Due to the growth of smart cities,many real-time systems have been developed to support smart cities using Internet of Things(IoT)and emerging technologies.They are formulated to collect the data for environment monit...Due to the growth of smart cities,many real-time systems have been developed to support smart cities using Internet of Things(IoT)and emerging technologies.They are formulated to collect the data for environment monitoring and automate the communication process.In recent decades,researchers have made many efforts to propose autonomous systems for manipulating network data and providing on-time responses in critical operations.However,the widespread use of IoT devices in resource-constrained applications and mobile sensor networks introduces significant research challenges for cybersecurity.These systems are vulnerable to a variety of cyberattacks,including unauthorized access,denial-of-service attacks,and data leakage,which compromise the network’s security.Additionally,uneven load balancing between mobile IoT devices,which frequently experience link interferences,compromises the trustworthiness of the system.This paper introduces a Multi-Agent secured framework using lightweight edge computing to enhance cybersecurity for sensor networks,aiming to leverage artificial intelligence for adaptive routing and multi-metric trust evaluation to achieve data privacy and mitigate potential threats.Moreover,it enhances the efficiency of distributed sensors for energy consumption through intelligent data analytics techniques,resulting in highly consistent and low-latency network communication.Using simulations,the proposed framework reveals its significant performance compared to state-of-the-art approaches for energy consumption by 43%,latency by 46%,network throughput by 51%,packet loss rate by 40%,and denial of service attacks by 42%.展开更多
The Internet ofThings(IoT)is a new model that evolved with the rapid progress of advanced technology and gained tremendous popularity due to its applications.Anomaly detection haswidely attracted researchers’attentio...The Internet ofThings(IoT)is a new model that evolved with the rapid progress of advanced technology and gained tremendous popularity due to its applications.Anomaly detection haswidely attracted researchers’attention in the last few years,and its effects on diverse applications.This review article covers the various methods and tools developed to perform the task efficiently and automatically in a smart city.In this work,we present a comprehensive literature review(2011 onwards)of three major types of anomalies:network anomalies,sensor anomalies,and videobased anomalies,along with their methods and software tools.Furthermore,anomaly detection methods such as machine learning and deep learning are presented in this work,highlighting their detection strategy techniques,features,applications,issues,and challenges.Moreover,a generic algorithmis also developed to ease the user achieve the taskmore specifically by targeting a specific domain aswell as approach.Comparative studies of three anomalymethods and their analysis identify research discovery areas with their applications.As a result,researchers and practitioners can familiarize themselves with the existing methods for solving real problems,improving methods,and developing new optimum methods for anomaly detection in diverse applications.展开更多
The Internet of Things(IoT)ecosystem is inherently heterogeneous,comprising diverse devices that must interoperate seamlessly to enable federated message and data exchange.However,as the number of service requests gro...The Internet of Things(IoT)ecosystem is inherently heterogeneous,comprising diverse devices that must interoperate seamlessly to enable federated message and data exchange.However,as the number of service requests grows,existing approaches suffer from increased discovery time and degraded Quality of Service(QoS).Moreover,the massive data generated by heterogeneous IoT devices often contain redundancy and noise,posing challenges to efficient data management.To address these issues,this paper proposes a lightweight ontology-based architecture that enhances service discovery and QoS-aware semantic data management.The architecture employs Modified-Ordered Points to Identify theClustering Structure(M-OPTICS)to cluster and eliminate redundant IoT data.The clustered data are then modelled into a lightweight ontology,enabling semantic relationship inference and rule generation through an embedded inference engine.User requests,transmitted via theConstrainedApplication Protocol(CoAP),are semantically enriched and matched to QoS parameters using Dynamic Shannon Entropy optimized with the Salp Swarm Algorithm.Semantic matching is further refined using a bidirectional recurrent neural network(Bi-RNN),while a State–Action–Reward–State–Action(SARSA)reinforcement learning model dynamically defines and updates semantic rules to retrieve themost recent and relevant data across heterogeneous devices.Experimental results demonstrate that the proposed architecture outperforms existing methods in terms of response time,service delay,execution time,precision,recall,and F-score under varying CoAP request loads and communication overheads.The results confirm the effectiveness of the proposed lightweight ontology architecture for service discovery and data management in heterogeneous IoT environments.展开更多
Recently,the Internet of Things(IoT)technology has been utilized in a wide range of services and applications which significantly transforms digital ecosystems through seamless interconnectivity between various smart ...Recently,the Internet of Things(IoT)technology has been utilized in a wide range of services and applications which significantly transforms digital ecosystems through seamless interconnectivity between various smart devices.Furthermore,the IoT plays a key role in multiple domains,including industrial automation,smart homes,and intelligent transportation systems.However,an increasing number of connected devices presents significant challenges related to efficient resource allocation and system responsiveness.To address these issue,this research proposes a Modified Walrus Optimization Algorithm(MWaOA)for effective resource management in smart IoT systems.In the proposed MWaOA,a crowding process is incorporated to maintain diversity and avoid premature convergence thereby enhancing the global search capability.During resource allocation,the MWaOA prevents early convergence,which aids in achieving a better balance between the exploration and exploitation phases during optimization.Empirical evaluations show that the MWaOA reduces energy consumption by approximately 4% to 34%and minimizes the response time by 6% to 33% across different service arrival rates.Compared to traditional optimization algorithms,MWaOA reduces energy consumption by 5% to 30%and minimizes the response time by 4% to 28% across different simulation epochs.The proposed MWaOA provides adaptive and robust resource allocation,thereby minimizing transmission cost while considering network constraints and real-time performance parameters.展开更多
Practical applications of smart cities and the Internet of Things(IoT)have multiplied,posing many difficulties in network performance,dependability,and security.Concerns of accessibility,reliability,sustainability,and...Practical applications of smart cities and the Internet of Things(IoT)have multiplied,posing many difficulties in network performance,dependability,and security.Concerns of accessibility,reliability,sustainability,and security too have arisen correspondingly because of the decentralized character of the smart city and IoT systems.Fog computing offers a foundation for various applications,including cognitive support,health and social services,intelligent transportation systems,and pervasive computing and communications.Fog computing can help enhance these apps'productivity and lower the end-to-end delay experienced by such time-sensitive applications.In this research,we propose a reliable and secure service delivery strategy at the network edge for smart cities.To improve the availability and dependability,along with the security of smart city applications,the approach employs a combined method uniting distributed fog servers in addition to mist servers with the help of an intrusion detection system.Simulation findings suggest a reduction of 40.3%in the delay incurred by each service request for highly dense areas and 60.6%for moderately dense environments.Furthermore,the system has low false-negative rates and high detection and accuracy rates,decreasing service requests 2%.展开更多
