期刊文献+
共找到93篇文章
< 1 2 5 >
每页显示 20 50 100
IIoT环境下基于蜣螂优化的雾工作流调度算法 被引量:1
1
作者 吴宏伟 江凌云 《计算机工程与应用》 北大核心 2025年第10期341-349,共9页
为了解决在工业物联网(industrial Internet of things,IIoT)环境下,现有的调度算法在调度工作流中对数据安全、响应时间有一定要求的任务所带来的完工时间上升、成本增加的问题,提出一种基于雾环境负载率而变化的任务调度策略,并使用... 为了解决在工业物联网(industrial Internet of things,IIoT)环境下,现有的调度算法在调度工作流中对数据安全、响应时间有一定要求的任务所带来的完工时间上升、成本增加的问题,提出一种基于雾环境负载率而变化的任务调度策略,并使用改进的蜣螂优化算法对工作流调度问题进行求解。改进的算法使用HEFT(heterogeneous earliest finish time)算法对蜣螂种群进行初始化,降低了原始算法中随机性带来的影响。同时引入了镜面反射和反向学习思想,提高了算法的搜索性能。实验结果表明,该算法相比于其他一些传统的调度算法在完工时间与成本方面都有一定的性能提升。 展开更多
关键词 工作流调度 蜣螂优化算法 HEFT算法 反向学习 调度算法 雾计算 工业物联网(iiot)
在线阅读 下载PDF
IIoT环境下基于聚类的工作流多雾协同调度算法 被引量:2
2
作者 吴宏伟 江凌云 陈海峰 《计算机工程与设计》 北大核心 2025年第1期52-59,共8页
为解决在IIoT(industrial internet of things)环境下,现有的调度算法调度工作流中通信频繁、数据传输量大的任务所带来的完工时间上升、成本增加等影响的问题,提出一种基于聚类的工作流多雾协同调度算法。通过二分K均值算法对工作流中... 为解决在IIoT(industrial internet of things)环境下,现有的调度算法调度工作流中通信频繁、数据传输量大的任务所带来的完工时间上升、成本增加等影响的问题,提出一种基于聚类的工作流多雾协同调度算法。通过二分K均值算法对工作流中的任务进行聚类,基于聚类结果,在多个雾服务器之间使用改进的免疫粒子群优化算法进行任务调度。实验结果表明,该算法相比其它一些传统的调度算法在完工时间、成本、负载均衡方面都有一定提升。 展开更多
关键词 工业物联网 聚类 工作流 二分K均值算法 多雾 免疫粒子群优化算法 调度算法
在线阅读 下载PDF
Unveiling CyberFortis:A Unified Security Framework for IIoT-SCADA Systems with SiamDQN-AE FusionNet and PopHydra Optimizer
3
作者 Kuncham Sreenivasa Rao Rajitha Kotoju +4 位作者 B.Ramana Reddy Taher Al-Shehari Nasser A.Alsadhan Subhav Singh Shitharth Selvarajan 《Computers, Materials & Continua》 2025年第10期1899-1916,共18页
Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cybe... Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things(SCADA-IIoT)systems against intruders has become essential since industrial control systems now oversee critical infrastructure,and cyber attackers more frequently target these systems.Due to their connection of physical assets with digital networks,SCADA-IIoT systems face substantial risks from multiple attack types,including Distributed Denial of Service(DDoS),spoofing,and more advanced intrusion methods.Previous research in this field faces challenges due to insufficient solutions,as current intrusion detection systems lack the necessary accuracy,scalability,and adaptability needed for IIoT environments.This paper introduces CyberFortis,a novel cybersecurity framework aimed at detecting and preventing cyber threats in SCADA-IIoT systems.CyberFortis presents two key innovations:Firstly,Siamese Double Deep Q-Network with Autoencoders(Siamdqn-AE)FusionNet,which enhances intrusion detection by combining deep Q-Networks with autoencoders for improved attack detection and feature extraction;and secondly,the PopHydra Optimiser,an innovative solution to compute reinforcement learning discount factors for better model performance and convergence.This method combines Siamese deep Q-Networks with autoencoders to create a system that can detect different types of attacks more effectively and adapt to new challenges.CyberFortis is better than current top attack detection systems,showing higher scores in important areas like accuracy,precision,recall,and F1-score,based on data from CICIoT 2023,UNSW-NB 15,and WUSTL-IIoT datasets.Results from the proposed framework show a 97.5%accuracy rate,indicating its potential as an effective solution for SCADA-IIoT cybersecurity against emerging threats.The research confirms that the proposed security and resilience methods are successful in protecting vital industrial control systems within their operational environments. 展开更多
