的闭环协同,实现照明系...为解决现代建筑照明系统能耗冗余、管控滞后、全生命周期经济性不足的核心问题,文章构建了一套工业物联网(industrial internet of things,IIoT)驱动的四层智能照明架构体系,利用感知层、网络层、平台层与应用层的闭环协同,实现照明系统与人员活动、自然光照、建筑环境的动态适配。研究结果表明:相比传统荧光灯照明,IIoT智能照明架构可降低65%~70%的能耗;对比普通LED照明(仅灯具升级,无智能管控),其额外节能率达35%~40%;全生命周期(按15 a计)成本节约率稳定在28%~35%,且人员感知响应速度≤0.5 s、照度达标率超98%。研究证实,IIoT技术能有效打通照明“技术-节能-经济”的联动壁垒,为现代绿色建筑照明的升级提供可落地的技术路径与经济论证。展开更多
为了解决在工业物联网(industrial Internet of things,IIoT)环境下,现有的调度算法在调度工作流中对数据安全、响应时间有一定要求的任务所带来的完工时间上升、成本增加的问题,提出一种基于雾环境负载率而变化的任务调度策略,并使用...为了解决在工业物联网(industrial Internet of things,IIoT)环境下,现有的调度算法在调度工作流中对数据安全、响应时间有一定要求的任务所带来的完工时间上升、成本增加的问题,提出一种基于雾环境负载率而变化的任务调度策略,并使用改进的蜣螂优化算法对工作流调度问题进行求解。改进的算法使用HEFT(heterogeneous earliest finish time)算法对蜣螂种群进行初始化,降低了原始算法中随机性带来的影响。同时引入了镜面反射和反向学习思想,提高了算法的搜索性能。实验结果表明,该算法相比于其他一些传统的调度算法在完工时间与成本方面都有一定的性能提升。展开更多
The integration of blockchain and edgeto-end collaborative computing offers a solution to address the trust issues arising from untrusted IIoT devices.However,ensuring efficiency and energy-saving in applying blockcha...The integration of blockchain and edgeto-end collaborative computing offers a solution to address the trust issues arising from untrusted IIoT devices.However,ensuring efficiency and energy-saving in applying blockchain to edge-to-end collaborative computing remains a significant challenge.To tackle this,this paper proposes an innovative task-oriented blockchain architecture.The architecture comprises trusted Edge Computing(EC)servers and untrusted Industrial Internet of Things(IIoT)devices.We organize untrusted IIoT devices into several clusters,each executing a task in the form of smart contracts,and package the work logs of a task into a block.Executing a task with smart contracts within a cluster ensures the reliability of the task result.Reducing the scope of nodes involved in block consensus increases the overall throughput of the blockchain.Packaging task logs into blocks,storing and propagating blocks through corresponding Edge Computing(EC)servers reduces network load and avoids computing power competition.The paper also presents the proposed architecture’s theoretical TPS(Transactions Per Second)and failure probability calculations.Experimental results demonstrate that this architecture ensures computational security,improves TPS,and reduces resource consumption.展开更多
Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cybe...Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cyber attackers more frequently target these systems.Due to their connection of physical assets with digital networks,SCADA-IIoT systems face substantial risks from multiple attack types,including Distributed Denial of Service(DDoS),spoofing,and more advanced intrusion methods.Previous research in this field faces challenges due to insufficient solutions,as current intrusion detection systems lack the necessary accuracy,scalability,and adaptability needed for IIoT environments.This paper introduces CyberFortis,a novel cybersecurity framework aimed at detecting and preventing cyber threats in SCADA-IIoT systems.CyberFortis presents two key innovations:Firstly,Siamese Double Deep Q-Network with Autoencoders(Siamdqn-AE)FusionNet,which enhances intrusion detection by combining deep Q-Networks with autoencoders for improved attack detection and feature extraction;and secondly,the PopHydra Optimiser,an innovative solution to compute reinforcement learning discount factors for better model performance and convergence.This method combines Siamese deep Q-Networks with autoencoders to create a system that can detect different types of attacks more effectively and adapt to new challenges.CyberFortis is better than current top attack detection systems,showing higher scores in important areas like accuracy,precision,recall,and F1-score,based on data from CICIoT 2023,UNSW-NB 15,and WUSTL-IIoT datasets.Results from the proposed framework show a 97.5%accuracy rate,indicating its potential as an effective solution for SCADA-IIoT cybersecurity against emerging threats.The research confirms that the proposed security and resilience methods are successful in protecting vital industrial control systems within their operational environments.展开更多