With the proliferation of Internet of Things(IoT)devices,securing these interconnected systems against cyberattacks has become a critical challenge.Traditional security paradigms often fail to cope with the scale and ...With the proliferation of Internet of Things(IoT)devices,securing these interconnected systems against cyberattacks has become a critical challenge.Traditional security paradigms often fail to cope with the scale and diversity of IoT network traffic.This paper presents a comparative benchmark of classic machine learning(ML)and state-of-the-art deep learning(DL)algorithms for IoT intrusion detection.Our methodology employs a twophased approach:a preliminary pilot study using a custom-generated dataset to establish baselines,followed by a comprehensive evaluation on the large-scale CICIoTDataset2023.We benchmarked algorithms including Random Forest,XGBoost,CNN,and StackedLSTM.The results indicate that while top-performingmodels frombothcategories achieve over 99%classification accuracy,this metric masks a crucial performance trade-off.We demonstrate that treebased ML ensembles exhibit superior precision(91%)in identifying benign traffic,making them effective at reducing false positives.Conversely,DL models demonstrate superior recall(96%),making them better suited for minimizing the interruption of legitimate traffic.We conclude that the selection of an optimal model is not merely a matter of maximizing accuracy but is a strategic choice dependent on the specific security priority either minimizing false alarms or ensuring service availability.Thiswork provides a practical framework for deploying context-aware security solutions in diverse IoT environments.展开更多
Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudass...Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudassisted architecture faces two critical challenges:the untrusted cloud services and the separation of data ownership from control.Although Attribute-based Searchable Encryption(ABSE)provides fine-grained access control and keyword search over encrypted data,existing schemes lack of error tolerance in exact multi-keyword matching.In this paper,we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search(FCS-ABMSE)scheme that avoids computationally expensive bilinear pairing operations on the IoT device side.The scheme supportsmulti-keyword fuzzy search without requiring explicit keyword fields,thereby significantly enhancing error tolerance in search operations.It further incorporates forward-secure ciphertext search to mitigate trapdoor abuse,as well as offline encryption and verifiable outsourced decryption to minimize user-side computational costs.Formal security analysis proved that the FCS-ABMSE scheme meets both indistinguishability of ciphertext under the chosen keyword attacks(IND-CKA)and the indistinguishability of ciphertext under the chosen plaintext attacks(IND-CPA).In addition,we constructed an enhanced variant based on type-3 pairings.Results demonstrated that the proposed scheme outperforms existing ABSE approaches in terms of functionalities,computational cost,and communication cost.展开更多
The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous c...The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous computing networks.Finding an optimal computational resource for task offloading and then executing efficiently is a critical issue to achieve a trade-off between energy consumption and transmission delay.In this network,the task processed at fog nodes reduces transmission delay.Still,it increases energy consumption,while routing tasks to the cloud server saves energy at the cost of higher communication delay.Moreover,the order in which offloaded tasks are executed affects the system’s efficiency.For instance,executing lower-priority tasks before higher-priority jobs can disturb the reliability and stability of the system.Therefore,an efficient strategy of optimal computation offloading and task scheduling is required for operational efficacy.In this paper,we introduced a multi-objective and enhanced version of Cheeta Optimizer(CO),namely(MoECO),to jointly optimize the computation offloading and task scheduling in cloud-fog networks to minimize two competing objectives,i.e.,energy consumption and communication delay.MoECO first assigns tasks to the optimal computational nodes and then the allocated tasks are scheduled for processing based on the task priority.The mathematical modelling of CO needs improvement in computation time and convergence speed.Therefore,MoECO is proposed to increase the search capability of agents by controlling the search strategy based on a leader’s location.The adaptive step length operator is adjusted to diversify the solution and thus improves the exploration phase,i.e.,global search strategy.Consequently,this prevents the algorithm from getting trapped in the local optimal solution.Moreover,the interaction factor during the exploitation phase is also adjusted based on the location of the prey instead of the adjacent Cheetah.This increases the exploitation capability of agents,i.e.,local search capability.Furthermore,MoECO employs a multi-objective Pareto-optimal front to simultaneously minimize designated objectives.Comprehensive simulations in MATLAB demonstrate that the proposed algorithm obtains multiple solutions via a Pareto-optimal front and achieves an efficient trade-off between optimization objectives compared to baseline methods.展开更多
The Routing Protocol for Low-power and Lossy Networks(RPL)is widely used in Internet of Things(IoT)systems,where devices usually have very limited resources.However,RPL still faces several problems,such as high energy...The Routing Protocol for Low-power and Lossy Networks(RPL)is widely used in Internet of Things(IoT)systems,where devices usually have very limited resources.However,RPL still faces several problems,such as high energy usage,unstable links,and inefficient routing decisions,which reduce the overall network performance and lifetime.In this work,we introduce TABURPL,an improved routing method that applies Tabu Search(TS)to optimize the parent selection process.The method uses a combined cost function that considers Residual Energy,Transmission Energy,Distance to the Sink,Hop Count,Expected Transmission Count(ETX),and Link Stability Rate(LSR).Simulation results show that TABURPL improves link stability,lowers energy consumption,and increases the packet delivery ratio compared with standard RPL and other existing approaches.These results indicate that Tabu Search can handle the complex trade-offs in IoT routing and can provide a more reliable solution for extending the network lifetime.展开更多
Accurate prediction of environmental temperature is pivotal for promoting sustainable crop growth.At present,the most effective temperature sensing and prediction system is the Agricultural Internet of Things(AIoT),wh...Accurate prediction of environmental temperature is pivotal for promoting sustainable crop growth.At present,the most effective temperature sensing and prediction system is the Agricultural Internet of Things(AIoT),which deploys a large number of sensors to collect meteorological data and transmits them to the cloud server for prediction.However,this procedure is computationally and communicationally expensive for resourceconstrained AIoT.Recently,Semantic Communication(SC)has shown potential in efficient data transmission,but existing methods overlook the repetitive semantic information whilst sensing data,bringing additional overheads.With the resource-constraint nature of AIoT in mind,we propose the Semantic Communication-enabled Cognitive Agriculture Framework(SC-CAF)for delivering accurate temperature predictions.The proposed SC-CAF incorporates an intelligent analysis layer that performs the temperature prediction and model training and distribution,while a semantic layer transmitting the semantic information extracted from raw data based on the download model,ultimately to reduce communication overheads in AIoT.Furthermore,we propose a novel model called the Light Temperature Semantic Communication(LTSC)by adopting skip-attention and semantic compressor to avoid unnecessary computation and repetitive information,thereby addressing the semantic redundancy issues in sensing data.We also develop a Semantic-based Model Compression(SCMC)algorithm to alleviate the computation and bandwidth burden,enabling AIoT to explore the extensive usage of SC.Experimental results demonstrate that the proposed SC-CAF achieves the lowest prediction error while reducing Floating Point Operations(FLOPs)by 95.88%,memory requirements by 78.30%,Graphics Processing Unit(GPU)power by 50.77%,and time latency by 84.44%,outperforming notable state-of-the-art methods.展开更多