关键词 Industrial Internet of things(iiot) SCADA systems SECURITY intrusion detection system(IDS) optimization deep learning
在线阅读 下载PDF
Domain⁃Level Anonymous Cross⁃Domain Authentication Scheme for IIoT Based on Blockchain
4
作者 LIANG Yufeng SUN Lu 《Transactions of Nanjing University of Aeronautics and Astronautics》 2025年第S1期180-194,共15页
The rapid development of the industrial internet of things(IIoT)has brought huge benefits to factories equipped with IIoT technology,each of which represents an IIoT domain.More and more domains are choosing to cooper... The rapid development of the industrial internet of things(IIoT)has brought huge benefits to factories equipped with IIoT technology,each of which represents an IIoT domain.More and more domains are choosing to cooperate with each other to produce better products for greater profits.Therefore,in order to protect the security and privacy of IIoT devices in cross-domain communication,lots of cross-domain authentication schemes have been proposed.However,most schemes expose the domain to which the IIoT device belongs,or introduce a single point of failure in multi-domain cooperation,thus introducing unpredictable risks to each domain.We propose a more secure and efficient domain-level anonymous cross-domain authentication(DLCA)scheme based on alliance blockchain.The proposed scheme uses group signatures with decentralized tracing technology to provide domain-level anonymity to each IIoT device and allow the public to trace the real identity of the malicious pseudonym.In addition,DLCA takes into account the limited resource characteristics of IIoT devices to design an efficient cross-domain authentication protocol.Security analysis and performance evaluation show that the proposed scheme can be effectively used in the cross-domain authentication scenario of industrial internet of things. 展开更多
关键词 industrial internet of things(iiot) domain⁃level anonymity cross⁃domain authentication group signature
在线阅读 下载PDF
Cloud control for IIoT in a cloud-edge environment 被引量:1
5
作者 YAN Ce XIA Yuanqing +1 位作者 YANG Hongjiu ZHAN Yufeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期1013-1027,共15页
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for... The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms. 展开更多
关键词 5G and time sensitive network(TSN) industrial Internet of things(iiot)workflow transmission control protocol(TCP)flows control cloud edge collaboration multi-objective optimal scheduling
在线阅读 下载PDF
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things 被引量:1
6
作者 Senshan Ouyang Xiang Liu +3 位作者 Lei Liu Shangchao Wang Baichuan Shao Yang Zhao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期903-915,共13页