The rapid development of the industrial internet of things(IIoT)has brought huge benefits to factories equipped with IIoT technology,each of which represents an IIoT domain.More and more domains are choosing to cooper...The rapid development of the industrial internet of things(IIoT)has brought huge benefits to factories equipped with IIoT technology,each of which represents an IIoT domain.More and more domains are choosing to cooperate with each other to produce better products for greater profits.Therefore,in order to protect the security and privacy of IIoT devices in cross-domain communication,lots of cross-domain authentication schemes have been proposed.However,most schemes expose the domain to which the IIoT device belongs,or introduce a single point of failure in multi-domain cooperation,thus introducing unpredictable risks to each domain.We propose a more secure and efficient domain-level anonymous cross-domain authentication(DLCA)scheme based on alliance blockchain.The proposed scheme uses group signatures with decentralized tracing technology to provide domain-level anonymity to each IIoT device and allow the public to trace the real identity of the malicious pseudonym.In addition,DLCA takes into account the limited resource characteristics of IIoT devices to design an efficient cross-domain authentication protocol.Security analysis and performance evaluation show that the proposed scheme can be effectively used in the cross-domain authentication scenario of industrial internet of things.展开更多
In this paper,we explore the ever-changing field ofDigital Twins(DT)in the Industrial Internet of Things(IIoT)context,emphasizing their critical role in advancing Industry 4.0 toward the frontiers of Industry 5.0.The ...In this paper,we explore the ever-changing field ofDigital Twins(DT)in the Industrial Internet of Things(IIoT)context,emphasizing their critical role in advancing Industry 4.0 toward the frontiers of Industry 5.0.The article explores the applications of DT in several industrial sectors and their smooth integration into the IIoT,focusing on the fundamentals of digital twins and emphasizing the importance of virtual-real integration.It discusses the emergence of DT,contextualizing its evolution within the framework of IIoT.The study categorizes the different types of DT,including prototypes and instances,and provides an in-depth analysis of the enabling technologies such as IoT,Artificial Intelligence(AI),Extended Reality(XR),cloud computing,and the Application Programming Interface(API).The paper demonstrates theDT advantages through the practical integration of real-world case studies,which highlights the technology’s exceptional capacity to improve traceability and fault detection within the context of the IIoT.This paper offers a focused,application-driven perspective on DTs in IIoT,specifically highlighting their role in key production phases such as designing,intelligent manufacturing,maintenance,resource management,automation,security,and safety.By emphasizing their potential to support human-centric,sustainable advancements in Industry 5.0,this study distinguishes itself from existing literature.It provides valuable insights that connect theoretical advancements with practical implementation,making it a crucial resource for researchers,practitioners,and industry professionals.展开更多
为解决在IIoT(industrial internet of things)环境下,现有的调度算法调度工作流中通信频繁、数据传输量大的任务所带来的完工时间上升、成本增加等影响的问题,提出一种基于聚类的工作流多雾协同调度算法。通过二分K均值算法对工作流中...为解决在IIoT(industrial internet of things)环境下,现有的调度算法调度工作流中通信频繁、数据传输量大的任务所带来的完工时间上升、成本增加等影响的问题,提出一种基于聚类的工作流多雾协同调度算法。通过二分K均值算法对工作流中的任务进行聚类,基于聚类结果,在多个雾服务器之间使用改进的免疫粒子群优化算法进行任务调度。实验结果表明,该算法相比其它一些传统的调度算法在完工时间、成本、负载均衡方面都有一定提升。展开更多
区块链技术对保证工业物联网(Industrial Internet of Things,IIoT)的数据安全性、可信度和透明度至关重要,推动了物联网(Internet of Things,IoT)设备之间的信任和安全交互,加速了工业自动化和智能化的发展。针对区块链在IIoT中的部署...区块链技术对保证工业物联网(Industrial Internet of Things,IIoT)的数据安全性、可信度和透明度至关重要,推动了物联网(Internet of Things,IoT)设备之间的信任和安全交互,加速了工业自动化和智能化的发展。针对区块链在IIoT中的部署优化面临网络拓扑动态复杂和无线节点能量受限等问题,提出了一种利用图卷积神经网络(graph convolutional neural network,GCN)的无线节点传输功率计算框架。通过拟合大量实验数据得到传输功率和时延之间的关系函数,引入能耗、分叉率、时延、算力等因素构建关于节点传输功率的系统效用最优化问题。经过训练后,GCN基于节点哈希算力、网络拓扑图、区块链出块间隔和区块大小等信息,可快速确定无线区块链节点最优传输功率,以提高IIoT区块链的系统能效和部署时效。实验结果表明,在复杂无线IoT环境下,所提方法能高效得到理想的无线区块链节点传输功率值,与最优值之间的平均相对偏差小于1.81%。展开更多
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im...In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.展开更多