Owing to the development of communication technologies and control systems,the integration of numerous Internet of Things(IoT)nodes into the power grid has become increasingly prevalent.These nodes are deployed to gat...Owing to the development of communication technologies and control systems,the integration of numerous Internet of Things(IoT)nodes into the power grid has become increasingly prevalent.These nodes are deployed to gather operational data from various distributed energy sources and monitor real-time energy consumption,thereby transforming the traditional power grid into a smart grid(SG).However,the openness of wireless communication channels introduces vulnerabilities,as it allows potential eavesdroppers to intercept sensitive information.This poses threats to the secure and efficient operation of the IoT-driven smart grid.To address these challenges,we propose a novel scenario that incorporates an Unmanned Aerial Vehicle(UAV)as a relay gateway for multiple authorized smart meters.This scenario is further enhanced by the integration of Reconfigurable Intelligent Surface(RIS)technology,which dynamically adjusts the direction of information transmission.Our objective is to maximize the secure rate within this UAV-RIS-aided system with multiple authorized smart meters and an eavesdropper based on physical layer security(PLS)techniques.We formulate the problem of secure rate maximization by jointly optimizing the active beamforming of the UAV,the passive beamforming of the RIS,and the UAV’s trajectory.To solve this complex optimization problem,we introduce the Twin Soft Actor-Critic(TSAC)algorithm.This algorithm employs a dual-agent framework,where Agent 1 focuses on optimizing the beamforming for both the UAV and the RIS,while Agent 2 concurrently searches for the optimal trajectory of the UAV.Simulation results demonstrate the TSAC algorithm significantly enhances the secure rate of the system,achieving faster convergence and higher rewards under the worst communication conditions.The TSAC algorithm consistently outperforms the Twin Deep Deterministic Policy Gradient(TDDPG)and Twin Delayed Deep Deterministic Policy Gradient(TTD3)algorithms.Furthermore,the TSAC algorithm exhibits robust performance when the distribution of smart meters follows a Gaussian distribution,further validating its practical applicability and effectiveness in real-world scenarios.展开更多
Advanced technologies like Cyber-Physical Systems(CPS)and the Internet of Things(IoT)have supported modernizing and automating the transportation region through the introduction of Intelligent Transportation Systems(I...Advanced technologies like Cyber-Physical Systems(CPS)and the Internet of Things(IoT)have supported modernizing and automating the transportation region through the introduction of Intelligent Transportation Systems(ITS).Integrating CPS-ITS and IoT provides real-time Vehicle-to-Infrastructure(V2I)communication,supporting better traffic management,safety,and efficiency.These technological innovations generate complex problems that need to be addressed,uniquely about data routing and Task Scheduling(TS)in ITS.Attempts to solve those problems were primarily based on traditional and experimental methods,and the solutions were not so successful due to the dynamic nature of ITS.This is where the scope of Machine learning(ML)and Swarm Intelligence(SI)has significantly impacted dealing with these challenges;in this line,this research paper presents a novel method for TS and data routing in the CPS-ITS.This paper proposes using a cutting-edge ML algorithm for data transmission from CPS-ITS.This ML has Gated Linear Unit-approximated Reinforcement Learning(GLRL).Greedy Iterative-Particle Swarm Optimization(GI-PSO)has been recommended to develop the Particle Swarm Optimization(PSO)for TS.The primary objective of this study is to enhance the security and effectiveness of ITS systems that utilize CPS-ITS.This study trained and validated the models using a network simulation dataset of 50 nodes from numerous ITS environments.The experiments demonstrate that the proposed GLRL reduces End-toEnd Delay(EED)by 12%,enhances data size use from 83.6%to 88.6%,and achieves higher bandwidth allocation,particularly in high-demand scenarios such as multimedia data streams where adherence improved to 98.15%.Furthermore,the GLRL reduced Network Congestion(NC)by 5.5%,demonstrating its efficiency in managing complex traffic conditions across several environments.The model passed simulation tests in three different environments:urban(UE),suburban(SE),and rural(RE).It met the high bandwidth requirements,made task scheduling more efficient,and increased network throughput(NT).This proved that it was robust and flexible enough for scalable ITS applications.These innovations provide robust,scalable solutions for real-time traffic management,ultimately improving safety,reducing NC,and increasing overall NT.This study can affect ITS by developing it to be more responsive,safe,and effective and by creating a perfect method to set up UE,SE,and RE.展开更多
Research on tourism climate comfort is undergoing a paradigm shift from classic static assessment to intelligent dynamic sensing.Early models(such as temperature-humidity index and tourism climate index)established ba...Research on tourism climate comfort is undergoing a paradigm shift from classic static assessment to intelligent dynamic sensing.Early models(such as temperature-humidity index and tourism climate index)established based on data of meteorological stations laid the foundation for the discipline but were unable to meet the dynamic demands of climate change,spatial heterogeneity,and individual experience.Global climate change is reshaping the landscape of tourism comfort and driving the assessment to shift towards future risk prediction.Downscaling technology becomes the key to connecting global scenarios and local assessments.Remote sensing and Internet of Things technologies have constructed a"sky-ground"collaborative sensing network,achieving a revolution in data acquisition.Artificial intelligence and big data analysis serve as the intelligent core to drive research from description to prediction.The new paradigm has significant potential in improving assessment accuracy and timeliness,but also faces challenges such as data integration,model interpretability,interdisciplinary integration,and ethical privacy.In the future,it is needed to develop interpretable AI,construct climate digital twins,and promote full-chain coupling research.This transformation is not merely an upgrade of methods,but a fundamental shift in the study of philosophy from an"environment-centered"perspective to an"experience-centered"one,providing key scientific support for sustainable tourism.展开更多
Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from...Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy.This paper proposes an industrial Internet ofThings intrusion detection feature selection algorithm based on an improved whale optimization algorithm(GSLDWOA).The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to,such as local optimality,long detection time,and reduced accuracy.First,the initial population’s diversity is increased using the Gaussian Mutation mechanism.Then,Non-linear Shrinking Factor balances global exploration and local development,avoiding premature convergence.Lastly,Variable-step Levy Flight operator and Dynamic Differential Evolution strategy are introduced to improve the algorithm’s search efficiency and convergence accuracy in highdimensional feature space.Experiments on the NSL-KDD and WUSTL-IIoT-2021 datasets demonstrate that the feature subset selected by GSLDWOA significantly improves detection performance.Compared to the traditional WOA algorithm,the detection rate and F1-score increased by 3.68%and 4.12%.On the WUSTL-IIoT-2021 dataset,accuracy,recall,and F1-score all exceed 99.9%.展开更多