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar... With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be addressed.The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems.Unfortunately,it still suffers from the problem of key exposure.In order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 algorithm.This scheme boasts strong key insulation and secure keyupdates.Our scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud environments.Finally,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle. 展开更多
关键词 KEY-INSULATED SM2 algorithm digital signature Industrial Internet of things(iiot) provable security
在线阅读 下载PDF
Edge Cloud Selection in Mobile Edge Computing(MEC)-Aided Applications for Industrial Internet of Things(IIoT)Services
7
作者 Dae-Young Kim SoYeon Lee +1 位作者 MinSeung Kim Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2049-2060,共12页
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im... In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method. 展开更多
关键词 Industrial Internet of things(iiot)network iiot service mobile edge computing(MEC) edge cloud selection MEC-aided application
在线阅读 下载PDF
A Double-Timescale Reinforcement Learning Based Cloud-Edge Collaborative Framework for Decomposable Intelligent Services in Industrial Internet of Things
8
作者 Zhang Qiuyang Wang Ying Wang Xue 《China Communications》 SCIE CSCD 2024年第10期181-199,共19页
With the proportion of intelligent services in the industrial internet of things(IIoT)rising rapidly,its data dependency and decomposability increase the difficulty of scheduling computing resources.In this paper,we p... With the proportion of intelligent services in the industrial internet of things(IIoT)rising rapidly,its data dependency and decomposability increase the difficulty of scheduling computing resources.In this paper,we propose an intelligent service computing framework.In the framework,we take the long-term rewards of its important participants,edge service providers,as the optimization goal,which is related to service delay and computing cost.Considering the different update frequencies of data deployment and service offloading,double-timescale reinforcement learning is utilized in the framework.In the small-scale strategy,the frequent concurrency of services and the difference in service time lead to the fuzzy relationship between reward and action.To solve the fuzzy reward problem,a reward mapping-based reinforcement learning(RMRL)algorithm is proposed,which enables the agent to learn the relationship between reward and action more clearly.The large time scale strategy adopts the improved Monte Carlo tree search(MCTS)algorithm to improve the learning speed.The simulation results show that the strategy is superior to popular reinforcement learning algorithms such as double Q-learning(DDQN)and dueling Q-learning(dueling-DQN)in learning speed,and the reward is also increased by 14%. 展开更多
关键词 computing service edge intelligence industrial internet of things(iiot) reinforcement learning(RL)
在线阅读 下载PDF
Age-Driven Joint Sampling and Non-Slot Based Scheduling for Industrial Internet of Things
9
作者 Cao Yali Teng Yinglei +1 位作者 Song Mei Wang Nan 《China Communications》 SCIE CSCD 2024年第11期190-204,共15页