Nowadays,a large number of intelligent devices involved in the Industrial Internet of Things(IIoT)environment are posing unprecedented cybersecurity challenges.Due to the limited budget for security protection,the IIo...Nowadays,a large number of intelligent devices involved in the Industrial Internet of Things(IIoT)environment are posing unprecedented cybersecurity challenges.Due to the limited budget for security protection,the IIoT devices are vulnerable and easily compromised to launch Distributed Denial-of-Service(DDoS)attacks,resulting in disastrous results.Unfortunately,considering the particularity of the IIoT environment,most of the defense solutions in traditional networks cannot be directly applied to IIoT with acceptable security performance.Therefore,in this work,we propose a multi-point collaborative defense mechanism against DDoS attacks for IIoT.Specifically,for the single point DDoS defense,we design an edge-centric mechanism termed EdgeDefense for the detection,identification,classification,and mitigation of DDoS attacks and the generation of defense information.For the practical multi-point scenario,we propose a collaborative defense model against DDoS attacks to securely share the defense information across the network through the blockchain.Besides,a fast defense information sharing mechanism is designed to reduce the delay of defense information sharing and provide a responsive cybersecurity guarantee.The simulation results indicate that the identification and classification performance of the two machine learning models designed for EdgeDefense are better than those of the state-of-the-art baseline models,and therefore EdgeDefense can defend against DDoS attacks effectively.The results also verify that the proposed fast sharing mechanism can reduce the propagation delay of the defense information blocks effectively,thereby improving the responsiveness of the multi-point collaborative DDoS defense.展开更多
With the rapid development of data applications in the scene of Industrial Internet of Things(IIoT),how to schedule resources in IIoT environment has become an urgent problem to be solved.Due to benefit of its strong ...With the rapid development of data applications in the scene of Industrial Internet of Things(IIoT),how to schedule resources in IIoT environment has become an urgent problem to be solved.Due to benefit of its strong scalability and compatibility,Kubernetes has been applied to resource scheduling in IIoT scenarios.However,the limited types of resources,the default scheduling scoring strategy,and the lack of delay control module limit its resource scheduling performance.To address these problems,this paper proposes a multi-resource scheduling(MRS)scheme of Kubernetes for IIoT.The MRS scheme dynamically balances resource utilization by taking both requirements of tasks and the current system state into consideration.Furthermore,the experiments demonstrate the effectiveness of the MRS scheme in terms of delay control and resource utilization.展开更多
Rapid advancements of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)pose serious security issues by revealing secret data.Therefore,security data becomes a crucial issue in IIoT communication w...Rapid advancements of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)pose serious security issues by revealing secret data.Therefore,security data becomes a crucial issue in IIoT communication where secrecy needs to be guaranteed in real time.Practically,AI techniques can be utilized to design image steganographic techniques in IIoT.In addition,encryption techniques act as an important role to save the actual information generated from the IIoT devices to avoid unauthorized access.In order to accomplish secure data transmission in IIoT environment,this study presents novel encryption with image steganography based data hiding technique(EISDHT)for IIoT environment.The proposed EIS-DHT technique involves a new quantum black widow optimization(QBWO)to competently choose the pixel values for hiding secrete data in the cover image.In addition,the multi-level discrete wavelet transform(DWT)based transformation process takes place.Besides,the secret image is divided into three R,G,and B bands which are then individually encrypted using Blowfish,Twofish,and Lorenz Hyperchaotic System.At last,the stego image gets generated by placing the encrypted images into the optimum pixel locations of the cover image.In order to validate the enhanced data hiding performance of the EIS-DHT technique,a set of simulation analyses take place and the results are inspected interms of different measures.The experimental outcomes stated the supremacy of the EIS-DHT technique over the other existing techniques and ensure maximum security.展开更多