The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)...The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)is increasingly measured by technical performance,operational usability,and adaptability.This study introduces and rigorously evaluates a Human-Computer Interaction(HCI)-Integrated IDS with the utilization of Convolutional Neural Network(CNN),CNN-Long Short Term Memory(LSTM),and Random Forest(RF)against both a Baseline Machine Learning(ML)and a Traditional IDS model,through an extensive experimental framework encompassing many performance metrics,including detection latency,accuracy,alert prioritization,classification errors,system throughput,usability,ROC-AUC,precision-recall,confusion matrix analysis,and statistical accuracy measures.Our findings consistently demonstrate the superiority of the HCI-Integrated approach utilizing three major datasets(CICIDS 2017,KDD Cup 1999,and UNSW-NB15).Experimental results indicate that the HCI-Integrated model outperforms its counterparts,achieving an AUC-ROC of 0.99,a precision of 0.93,and a recall of 0.96,while maintaining the lowest false positive rate(0.03)and the fastest detection time(~1.5 s).These findings validate the efficacy of incorporating HCI to enhance anomaly detection capabilities,improve responsiveness,and reduce alert fatigue in critical smart city applications.It achieves markedly lower detection times,higher accuracy across all threat categories,reduced false positive and false negative rates,and enhanced system throughput under concurrent load conditions.The HCIIntegrated IDS excels in alert contextualization and prioritization,offering more actionable insights while minimizing analyst fatigue.Usability feedback underscores increased analyst confidence and operational clarity,reinforcing the importance of user-centered design.These results collectively position the HCI-Integrated IDS as a highly effective,scalable,and human-aligned solution for modern threat detection environments.展开更多
As attack techniques evolve and data volumes increase,the integration of artificial intelligence-based security solutions into industrial control systems has become increasingly essential.Artificial intelligence holds...As attack techniques evolve and data volumes increase,the integration of artificial intelligence-based security solutions into industrial control systems has become increasingly essential.Artificial intelligence holds significant potential to improve the operational efficiency and cybersecurity of these systems.However,its dependence on cyber-based infrastructures expands the attack surface and introduces the risk that adversarial manipulations of artificial intelligence models may cause physical harm.To address these concerns,this study presents a comprehensive review of artificial intelligence-driven threat detection methods and adversarial attacks targeting artificial intelligence within industrial control environments,examining both their benefits and associated risks.A systematic literature review was conducted across major scientific databases,including IEEE,Elsevier,Springer Nature,ACM,MDPI,and Wiley,covering peer-reviewed journal and conference papers published between 2017 and 2026.Studies were selected based on predefined inclusion and exclusion criteria following a structured screening process.Based on an analysis of 101 selected studies,this survey categorizes artificial intelligence-based threat detection approaches across the physical,control,and application layers of industrial control systems and examines poisoning,evasion,and extraction attacks targeting industrial artificial intelligence.The findings identify key research trends,highlight unresolved security challenges,and discuss implications for the secure deployment of artificial intelligence-enabled cybersecurity solutions in industrial control systems.展开更多
Deploying Large LanguageModel(LLM)-based agents in the Industrial Internet ofThings(IIoT)presents significant challenges,including high latency from cloud-based APIs,data privacy concerns,and the infeasibility of depl...Deploying Large LanguageModel(LLM)-based agents in the Industrial Internet ofThings(IIoT)presents significant challenges,including high latency from cloud-based APIs,data privacy concerns,and the infeasibility of deploying monolithic models on resource-constrained edge devices.While smaller models(SLMs)are suitable for edge deployment,they often lack the reasoning power for complex,multi-step tasks.To address these issues,this paper introduces LEAF,a Lightweight Edge Agent Framework designed for efficiently executing complex tasks at the edge.LEAF employs a novel architecture where multiple expert SLMs—specialized for planning,execution,and interaction—work in concert,decomposing complex problems into manageable sub-tasks.To mitigate the resource overhead of this multi-model approach,LEAF implements an efficient parameter-sharing scheme based on Scalable Low-Rank Adaptation(S-LoRA).We introduce a two-stage training strategy combining Supervised Fine-Tuning(SFT)and Group Relative Policy Optimization(GRPO)to significantly enhance each expert’s capabilities.Furthermore,a Finite StateMachine(FSM)-based decision engine orchestrates the workflow,uniquely balancing deterministic control with intelligent flexibility,making it ideal for industrial environments that demand both reliability and adaptability.Experiments across diverse IIoT scenarios demonstrate that LEAF significantly outperforms baseline methods in both task success rate and user satisfaction.Notably,our fine-tuned 4-billion-parameter model achieves a task success rate over 90%in complex IIoT scenarios,demonstrating LEAF’s ability to deliver powerful and efficient autonomy at the industrial edge.展开更多
TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,th...TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping,data tampering,and device impersonation.While digital signatures are indispensable for ensuring authenticity and non-repudiation,conventional schemes such as RSA and ECCare vulnerable to quantumalgorithms,jeopardizing long-termtrust in IIoT deployments.This study proposes a lightweight,stateless,hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT.The design introduces two key optimizations:(1)Forest ofRandomSubsets(FORS)onDemand,where subset secret keys are generated dynamically via a PseudoRandom Function(PRF),thereby minimizing storage overhead and eliminating key-reuse risks;and(2)Winternitz One-Time Signature Plus(WOTS+)partial hash-chain caching,which precomputes intermediate hash values at edge gateways,reducing device-side computations,latency,and energy consumption.The architecture integrates a multi-layerMerkle authentication tree(Merkle tree)and role-based delegation across sensors,gateways,and a Signature Authority Center(SAC),supporting scalable cross-site deployment and key rotation.Froma theoretical perspective,we establish a formal(Existential Unforgeability under Chosen Message Attack)EUF-CMA security proof using a game-based reduction framework.The proof demonstrates that any successful forgerymust reduce to breaking the underlying assumptions of PRF indistinguishability,(second)preimage resistance,or collision resistance,thus quantifying adversarial advantage and ensuring unforgeability.On the implementation side,our design achieves a balanced trade-off between postquantum security and lightweight performance,offering concrete deployment guidelines for real-time industrial systems.In summary,the proposed method contributes both practical system design and formal security guarantees,providing IIoT with a deployable signature substrate that enhances resilience against quantum-era threats and supports future extensions such as device attestation,group signatures,and anomaly detection.展开更多
With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT termi...With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space.展开更多
基金supported by the Deanship of Graduate Studies and Scientific Research at Jouf University.