Effective control of time-sensitive industrial applications depends on the real-time transmission of data from underlying sensors.Quantifying the data freshness through age of information(AoI),in this paper,we jointly... Effective control of time-sensitive industrial applications depends on the real-time transmission of data from underlying sensors.Quantifying the data freshness through age of information(AoI),in this paper,we jointly design sampling and non-slot based scheduling policies to minimize the maximum time-average age of information(MAoI)among sensors with the constraints of average energy cost and finite queue stability.To overcome the intractability involving high couplings of such a complex stochastic process,we first focus on the single-sensor time-average AoI optimization problem and convert the constrained Markov decision process(CMDP)into an unconstrained Markov decision process(MDP)by the Lagrangian method.With the infinite-time average energy and AoI expression expended as the Bellman equation,the singlesensor time-average AoI optimization problem can be approached through the steady-state distribution probability.Further,we propose a low-complexity sub-optimal sampling and semi-distributed scheduling scheme for the multi-sensor scenario.The simulation results show that the proposed scheme reduces the MAoI significantly while achieving a balance between the sampling rate and service rate for multiple sensors. 展开更多
关键词 Age of Information(AoI) Industrial Internet of things(iiot) Markov decision process(MDP) time sensitive systems URLLC
在线阅读 下载PDF
Energy Minimization for Heterogenous Traffic Coexistence with Puncturing in Mobile Edge Computing-Based Industrial Internet of Things
10
作者 Wang Xue Wang Ying +1 位作者 Fei Zixuan Zhao Junwei 《China Communications》 SCIE CSCD 2024年第10期167-180,共14页
Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady perform... Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady performance of eMBB traffic while meeting the requirements of URLLC traffic with puncturing is a major challenge in some realistic scenarios. In this paper, we pay attention to the timely and energy-efficient processing for eMBB traffic in the industrial Internet of Things(IIoT), where mobile edge computing(MEC) is employed for data processing. Specifically, the performance of eMBB traffic and URLLC traffic in a MEC-based IIoT system is ensured by setting the threshold of tolerable delay and outage probability, respectively. Furthermore,considering the limited energy supply, an energy minimization problem of eMBB device is formulated under the above constraints, by jointly optimizing the resource blocks(RBs) punctured by URLLC traffic, data offloading and transmit power of eMBB device. With Markov's inequality, the problem is reformulated by transforming the probabilistic outage constraint into a deterministic constraint. Meanwhile, an iterative energy minimization algorithm(IEMA) is proposed.Simulation results demonstrate that our algorithm has a significant reduction in the energy consumption for eMBB device and achieves a better overall effect compared to several benchmarks. 展开更多
关键词 energy minimization enhanced mobile broadband(eMBB)and ultra-reliable low latency communications(URLLC)coexistence industrial Internet of things(iiot) mobile edge computing(MEC) PUNCTURING