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi...With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of IIoT.Blockchain technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the IIoT.In the traditional blockchain,data is stored in a Merkle tree.As data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based IIoT.Accordingly,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of data.To solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC structure.Secondly,this paper uses PVC instead of the Merkle tree to store big data generated by IIoT.PVC can improve the efficiency of traditional VC in the process of commitment and opening.Finally,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of experiments.This mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT.展开更多
Compressed Sensing(CS)is a Machine Learning(ML)method,which can be regarded as a single-layer unsupervised learning method.It mainly emphasizes the sparsity of the model.In this paper,we study an ML-based CS Channel E...Compressed Sensing(CS)is a Machine Learning(ML)method,which can be regarded as a single-layer unsupervised learning method.It mainly emphasizes the sparsity of the model.In this paper,we study an ML-based CS Channel Estimation(CE)method for wireless communications,which plays an important role in Industrial Internet of Things(IIoT)applications.For the sparse correlation between channels in Multiple Input Multiple Output Filter Bank MultiCarrier with Offset Quadrature Amplitude Modulation(MIMO-FBMC/OQAM)systems,a Distributed Compressed Sensing(DCS)-based CE approach is studied.A distributed sparse adaptive weak selection threshold method is proposed for CE.Firstly,the correlation between MIMO channels is utilized to represent a joint sparse model,and CE is transformed into a joint sparse signal reconstruction problem.Then,the number of correlation atoms for inner product operation is optimized by weak selection threshold,and sparse signal reconstruction is realized by sparse adaptation.The experiment results show that the proposed DCS-based method not only estimates the multipath channel components accurately but also achieves higher CE performance than classical Orthogonal Matching Pursuit(OMP)method and other traditional DCS methods in the time-frequency dual selective channels.展开更多
With the development of the Industrial Internet of Things(IIoT),end devices(EDs)are equipped with more functions to capture information.Therefore,a large amount of data is generated at the edge of the network and need...With the development of the Industrial Internet of Things(IIoT),end devices(EDs)are equipped with more functions to capture information.Therefore,a large amount of data is generated at the edge of the network and needs to be processed.However,no matter whether these computing tasks are offloaded to traditional central clusters or mobile edge computing(MEC)devices,the data is short of security and may be changed during transmission.In view of this challenge,this paper proposes a trusted task offloading optimization scheme that can offer low latency and high bandwidth services for IIoT with data security.Blockchain technology is adopted to ensure data consistency.Meanwhile,to reduce the impact of low throughput of blockchain on task offloading performance,we design the processes of consensus and offloading as a Markov decision process(MDP)by defining states,actions,and rewards.Deep reinforcement learning(DRL)algorithm is introduced to dynamically select offloading actions.To accelerate the optimization,we design a novel reward function for the DRL algorithm according to the scale and computational complexity of the task.Experiments demonstrate that compared with methods without optimization,our mechanism performs better when it comes to the number of task offloading and throughput of blockchain.展开更多
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for...The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms.展开更多
在过去的数十年里,物联网(internet of things,IoT)已经成为一个全新的发展范式,在无线通信和微电子技术等领域都获得了极大成就,并受到了社会重视。与传统物联网不同,工业产生的大数据随时代的发展呈指数级增长,需要实时智能处理。为...在过去的数十年里,物联网(internet of things,IoT)已经成为一个全新的发展范式,在无线通信和微电子技术等领域都获得了极大成就,并受到了社会重视。与传统物联网不同,工业产生的大数据随时代的发展呈指数级增长,需要实时智能处理。为提高工业物联网(industrial internet of things,IIoT)系统的实时性与能源效率,引入云计算技术来分担IIoT中过重的计算任务。本文分析了IIoT及云计算对智能制造业发展产生的影响,阐述了智能传感器、设备和应用程序在提高生产力、简化业务操作中的应用,还概述了实现智能制造的安全控制和实践,为物联网和云计算在智能制造领域的发展模式提供思路。展开更多