文摘Due to the growth of smart cities,many real-time systems have been developed to support smart cities using Internet of Things(IoT)and emerging technologies.They are formulated to collect the data for environment monitoring and automate the communication process.In recent decades,researchers have made many efforts to propose autonomous systems for manipulating network data and providing on-time responses in critical operations.However,the widespread use of IoT devices in resource-constrained applications and mobile sensor networks introduces significant research challenges for cybersecurity.These systems are vulnerable to a variety of cyberattacks,including unauthorized access,denial-of-service attacks,and data leakage,which compromise the network’s security.Additionally,uneven load balancing between mobile IoT devices,which frequently experience link interferences,compromises the trustworthiness of the system.This paper introduces a Multi-Agent secured framework using lightweight edge computing to enhance cybersecurity for sensor networks,aiming to leverage artificial intelligence for adaptive routing and multi-metric trust evaluation to achieve data privacy and mitigate potential threats.Moreover,it enhances the efficiency of distributed sensors for energy consumption through intelligent data analytics techniques,resulting in highly consistent and low-latency network communication.Using simulations,the proposed framework reveals its significant performance compared to state-of-the-art approaches for energy consumption by 43%,latency by 46%,network throughput by 51%,packet loss rate by 40%,and denial of service attacks by 42%.
文摘The Internet ofThings(IoT)is a new model that evolved with the rapid progress of advanced technology and gained tremendous popularity due to its applications.Anomaly detection haswidely attracted researchers’attention in the last few years,and its effects on diverse applications.This review article covers the various methods and tools developed to perform the task efficiently and automatically in a smart city.In this work,we present a comprehensive literature review(2011 onwards)of three major types of anomalies:network anomalies,sensor anomalies,and videobased anomalies,along with their methods and software tools.Furthermore,anomaly detection methods such as machine learning and deep learning are presented in this work,highlighting their detection strategy techniques,features,applications,issues,and challenges.Moreover,a generic algorithmis also developed to ease the user achieve the taskmore specifically by targeting a specific domain aswell as approach.Comparative studies of three anomalymethods and their analysis identify research discovery areas with their applications.As a result,researchers and practitioners can familiarize themselves with the existing methods for solving real problems,improving methods,and developing new optimum methods for anomaly detection in diverse applications.
文摘The Internet of Things(IoT)ecosystem is inherently heterogeneous,comprising diverse devices that must interoperate seamlessly to enable federated message and data exchange.However,as the number of service requests grows,existing approaches suffer from increased discovery time and degraded Quality of Service(QoS).Moreover,the massive data generated by heterogeneous IoT devices often contain redundancy and noise,posing challenges to efficient data management.To address these issues,this paper proposes a lightweight ontology-based architecture that enhances service discovery and QoS-aware semantic data management.The architecture employs Modified-Ordered Points to Identify theClustering Structure(M-OPTICS)to cluster and eliminate redundant IoT data.The clustered data are then modelled into a lightweight ontology,enabling semantic relationship inference and rule generation through an embedded inference engine.User requests,transmitted via theConstrainedApplication Protocol(CoAP),are semantically enriched and matched to QoS parameters using Dynamic Shannon Entropy optimized with the Salp Swarm Algorithm.Semantic matching is further refined using a bidirectional recurrent neural network(Bi-RNN),while a State–Action–Reward–State–Action(SARSA)reinforcement learning model dynamically defines and updates semantic rules to retrieve themost recent and relevant data across heterogeneous devices.Experimental results demonstrate that the proposed architecture outperforms existing methods in terms of response time,service delay,execution time,precision,recall,and F-score under varying CoAP request loads and communication overheads.The results confirm the effectiveness of the proposed lightweight ontology architecture for service discovery and data management in heterogeneous IoT environments.
文摘Recently,the Internet of Things(IoT)technology has been utilized in a wide range of services and applications which significantly transforms digital ecosystems through seamless interconnectivity between various smart devices.Furthermore,the IoT plays a key role in multiple domains,including industrial automation,smart homes,and intelligent transportation systems.However,an increasing number of connected devices presents significant challenges related to efficient resource allocation and system responsiveness.To address these issue,this research proposes a Modified Walrus Optimization Algorithm(MWaOA)for effective resource management in smart IoT systems.In the proposed MWaOA,a crowding process is incorporated to maintain diversity and avoid premature convergence thereby enhancing the global search capability.During resource allocation,the MWaOA prevents early convergence,which aids in achieving a better balance between the exploration and exploitation phases during optimization.Empirical evaluations show that the MWaOA reduces energy consumption by approximately 4% to 34%and minimizes the response time by 6% to 33% across different service arrival rates.Compared to traditional optimization algorithms,MWaOA reduces energy consumption by 5% to 30%and minimizes the response time by 4% to 28% across different simulation epochs.The proposed MWaOA provides adaptive and robust resource allocation,thereby minimizing transmission cost while considering network constraints and real-time performance parameters.
基金co-funded by the European Union under the REFRESH-Research Excellence For REgion Sustainability and High-tech Industries project number CZ.10.03.01/00/22_003/0000048 via the Operational Programme Just Transitionsupported by the Ministry of Education,Youth and Sports of the Czech Republic conducted by VSB-Technical University of Ostrava,Czechia,under Grants SP2025/021 and SP2025/039。
文摘Practical applications of smart cities and the Internet of Things(IoT)have multiplied,posing many difficulties in network performance,dependability,and security.Concerns of accessibility,reliability,sustainability,and security too have arisen correspondingly because of the decentralized character of the smart city and IoT systems.Fog computing offers a foundation for various applications,including cognitive support,health and social services,intelligent transportation systems,and pervasive computing and communications.Fog computing can help enhance these apps'productivity and lower the end-to-end delay experienced by such time-sensitive applications.In this research,we propose a reliable and secure service delivery strategy at the network edge for smart cities.To improve the availability and dependability,along with the security of smart city applications,the approach employs a combined method uniting distributed fog servers in addition to mist servers with the help of an intrusion detection system.Simulation findings suggest a reduction of 40.3%in the delay incurred by each service request for highly dense areas and 60.6%for moderately dense environments.Furthermore,the system has low false-negative rates and high detection and accuracy rates,decreasing service requests 2%.