在线阅读 下载PDF
基于IIoT+共享的模块数字化装配系统研究与应用
11
作者 甘敦文 杨伟君 +3 位作者 郑广辉 钱叶昶 刘鹏 王宝军 《机床与液压》 北大核心 2024年第24期96-104,共9页
针对企业产品在生产过程中的特性及当前装配系统存在设备/工具扩展难、不同产品适应难、设备可扩展性差、柔性差及建设成本高的问题,设计基于IIoT+共享的模块数字化装配系统。基于先进的信息技术、生产模式及管理理念制定详细研究方案;... 针对企业产品在生产过程中的特性及当前装配系统存在设备/工具扩展难、不同产品适应难、设备可扩展性差、柔性差及建设成本高的问题,设计基于IIoT+共享的模块数字化装配系统。基于先进的信息技术、生产模式及管理理念制定详细研究方案;以柔性化、智能化为核心,结合企业生产特性及当前问题进行详细设计;最后,选取企业典型的生产场景进行应用分析,验证新型装配系统先进性。结果表明:该装配系统具备智能化、低成本、高柔性、可快速配置等特性,可实现企业生产过程的“提质增效、节本降耗”,降低生产过程对人员技能的依赖,可推动企业生产模式的转型升级,增强企业的核心竞争力。 展开更多
关键词 工业物联网(iiot) 数字化 模块化 装配系统
在线阅读 下载PDF
一种面向工业物联网的知识图谱认知制造模型
12
作者 孙秀英 张晓丹 《计算机应用与软件》 北大核心 2025年第5期43-49,94,共8页
数据的有效认知是实现智能制造的关键,针对工业物联网系统产生的大量多源异构的制造数据,提出一种知识图谱认知制造模型(IIoT-KGC)。该模型利用认知驱动智能体构建知识图谱模型,提出基于深度强化学习的知识推理方法,实现工业物联网生产... 数据的有效认知是实现智能制造的关键,针对工业物联网系统产生的大量多源异构的制造数据,提出一种知识图谱认知制造模型(IIoT-KGC)。该模型利用认知驱动智能体构建知识图谱模型,提出基于深度强化学习的知识推理方法,实现工业物联网生产制造资源的有效认知。以柔性车间个性化产品订单响应为例,实验表明:IIoT-KGC在动态需求变化下正样本率较大,资源分配相比人工方法和规则方法具有更好的车床利用率和实时交互能力,为工业物联网智能制造提供了决策支持。 展开更多
关键词 工业物联网 知识图谱 认知制造 深度学习
在线阅读 下载PDF
Apache TsFile中的短时间序列分组压缩及合并方法 被引量:1
13
作者 刘星宇 宋韶旭 +1 位作者 黄向东 王建民 《软件学报》 北大核心 2025年第3期941-961,共21页
时间序列数据在工业制造、气象、电力、车辆等领域都有着广泛的应用,促进了时间序列数据库管理系统的发展.越来越多的数据库系统向云端迁移,端边云协同的架构也愈发常见,所需要处理的数据规模愈加庞大.在端边云协同、海量序列等场景中,... 时间序列数据在工业制造、气象、电力、车辆等领域都有着广泛的应用,促进了时间序列数据库管理系统的发展.越来越多的数据库系统向云端迁移,端边云协同的架构也愈发常见,所需要处理的数据规模愈加庞大.在端边云协同、海量序列等场景中,由于同步周期短、数据刷盘频繁等原因,会产生大量的短时间序列,给数据库系统带来新的挑战.有效的数据管理与压缩方法能显著提高存储性能,使得数据库系统足以胜任存储海量序列的重任.Apache TsFile是一个专为时序场景设计的列式存储文件格式,在Apache IoTDB等数据库管理系统中发挥重要作用.阐述了Apache TsFile中应对大量短时间序列场景所使用的分组压缩及合并方法,特别是面向工业物联网等序列数量庞大的应用场景.该分组压缩方法充分考虑了短时间序列场景中的数据特征,通过对设备分组的方法提高元数据利用率,降低文件索引大小,减少短时间序列并显著提高压缩效果.经过真实世界数据集的验证,分组方法在压缩效果、读取、写入、文件合并等多个方面均有显著提升,能更好地管理短时间序列场景下的Ts File文件. 展开更多
关键词 数据压缩 时间序列数据 数据库 工业物联网
在线阅读 下载PDF
工业物联网场景通用几何随机信道模型 被引量:1
14
作者 杨雨润 刘洋 《南京邮电大学学报(自然科学版)》 北大核心 2025年第4期21-27,共7页
工业物联网(Industrial Internet of Things,IIoT)是第六代移动通信系统(6th Generation Mobile Communication System,6G)的典型应用。提出了一种新的基于几何的工业物联网环境非平稳随机模型(Geometry-based Stochastic Model,GBSM)... 工业物联网(Industrial Internet of Things,IIoT)是第六代移动通信系统(6th Generation Mobile Communication System,6G)的典型应用。提出了一种新的基于几何的工业物联网环境非平稳随机模型(Geometry-based Stochastic Model,GBSM)。该模型通过速度分解细化IIoT下信道模型中散射体组成的簇的生灭过程,对不同运动方向间信道非平稳特性的区别进行了建模。仿真结果表明,该模型能较好地表征不同运动方向对信道特性的影响,能够有效地反映信道传播环境中簇的数量。与参考模型以及射线追踪仿真的时延均方扩展和角度均方扩展拟合结果验证了该模型具有较高的精度。 展开更多
关键词 工业物联网 基于几何的随机模型 运动方向 非平稳过程
在线阅读 下载PDF
基于国密的工业物联网门限签密方案
15
作者 李斯琦 田有亮 彭长根 《计算机工程》 北大核心 2025年第7期210-222,共13页
针对工业物联网(IIoT)中数据采集与监视控制(SCADA)系统和终端设备之间通信易受篡改、窃听、假冒等攻击的问题,提出一种基于国密的门限签密方案(SM-TSC)。首先,对终端设备进行注册、分组,基于Shamir秘密共享设计群组秘密值分配方法,防止... 针对工业物联网(IIoT)中数据采集与监视控制(SCADA)系统和终端设备之间通信易受篡改、窃听、假冒等攻击的问题,提出一种基于国密的门限签密方案(SM-TSC)。首先,对终端设备进行注册、分组,基于Shamir秘密共享设计群组秘密值分配方法,防止IIoT场景下终端设备节点权力过于集中所造成的密钥泄露、签密伪造等问题;其次,将国密SM2签名算法作为基础,结合国密SM3算法、国密SM4算法以及群组秘密值分配方法,设计一种安全高效的面向群组的门限签密算法,保障SCADA系统与终端设备群组之间通信消息的真实性和机密性;最后,在随机谕言机模型下,利用安全归约方法对SM-TSC方案进行安全性分析。分析结果表明,SM-TSC方案在自适应选择密文攻击下能达到语义安全,在自适应选择消息攻击下是存在性不可伪造的,可以有效保障群组通信中数据的机密性和真实性。实验结果表明,与现有的基于椭圆曲线的门限签密方案相比,SM-TSC方案在门限签密阶段和解签密阶段的计算开销分别降低了75%与79.66%,其在IIoT群组通信中具有更高的适用性。 展开更多
关键词 签密 国密算法 门限密码学 可证明安全 工业物联网
在线阅读 下载PDF
基于区块链的轻量级工业物联网跨域认证与数据共享方案
16
作者 李哲成 张波 《计算机研究与发展》 北大核心 2025年第10期2416-2427,共12页