文摘为解决现代建筑照明系统能耗冗余、管控滞后、全生命周期经济性不足的核心问题,文章构建了一套工业物联网(industrial internet of things,IIoT)驱动的四层智能照明架构体系,利用感知层、网络层、平台层与应用层的闭环协同,实现照明系统与人员活动、自然光照、建筑环境的动态适配。研究结果表明:相比传统荧光灯照明,IIoT智能照明架构可降低65%~70%的能耗;对比普通LED照明(仅灯具升级,无智能管控),其额外节能率达35%~40%;全生命周期(按15 a计)成本节约率稳定在28%~35%,且人员感知响应速度≤0.5 s、照度达标率超98%。研究证实,IIoT技术能有效打通照明“技术-节能-经济”的联动壁垒,为现代绿色建筑照明的升级提供可落地的技术路径与经济论证。
文摘为了解决在工业物联网(industrial Internet of things,IIoT)环境下,现有的调度算法在调度工作流中对数据安全、响应时间有一定要求的任务所带来的完工时间上升、成本增加的问题,提出一种基于雾环境负载率而变化的任务调度策略,并使用改进的蜣螂优化算法对工作流调度问题进行求解。改进的算法使用HEFT(heterogeneous earliest finish time)算法对蜣螂种群进行初始化,降低了原始算法中随机性带来的影响。同时引入了镜面反射和反向学习思想,提高了算法的搜索性能。实验结果表明,该算法相比于其他一些传统的调度算法在完工时间与成本方面都有一定的性能提升。
基金supported in part by the National Natural Science Foundation of China(62071396)the National Science Foundation of Sichuan Province(2022NSFSC0531)+3 种基金Sichuan Provincial Key Laboratory of Advanced Cryptographic Technology and System Security Project(SKLACSS-202309)the 2024 Open Project of the Intelligent Policing and National Security Risk Management Laboratory of Sichuan Police College(ZHKFYB2401)Meishan City Guiding Science and Technology Plan Project(2024KJZD168,2024KJZD156)Sichuan Technology and Business University School-level Scientific Research Project(XJ24YB031,XJ24ZD006).
文摘The integration of blockchain and edgeto-end collaborative computing offers a solution to address the trust issues arising from untrusted IIoT devices.However,ensuring efficiency and energy-saving in applying blockchain to edge-to-end collaborative computing remains a significant challenge.To tackle this,this paper proposes an innovative task-oriented blockchain architecture.The architecture comprises trusted Edge Computing(EC)servers and untrusted Industrial Internet of Things(IIoT)devices.We organize untrusted IIoT devices into several clusters,each executing a task in the form of smart contracts,and package the work logs of a task into a block.Executing a task with smart contracts within a cluster ensures the reliability of the task result.Reducing the scope of nodes involved in block consensus increases the overall throughput of the blockchain.Packaging task logs into blocks,storing and propagating blocks through corresponding Edge Computing(EC)servers reduces network load and avoids computing power competition.The paper also presents the proposed architecture’s theoretical TPS(Transactions Per Second)and failure probability calculations.Experimental results demonstrate that this architecture ensures computational security,improves TPS,and reduces resource consumption.
基金financially supported by the Ongoing Research Funding Program(ORF-2025-846),King Saud University,Riyadh,Saudi Arabia.
文摘Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cyber attackers more frequently target these systems.Due to their connection of physical assets with digital networks,SCADA-IIoT systems face substantial risks from multiple attack types,including Distributed Denial of Service(DDoS),spoofing,and more advanced intrusion methods.Previous research in this field faces challenges due to insufficient solutions,as current intrusion detection systems lack the necessary accuracy,scalability,and adaptability needed for IIoT environments.This paper introduces CyberFortis,a novel cybersecurity framework aimed at detecting and preventing cyber threats in SCADA-IIoT systems.CyberFortis presents two key innovations:Firstly,Siamese Double Deep Q-Network with Autoencoders(Siamdqn-AE)FusionNet,which enhances intrusion detection by combining deep Q-Networks with autoencoders for improved attack detection and feature extraction;and secondly,the PopHydra Optimiser,an innovative solution to compute reinforcement learning discount factors for better model performance and convergence.This method combines Siamese deep Q-Networks with autoencoders to create a system that can detect different types of attacks more effectively and adapt to new challenges.CyberFortis is better than current top attack detection systems,showing higher scores in important areas like accuracy,precision,recall,and F1-score,based on data from CICIoT 2023,UNSW-NB 15,and WUSTL-IIoT datasets.Results from the proposed framework show a 97.5%accuracy rate,indicating its potential as an effective solution for SCADA-IIoT cybersecurity against emerging threats.The research confirms that the proposed security and resilience methods are successful in protecting vital industrial control systems within their operational environments.