文摘With the proliferation of Internet of Things(IoT)devices,securing these interconnected systems against cyberattacks has become a critical challenge.Traditional security paradigms often fail to cope with the scale and diversity of IoT network traffic.This paper presents a comparative benchmark of classic machine learning(ML)and state-of-the-art deep learning(DL)algorithms for IoT intrusion detection.Our methodology employs a twophased approach:a preliminary pilot study using a custom-generated dataset to establish baselines,followed by a comprehensive evaluation on the large-scale CICIoTDataset2023.We benchmarked algorithms including Random Forest,XGBoost,CNN,and StackedLSTM.The results indicate that while top-performingmodels frombothcategories achieve over 99%classification accuracy,this metric masks a crucial performance trade-off.We demonstrate that treebased ML ensembles exhibit superior precision(91%)in identifying benign traffic,making them effective at reducing false positives.Conversely,DL models demonstrate superior recall(96%),making them better suited for minimizing the interruption of legitimate traffic.We conclude that the selection of an optimal model is not merely a matter of maximizing accuracy but is a strategic choice dependent on the specific security priority either minimizing false alarms or ensuring service availability.Thiswork provides a practical framework for deploying context-aware security solutions in diverse IoT environments.
文摘Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudassisted architecture faces two critical challenges:the untrusted cloud services and the separation of data ownership from control.Although Attribute-based Searchable Encryption(ABSE)provides fine-grained access control and keyword search over encrypted data,existing schemes lack of error tolerance in exact multi-keyword matching.In this paper,we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search(FCS-ABMSE)scheme that avoids computationally expensive bilinear pairing operations on the IoT device side.The scheme supportsmulti-keyword fuzzy search without requiring explicit keyword fields,thereby significantly enhancing error tolerance in search operations.It further incorporates forward-secure ciphertext search to mitigate trapdoor abuse,as well as offline encryption and verifiable outsourced decryption to minimize user-side computational costs.Formal security analysis proved that the FCS-ABMSE scheme meets both indistinguishability of ciphertext under the chosen keyword attacks(IND-CKA)and the indistinguishability of ciphertext under the chosen plaintext attacks(IND-CPA).In addition,we constructed an enhanced variant based on type-3 pairings.Results demonstrated that the proposed scheme outperforms existing ABSE approaches in terms of functionalities,computational cost,and communication cost.
基金appreciation to the Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2025R384)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous computing networks.Finding an optimal computational resource for task offloading and then executing efficiently is a critical issue to achieve a trade-off between energy consumption and transmission delay.In this network,the task processed at fog nodes reduces transmission delay.Still,it increases energy consumption,while routing tasks to the cloud server saves energy at the cost of higher communication delay.Moreover,the order in which offloaded tasks are executed affects the system’s efficiency.For instance,executing lower-priority tasks before higher-priority jobs can disturb the reliability and stability of the system.Therefore,an efficient strategy of optimal computation offloading and task scheduling is required for operational efficacy.In this paper,we introduced a multi-objective and enhanced version of Cheeta Optimizer(CO),namely(MoECO),to jointly optimize the computation offloading and task scheduling in cloud-fog networks to minimize two competing objectives,i.e.,energy consumption and communication delay.MoECO first assigns tasks to the optimal computational nodes and then the allocated tasks are scheduled for processing based on the task priority.The mathematical modelling of CO needs improvement in computation time and convergence speed.Therefore,MoECO is proposed to increase the search capability of agents by controlling the search strategy based on a leader’s location.The adaptive step length operator is adjusted to diversify the solution and thus improves the exploration phase,i.e.,global search strategy.Consequently,this prevents the algorithm from getting trapped in the local optimal solution.Moreover,the interaction factor during the exploitation phase is also adjusted based on the location of the prey instead of the adjacent Cheetah.This increases the exploitation capability of agents,i.e.,local search capability.Furthermore,MoECO employs a multi-objective Pareto-optimal front to simultaneously minimize designated objectives.Comprehensive simulations in MATLAB demonstrate that the proposed algorithm obtains multiple solutions via a Pareto-optimal front and achieves an efficient trade-off between optimization objectives compared to baseline methods.
文摘The Routing Protocol for Low-power and Lossy Networks(RPL)is widely used in Internet of Things(IoT)systems,where devices usually have very limited resources.However,RPL still faces several problems,such as high energy usage,unstable links,and inefficient routing decisions,which reduce the overall network performance and lifetime.In this work,we introduce TABURPL,an improved routing method that applies Tabu Search(TS)to optimize the parent selection process.The method uses a combined cost function that considers Residual Energy,Transmission Energy,Distance to the Sink,Hop Count,Expected Transmission Count(ETX),and Link Stability Rate(LSR).Simulation results show that TABURPL improves link stability,lowers energy consumption,and increases the packet delivery ratio compared with standard RPL and other existing approaches.These results indicate that Tabu Search can handle the complex trade-offs in IoT routing and can provide a more reliable solution for extending the network lifetime.
基金supported by the Key Research and Development Project of Hubei Province(No.2024BAB070),China。
文摘Accurate prediction of environmental temperature is pivotal for promoting sustainable crop growth.At present,the most effective temperature sensing and prediction system is the Agricultural Internet of Things(AIoT),which deploys a large number of sensors to collect meteorological data and transmits them to the cloud server for prediction.However,this procedure is computationally and communicationally expensive for resourceconstrained AIoT.Recently,Semantic Communication(SC)has shown potential in efficient data transmission,but existing methods overlook the repetitive semantic information whilst sensing data,bringing additional overheads.With the resource-constraint nature of AIoT in mind,we propose the Semantic Communication-enabled Cognitive Agriculture Framework(SC-CAF)for delivering accurate temperature predictions.The proposed SC-CAF incorporates an intelligent analysis layer that performs the temperature prediction and model training and distribution,while a semantic layer transmitting the semantic information extracted from raw data based on the download model,ultimately to reduce communication overheads in AIoT.Furthermore,we propose a novel model called the Light Temperature Semantic Communication(LTSC)by adopting skip-attention and semantic compressor to avoid unnecessary computation and repetitive information,thereby addressing the semantic redundancy issues in sensing data.We also develop a Semantic-based Model Compression(SCMC)algorithm to alleviate the computation and bandwidth burden,enabling AIoT to explore the extensive usage of SC.Experimental results demonstrate that the proposed SC-CAF achieves the lowest prediction error while reducing Floating Point Operations(FLOPs)by 95.88%,memory requirements by 78.30%,Graphics Processing Unit(GPU)power by 50.77%,and time latency by 84.44%,outperforming notable state-of-the-art methods.