在当前工业物联网(industrial Internet of things,IIoT)设备的跨域身份认证和数据共享中,边缘服务器和区块链起到了快速转发和存储的作用.现有的跨域认证与数据共享方案面临着多种安全风险,并且还存在着设备端计算和通信开销大、认证... 在当前工业物联网(industrial Internet of things,IIoT)设备的跨域身份认证和数据共享中,边缘服务器和区块链起到了快速转发和存储的作用.现有的跨域认证与数据共享方案面临着多种安全风险,并且还存在着设备端计算和通信开销大、认证结构复杂的问题.因此,提出了一种基于区块链的轻量级工业物联网跨域认证与数据共享方案,能够实现设备的跨域匿名认证与数据共享.同时,引入了分布式密钥生成技术来构建服务密钥,并以此设计了一种轻量级的消息认证算法,能有效实现服务信息的设备端保密,同时极大限度地减少了资源消耗.详细的安全性分析表明该方案满足不可伪造性、机密性、不可链接性和匿名性.性能分析表明该方案在计算开销、通信开销和区块链查询效率上均优于相关方案. 展开更多
关键词 跨域 工业物联网 认证 数据共享 分布式密钥生成 区块链
在线阅读 下载PDF
室内定位技术驱动的车间物流智能管控方法及应用 被引量:1
17
作者 吴畏 赵之恒 黄国全 《工业工程》 2025年第4期45-55,共11页
在工业4.0的智能制造以及工业5.0的人本主义理念推动下,离散制造业对于利用生产过程中人、机、物的精准时空信息以提升车间物流管理水平的需求日益迫切。然而,如何在车间复杂的环境中实时准确地定位生产资源,以及如何运用时空数据提供... 在工业4.0的智能制造以及工业5.0的人本主义理念推动下,离散制造业对于利用生产过程中人、机、物的精准时空信息以提升车间物流管理水平的需求日益迫切。然而,如何在车间复杂的环境中实时准确地定位生产资源,以及如何运用时空数据提供智能服务以实现物流运营的降本增效,是企业面临的主要挑战。本文分析了离散制造车间物流管控的实际需求与时空数据的潜在作用,提出一种由室内定位技术驱动的车间物流智能管控系统框架,结合工业物联网、云计算、数字孪生、人工智能等技术,为物流运营中的各类人员提供基于位置的智能服务。提出一种面向车间复杂环境的细胞识别室内定位算法,融合蓝牙低功耗和超宽带无线技术,感知环境变化并进行在线自适应更新,实现了高精度、高稳定性的实时定位。整体方案具有成本低、易于部署、扩展性强等优点。在某电脑制造商的主机生产车间,对所提出的车间物流智能管控系统框架和细胞识别室内定位算法进行了原型系统的开发和应用验证。 展开更多
关键词 智能工厂 工业物联网(iiot) 室内定位 车间物流 智能管控
在线阅读 下载PDF
工业物联网数据采集网络的信息年龄研究
18
作者 曹杰 江红兵 朱旭 《广西师范大学学报(自然科学版)》 北大核心 2025年第5期75-90,共16页
针对工业物联网数据采集系统对高时效性和高可靠性的需求,考虑不同优先级流量的共存、资源的稀缺性以及信道的随机性,本文提出一种基于随机混合系统的方法,构建适用于此类网络的时效性表征模型。该模型旨在刻画存在大量优先级各异流量... 针对工业物联网数据采集系统对高时效性和高可靠性的需求,考虑不同优先级流量的共存、资源的稀缺性以及信道的随机性,本文提出一种基于随机混合系统的方法,构建适用于此类网络的时效性表征模型。该模型旨在刻画存在大量优先级各异流量的条件下,数据采集网络的时效性特征,并探讨系统中各耦合参数对信息时效性的影响。研究结果表明,通过优化链路感知策略可有效减少传输错误概率对信息年龄的负面影响。在相同优先级网络环境中,链路的信息年龄随着数据生成速率的增加而逐渐趋向稳定极限值;而在不同优先级的网络中,较高优先级链路通过牺牲其他链路的时效性,提升了自身时效性。随着数据生成速率的增加,系统逐渐呈现退化为单链路模式的趋势。因此,为保障系统的整体时效性,需要通过优化低优先级链路的感知资源分配来确保系统的高效运行。 展开更多
关键词 信息年龄 工业物联网 数据采集 优先级 感知资源分配 随机混合系统
在线阅读 下载PDF
Physical Layer Security Scheme With AoI-Awareness for Industrial IoT Based on Covert Communications
19
作者 Yaping Li Zhi-Xin Liu +1 位作者 Jia-Wei Su Ya-Zhou Yuan 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期276-278,共3页
Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission fo... Dear Editor,Industrial Internet of things(IIoT) is a typical application of cyberphysical system(CPS). In the IIoT, wireless communication is an inevitable trend to replace the deployment-limited wired transmission for cases with large-scale and mobile devices. However, wireless communication gives rise to critical issues related to physical security, such as malicious detections and attacks [1]. 展开更多
关键词 industrial iiot internet things iiot physical layer security covert communications malicious detections attacks cyberphysical system cps aoi awareness wireless communication
在线阅读 下载PDF
基于PUF的雾辅助的工业物联网轻量级认证协议
20
作者 王雄 张泽昊 +1 位作者 李伟麟 胡子宸 《北京电子科技学院学报》 2025年第3期14-25,共12页
在信息技术高速发展的推动下,工业物联网也进入雾时代。但是,工业物联网中传感器易受攻击进而造成数据泄露与篡改的问题仍然没有解决,并且在新的架构下网络更加复杂。如何保护新架构下传感器设备的数据安全仍然是工业物联网安全的核心... 在信息技术高速发展的推动下,工业物联网也进入雾时代。但是,工业物联网中传感器易受攻击进而造成数据泄露与篡改的问题仍然没有解决,并且在新的架构下网络更加复杂。如何保护新架构下传感器设备的数据安全仍然是工业物联网安全的核心任务之一。为了解决雾计算环境下传感器数据安全问题,本文提出一种雾辅助的工业物联网身份认证协议,采用异或运算与哈希函数等轻量级运算,实现双向身份认证及会话密钥协商;利用PUF技术有效抵御传感器节点捕获攻击;协议设计中充分利用雾节点计算与存储特性,实现高效的数据传输和低延时快速处理。与现有工业物联网环境下的身份认证协议相比,本文协议满足更多安全指标,且性能方面有更加显著的优势。 展开更多
关键词 工业物联网 PUF 认证协议 轻量级 雾计算
在线阅读 下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部