文摘The rapid development of the industrial internet of things(IIoT)has brought huge benefits to factories equipped with IIoT technology,each of which represents an IIoT domain.More and more domains are choosing to cooperate with each other to produce better products for greater profits.Therefore,in order to protect the security and privacy of IIoT devices in cross-domain communication,lots of cross-domain authentication schemes have been proposed.However,most schemes expose the domain to which the IIoT device belongs,or introduce a single point of failure in multi-domain cooperation,thus introducing unpredictable risks to each domain.We propose a more secure and efficient domain-level anonymous cross-domain authentication(DLCA)scheme based on alliance blockchain.The proposed scheme uses group signatures with decentralized tracing technology to provide domain-level anonymity to each IIoT device and allow the public to trace the real identity of the malicious pseudonym.In addition,DLCA takes into account the limited resource characteristics of IIoT devices to design an efficient cross-domain authentication protocol.Security analysis and performance evaluation show that the proposed scheme can be effectively used in the cross-domain authentication scenario of industrial internet of things.
基金funded by Big Data Analytics Centre(BIDAC)of United Arab Emirates University under the grant numbers G00003679 and G00004526。
文摘In this paper,we explore the ever-changing field ofDigital Twins(DT)in the Industrial Internet of Things(IIoT)context,emphasizing their critical role in advancing Industry 4.0 toward the frontiers of Industry 5.0.The article explores the applications of DT in several industrial sectors and their smooth integration into the IIoT,focusing on the fundamentals of digital twins and emphasizing the importance of virtual-real integration.It discusses the emergence of DT,contextualizing its evolution within the framework of IIoT.The study categorizes the different types of DT,including prototypes and instances,and provides an in-depth analysis of the enabling technologies such as IoT,Artificial Intelligence(AI),Extended Reality(XR),cloud computing,and the Application Programming Interface(API).The paper demonstrates theDT advantages through the practical integration of real-world case studies,which highlights the technology’s exceptional capacity to improve traceability and fault detection within the context of the IIoT.This paper offers a focused,application-driven perspective on DTs in IIoT,specifically highlighting their role in key production phases such as designing,intelligent manufacturing,maintenance,resource management,automation,security,and safety.By emphasizing their potential to support human-centric,sustainable advancements in Industry 5.0,this study distinguishes itself from existing literature.It provides valuable insights that connect theoretical advancements with practical implementation,making it a crucial resource for researchers,practitioners,and industry professionals.
文摘为解决在IIoT(industrial internet of things)环境下,现有的调度算法调度工作流中通信频繁、数据传输量大的任务所带来的完工时间上升、成本增加等影响的问题,提出一种基于聚类的工作流多雾协同调度算法。通过二分K均值算法对工作流中的任务进行聚类,基于聚类结果,在多个雾服务器之间使用改进的免疫粒子群优化算法进行任务调度。实验结果表明,该算法相比其它一些传统的调度算法在完工时间、成本、负载均衡方面都有一定提升。
文摘区块链技术对保证工业物联网(Industrial Internet of Things,IIoT)的数据安全性、可信度和透明度至关重要,推动了物联网(Internet of Things,IoT)设备之间的信任和安全交互,加速了工业自动化和智能化的发展。针对区块链在IIoT中的部署优化面临网络拓扑动态复杂和无线节点能量受限等问题,提出了一种利用图卷积神经网络(graph convolutional neural network,GCN)的无线节点传输功率计算框架。通过拟合大量实验数据得到传输功率和时延之间的关系函数,引入能耗、分叉率、时延、算力等因素构建关于节点传输功率的系统效用最优化问题。经过训练后,GCN基于节点哈希算力、网络拓扑图、区块链出块间隔和区块大小等信息,可快速确定无线区块链节点最优传输功率,以提高IIoT区块链的系统能效和部署时效。实验结果表明,在复杂无线IoT环境下,所提方法能高效得到理想的无线区块链节点传输功率值,与最优值之间的平均相对偏差小于1.81%。
基金supported by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MSIT) (No.2021R1C1C1013133)supported by the Institute of Information and Communications Technology Planning and Evaluation (IITP)grant funded by the Korea Government (MSIT) (RS-2022-00167197,Development of Intelligent 5G/6G Infrastructure Technology for The Smart City)supported by the Soonchunhyang University Research Fund.