基金supported by State Grid Shanxi Electric Power Company’s Science and Technology Projects(No.52051C230102).
文摘Owing to the development of communication technologies and control systems,the integration of numerous Internet of Things(IoT)nodes into the power grid has become increasingly prevalent.These nodes are deployed to gather operational data from various distributed energy sources and monitor real-time energy consumption,thereby transforming the traditional power grid into a smart grid(SG).However,the openness of wireless communication channels introduces vulnerabilities,as it allows potential eavesdroppers to intercept sensitive information.This poses threats to the secure and efficient operation of the IoT-driven smart grid.To address these challenges,we propose a novel scenario that incorporates an Unmanned Aerial Vehicle(UAV)as a relay gateway for multiple authorized smart meters.This scenario is further enhanced by the integration of Reconfigurable Intelligent Surface(RIS)technology,which dynamically adjusts the direction of information transmission.Our objective is to maximize the secure rate within this UAV-RIS-aided system with multiple authorized smart meters and an eavesdropper based on physical layer security(PLS)techniques.We formulate the problem of secure rate maximization by jointly optimizing the active beamforming of the UAV,the passive beamforming of the RIS,and the UAV’s trajectory.To solve this complex optimization problem,we introduce the Twin Soft Actor-Critic(TSAC)algorithm.This algorithm employs a dual-agent framework,where Agent 1 focuses on optimizing the beamforming for both the UAV and the RIS,while Agent 2 concurrently searches for the optimal trajectory of the UAV.Simulation results demonstrate the TSAC algorithm significantly enhances the secure rate of the system,achieving faster convergence and higher rewards under the worst communication conditions.The TSAC algorithm consistently outperforms the Twin Deep Deterministic Policy Gradient(TDDPG)and Twin Delayed Deep Deterministic Policy Gradient(TTD3)algorithms.Furthermore,the TSAC algorithm exhibits robust performance when the distribution of smart meters follows a Gaussian distribution,further validating its practical applicability and effectiveness in real-world scenarios.
基金funded by Taif University,Taif,Saudi Arabia,project number(TU-DSPP-2024-17)。
文摘Advanced technologies like Cyber-Physical Systems(CPS)and the Internet of Things(IoT)have supported modernizing and automating the transportation region through the introduction of Intelligent Transportation Systems(ITS).Integrating CPS-ITS and IoT provides real-time Vehicle-to-Infrastructure(V2I)communication,supporting better traffic management,safety,and efficiency.These technological innovations generate complex problems that need to be addressed,uniquely about data routing and Task Scheduling(TS)in ITS.Attempts to solve those problems were primarily based on traditional and experimental methods,and the solutions were not so successful due to the dynamic nature of ITS.This is where the scope of Machine learning(ML)and Swarm Intelligence(SI)has significantly impacted dealing with these challenges;in this line,this research paper presents a novel method for TS and data routing in the CPS-ITS.This paper proposes using a cutting-edge ML algorithm for data transmission from CPS-ITS.This ML has Gated Linear Unit-approximated Reinforcement Learning(GLRL).Greedy Iterative-Particle Swarm Optimization(GI-PSO)has been recommended to develop the Particle Swarm Optimization(PSO)for TS.The primary objective of this study is to enhance the security and effectiveness of ITS systems that utilize CPS-ITS.This study trained and validated the models using a network simulation dataset of 50 nodes from numerous ITS environments.The experiments demonstrate that the proposed GLRL reduces End-toEnd Delay(EED)by 12%,enhances data size use from 83.6%to 88.6%,and achieves higher bandwidth allocation,particularly in high-demand scenarios such as multimedia data streams where adherence improved to 98.15%.Furthermore,the GLRL reduced Network Congestion(NC)by 5.5%,demonstrating its efficiency in managing complex traffic conditions across several environments.The model passed simulation tests in three different environments:urban(UE),suburban(SE),and rural(RE).It met the high bandwidth requirements,made task scheduling more efficient,and increased network throughput(NT).This proved that it was robust and flexible enough for scalable ITS applications.These innovations provide robust,scalable solutions for real-time traffic management,ultimately improving safety,reducing NC,and increasing overall NT.This study can affect ITS by developing it to be more responsive,safe,and effective and by creating a perfect method to set up UE,SE,and RE.
基金Supported by the School-level Project of Sichuan Minzu College(XYZB2017ZB).
文摘Research on tourism climate comfort is undergoing a paradigm shift from classic static assessment to intelligent dynamic sensing.Early models(such as temperature-humidity index and tourism climate index)established based on data of meteorological stations laid the foundation for the discipline but were unable to meet the dynamic demands of climate change,spatial heterogeneity,and individual experience.Global climate change is reshaping the landscape of tourism comfort and driving the assessment to shift towards future risk prediction.Downscaling technology becomes the key to connecting global scenarios and local assessments.Remote sensing and Internet of Things technologies have constructed a"sky-ground"collaborative sensing network,achieving a revolution in data acquisition.Artificial intelligence and big data analysis serve as the intelligent core to drive research from description to prediction.The new paradigm has significant potential in improving assessment accuracy and timeliness,but also faces challenges such as data integration,model interpretability,interdisciplinary integration,and ethical privacy.In the future,it is needed to develop interpretable AI,construct climate digital twins,and promote full-chain coupling research.This transformation is not merely an upgrade of methods,but a fundamental shift in the study of philosophy from an"environment-centered"perspective to an"experience-centered"one,providing key scientific support for sustainable tourism.
基金supported by the Major Science and Technology Programs in Henan Province(No.241100210100)Henan Provincial Science and Technology Research Project(No.252102211085,No.252102211105)+3 种基金Endogenous Security Cloud Network Convergence R&D Center(No.602431011PQ1)The Special Project for Research and Development in Key Areas of Guangdong Province(No.2021ZDZX1098)The Stabilization Support Program of Science,Technology and Innovation Commission of Shenzhen Municipality(No.20231128083944001)The Key scientific research projects of Henan higher education institutions(No.24A520042).
文摘Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity.These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy.This paper proposes an industrial Internet ofThings intrusion detection feature selection algorithm based on an improved whale optimization algorithm(GSLDWOA).The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to,such as local optimality,long detection time,and reduced accuracy.First,the initial population’s diversity is increased using the Gaussian Mutation mechanism.Then,Non-linear Shrinking Factor balances global exploration and local development,avoiding premature convergence.Lastly,Variable-step Levy Flight operator and Dynamic Differential Evolution strategy are introduced to improve the algorithm’s search efficiency and convergence accuracy in highdimensional feature space.Experiments on the NSL-KDD and WUSTL-IIoT-2021 datasets demonstrate that the feature subset selected by GSLDWOA significantly improves detection performance.Compared to the traditional WOA algorithm,the detection rate and F1-score increased by 3.68%and 4.12%.On the WUSTL-IIoT-2021 dataset,accuracy,recall,and F1-score all exceed 99.9%.