文摘In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method.
基金supported by the National Key Research and Development Program of China under Grant 2019YFB2102001.
文摘Nowadays,a large number of intelligent devices involved in the Industrial Internet of Things(IIoT)environment are posing unprecedented cybersecurity challenges.Due to the limited budget for security protection,the IIoT devices are vulnerable and easily compromised to launch Distributed Denial-of-Service(DDoS)attacks,resulting in disastrous results.Unfortunately,considering the particularity of the IIoT environment,most of the defense solutions in traditional networks cannot be directly applied to IIoT with acceptable security performance.Therefore,in this work,we propose a multi-point collaborative defense mechanism against DDoS attacks for IIoT.Specifically,for the single point DDoS defense,we design an edge-centric mechanism termed EdgeDefense for the detection,identification,classification,and mitigation of DDoS attacks and the generation of defense information.For the practical multi-point scenario,we propose a collaborative defense model against DDoS attacks to securely share the defense information across the network through the blockchain.Besides,a fast defense information sharing mechanism is designed to reduce the delay of defense information sharing and provide a responsive cybersecurity guarantee.The simulation results indicate that the identification and classification performance of the two machine learning models designed for EdgeDefense are better than those of the state-of-the-art baseline models,and therefore EdgeDefense can defend against DDoS attacks effectively.The results also verify that the proposed fast sharing mechanism can reduce the propagation delay of the defense information blocks effectively,thereby improving the responsiveness of the multi-point collaborative DDoS defense.
基金This work was supported by the National Natural Science Foundation of China(61872423)the Industry Prospective Primary Research&Development Plan of Jiangsu Province(BE2017111)the Scientific Research Foundation of the Higher Education Institutions of Jiangsu Province(19KJA180006).
文摘With the rapid development of data applications in the scene of Industrial Internet of Things(IIoT),how to schedule resources in IIoT environment has become an urgent problem to be solved.Due to benefit of its strong scalability and compatibility,Kubernetes has been applied to resource scheduling in IIoT scenarios.However,the limited types of resources,the default scheduling scoring strategy,and the lack of delay control module limit its resource scheduling performance.To address these problems,this paper proposes a multi-resource scheduling(MRS)scheme of Kubernetes for IIoT.The MRS scheme dynamically balances resource utilization by taking both requirements of tasks and the current system state into consideration.Furthermore,the experiments demonstrate the effectiveness of the MRS scheme in terms of delay control and resource utilization.
基金This research work was funded by Institution Fund projects under Grant No.(IFPRC-215-249-2020)Therefore,authors gratefully acknowledge technical and financial support from the Ministry of Education and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘Rapid advancements of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)pose serious security issues by revealing secret data.Therefore,security data becomes a crucial issue in IIoT communication where secrecy needs to be guaranteed in real time.Practically,AI techniques can be utilized to design image steganographic techniques in IIoT.In addition,encryption techniques act as an important role to save the actual information generated from the IIoT devices to avoid unauthorized access.In order to accomplish secure data transmission in IIoT environment,this study presents novel encryption with image steganography based data hiding technique(EISDHT)for IIoT environment.The proposed EIS-DHT technique involves a new quantum black widow optimization(QBWO)to competently choose the pixel values for hiding secrete data in the cover image.In addition,the multi-level discrete wavelet transform(DWT)based transformation process takes place.Besides,the secret image is divided into three R,G,and B bands which are then individually encrypted using Blowfish,Twofish,and Lorenz Hyperchaotic System.At last,the stego image gets generated by placing the encrypted images into the optimum pixel locations of the cover image.In order to validate the enhanced data hiding performance of the EIS-DHT technique,a set of simulation analyses take place and the results are inspected interms of different measures.The experimental outcomes stated the supremacy of the EIS-DHT technique over the other existing techniques and ensure maximum security.
基金supported by China’s National Natural Science Foundation(Nos.62072249,62072056)This work is also funded by the National Science Foundation of Hunan Province(2020JJ2029).
文摘With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of IIoT.Blockchain technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the IIoT.In the traditional blockchain,data is stored in a Merkle tree.As data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based IIoT.Accordingly,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of data.To solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC structure.Secondly,this paper uses PVC instead of the Merkle tree to store big data generated by IIoT.PVC can improve the efficiency of traditional VC in the process of commitment and opening.Finally,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of experiments.This mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT.
基金supported by National Natural Science Foundation of China under Grant Nos.61901409 and 61961013Jiangxi Provincial Natural Science Foundation under Grant No.20202BABL212001Open Project of State Key Laboratory of Marine Resources Utilization in South China Sea under Grant No.MRUKF2021034.
文摘Compressed Sensing(CS)is a Machine Learning(ML)method,which can be regarded as a single-layer unsupervised learning method.It mainly emphasizes the sparsity of the model.In this paper,we study an ML-based CS Channel Estimation(CE)method for wireless communications,which plays an important role in Industrial Internet of Things(IIoT)applications.For the sparse correlation between channels in Multiple Input Multiple Output Filter Bank MultiCarrier with Offset Quadrature Amplitude Modulation(MIMO-FBMC/OQAM)systems,a Distributed Compressed Sensing(DCS)-based CE approach is studied.A distributed sparse adaptive weak selection threshold method is proposed for CE.Firstly,the correlation between MIMO channels is utilized to represent a joint sparse model,and CE is transformed into a joint sparse signal reconstruction problem.Then,the number of correlation atoms for inner product operation is optimized by weak selection threshold,and sparse signal reconstruction is realized by sparse adaptation.The experiment results show that the proposed DCS-based method not only estimates the multipath channel components accurately but also achieves higher CE performance than classical Orthogonal Matching Pursuit(OMP)method and other traditional DCS methods in the time-frequency dual selective channels.
基金supported by the Projects of Software of Big Data Processing Tool(TC210804V-1)Big Data Risk Screening Model Procurement(No.S20200).
文摘With the development of the Industrial Internet of Things(IIoT),end devices(EDs)are equipped with more functions to capture information.Therefore,a large amount of data is generated at the edge of the network and needs to be processed.However,no matter whether these computing tasks are offloaded to traditional central clusters or mobile edge computing(MEC)devices,the data is short of security and may be changed during transmission.In view of this challenge,this paper proposes a trusted task offloading optimization scheme that can offer low latency and high bandwidth services for IIoT with data security.Blockchain technology is adopted to ensure data consistency.Meanwhile,to reduce the impact of low throughput of blockchain on task offloading performance,we design the processes of consensus and offloading as a Markov decision process(MDP)by defining states,actions,and rewards.Deep reinforcement learning(DRL)algorithm is introduced to dynamically select offloading actions.To accelerate the optimization,we design a novel reward function for the DRL algorithm according to the scale and computational complexity of the task.Experiments demonstrate that compared with methods without optimization,our mechanism performs better when it comes to the number of task offloading and throughput of blockchain.
文摘The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms.
文摘在过去的数十年里,物联网(internet of things,IoT)已经成为一个全新的发展范式,在无线通信和微电子技术等领域都获得了极大成就,并受到了社会重视。与传统物联网不同,工业产生的大数据随时代的发展呈指数级增长,需要实时智能处理。为提高工业物联网(industrial internet of things,IIoT)系统的实时性与能源效率,引入云计算技术来分担IIoT中过重的计算任务。本文分析了IIoT及云计算对智能制造业发展产生的影响,阐述了智能传感器、设备和应用程序在提高生产力、简化业务操作中的应用,还概述了实现智能制造的安全控制和实践,为物联网和云计算在智能制造领域的发展模式提供思路。