基金funded and supported by the Ongoing Research Funding program(ORF-2025-314),King Saud University,Riyadh,Saudi Arabia.
文摘The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)is increasingly measured by technical performance,operational usability,and adaptability.This study introduces and rigorously evaluates a Human-Computer Interaction(HCI)-Integrated IDS with the utilization of Convolutional Neural Network(CNN),CNN-Long Short Term Memory(LSTM),and Random Forest(RF)against both a Baseline Machine Learning(ML)and a Traditional IDS model,through an extensive experimental framework encompassing many performance metrics,including detection latency,accuracy,alert prioritization,classification errors,system throughput,usability,ROC-AUC,precision-recall,confusion matrix analysis,and statistical accuracy measures.Our findings consistently demonstrate the superiority of the HCI-Integrated approach utilizing three major datasets(CICIDS 2017,KDD Cup 1999,and UNSW-NB15).Experimental results indicate that the HCI-Integrated model outperforms its counterparts,achieving an AUC-ROC of 0.99,a precision of 0.93,and a recall of 0.96,while maintaining the lowest false positive rate(0.03)and the fastest detection time(~1.5 s).These findings validate the efficacy of incorporating HCI to enhance anomaly detection capabilities,improve responsiveness,and reduce alert fatigue in critical smart city applications.It achieves markedly lower detection times,higher accuracy across all threat categories,reduced false positive and false negative rates,and enhanced system throughput under concurrent load conditions.The HCIIntegrated IDS excels in alert contextualization and prioritization,offering more actionable insights while minimizing analyst fatigue.Usability feedback underscores increased analyst confidence and operational clarity,reinforcing the importance of user-centered design.These results collectively position the HCI-Integrated IDS as a highly effective,scalable,and human-aligned solution for modern threat detection environments.
基金supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(RS-2023-00242528,50%)supported by the Korea Internet&Security Agency(KISA)through the Information Security Specialized University Support Project(50%).
文摘As attack techniques evolve and data volumes increase,the integration of artificial intelligence-based security solutions into industrial control systems has become increasingly essential.Artificial intelligence holds significant potential to improve the operational efficiency and cybersecurity of these systems.However,its dependence on cyber-based infrastructures expands the attack surface and introduces the risk that adversarial manipulations of artificial intelligence models may cause physical harm.To address these concerns,this study presents a comprehensive review of artificial intelligence-driven threat detection methods and adversarial attacks targeting artificial intelligence within industrial control environments,examining both their benefits and associated risks.A systematic literature review was conducted across major scientific databases,including IEEE,Elsevier,Springer Nature,ACM,MDPI,and Wiley,covering peer-reviewed journal and conference papers published between 2017 and 2026.Studies were selected based on predefined inclusion and exclusion criteria following a structured screening process.Based on an analysis of 101 selected studies,this survey categorizes artificial intelligence-based threat detection approaches across the physical,control,and application layers of industrial control systems and examines poisoning,evasion,and extraction attacks targeting industrial artificial intelligence.The findings identify key research trends,highlight unresolved security challenges,and discuss implications for the secure deployment of artificial intelligence-enabled cybersecurity solutions in industrial control systems.
文摘Deploying Large LanguageModel(LLM)-based agents in the Industrial Internet ofThings(IIoT)presents significant challenges,including high latency from cloud-based APIs,data privacy concerns,and the infeasibility of deploying monolithic models on resource-constrained edge devices.While smaller models(SLMs)are suitable for edge deployment,they often lack the reasoning power for complex,multi-step tasks.To address these issues,this paper introduces LEAF,a Lightweight Edge Agent Framework designed for efficiently executing complex tasks at the edge.LEAF employs a novel architecture where multiple expert SLMs—specialized for planning,execution,and interaction—work in concert,decomposing complex problems into manageable sub-tasks.To mitigate the resource overhead of this multi-model approach,LEAF implements an efficient parameter-sharing scheme based on Scalable Low-Rank Adaptation(S-LoRA).We introduce a two-stage training strategy combining Supervised Fine-Tuning(SFT)and Group Relative Policy Optimization(GRPO)to significantly enhance each expert’s capabilities.Furthermore,a Finite StateMachine(FSM)-based decision engine orchestrates the workflow,uniquely balancing deterministic control with intelligent flexibility,making it ideal for industrial environments that demand both reliability and adaptability.Experiments across diverse IIoT scenarios demonstrate that LEAF significantly outperforms baseline methods in both task success rate and user satisfaction.Notably,our fine-tuned 4-billion-parameter model achieves a task success rate over 90%in complex IIoT scenarios,demonstrating LEAF’s ability to deliver powerful and efficient autonomy at the industrial edge.
文摘TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping,data tampering,and device impersonation.While digital signatures are indispensable for ensuring authenticity and non-repudiation,conventional schemes such as RSA and ECCare vulnerable to quantumalgorithms,jeopardizing long-termtrust in IIoT deployments.This study proposes a lightweight,stateless,hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT.The design introduces two key optimizations:(1)Forest ofRandomSubsets(FORS)onDemand,where subset secret keys are generated dynamically via a PseudoRandom Function(PRF),thereby minimizing storage overhead and eliminating key-reuse risks;and(2)Winternitz One-Time Signature Plus(WOTS+)partial hash-chain caching,which precomputes intermediate hash values at edge gateways,reducing device-side computations,latency,and energy consumption.The architecture integrates a multi-layerMerkle authentication tree(Merkle tree)and role-based delegation across sensors,gateways,and a Signature Authority Center(SAC),supporting scalable cross-site deployment and key rotation.Froma theoretical perspective,we establish a formal(Existential Unforgeability under Chosen Message Attack)EUF-CMA security proof using a game-based reduction framework.The proof demonstrates that any successful forgerymust reduce to breaking the underlying assumptions of PRF indistinguishability,(second)preimage resistance,or collision resistance,thus quantifying adversarial advantage and ensuring unforgeability.On the implementation side,our design achieves a balanced trade-off between postquantum security and lightweight performance,offering concrete deployment guidelines for real-time industrial systems.In summary,the proposed method contributes both practical system design and formal security guarantees,providing IIoT with a deployable signature substrate that enhances resilience against quantum-era threats and supports future extensions such as device attestation,group signatures,and anomaly detection.
基金supported by National Key R&D Program of China(No.2022YFB3105101).
文摘With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space.