Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23)
  • Open Access

    ARTICLE

    Intelligent Intrusion Detection for Industrial Internet of Things Using Clustering Techniques

    Noura Alenezi, Ahamed Aljuhani*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2899-2915, 2023, DOI:10.32604/csse.2023.036657

    Abstract The rapid growth of the Internet of Things (IoT) in the industrial sector has given rise to a new term: the Industrial Internet of Things (IIoT). The IIoT is a collection of devices, apps, and services that connect physical and virtual worlds to create smart, cost-effective, and scalable systems. Although the IIoT has been implemented and incorporated into a wide range of industrial control systems, maintaining its security and privacy remains a significant concern. In the IIoT contexts, an intrusion detection system (IDS) can be an effective security solution for ensuring data confidentiality, integrity, and availability. In this paper, we… More >

  • Open Access

    ARTICLE

    Digital Twin-Based Automated Fault Diagnosis in Industrial IoT Applications

    Samah Alshathri1, Ezz El-Din Hemdan2, Walid El-Shafai3,4,*, Amged Sayed5,6

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 183-196, 2023, DOI:10.32604/cmc.2023.034048

    Abstract In recent years, Digital Twin (DT) has gained significant interest from academia and industry due to the advanced in information technology, communication systems, Artificial Intelligence (AI), Cloud Computing (CC), and Industrial Internet of Things (IIoT). The main concept of the DT is to provide a comprehensive tangible, and operational explanation of any element, asset, or system. However, it is an extremely dynamic taxonomy developing in complexity during the life cycle that produces a massive amount of engendered data and information. Likewise, with the development of AI, digital twins can be redefined and could be a crucial approach to aid the… More >

  • Open Access

    ARTICLE

    Wrapper Based Linear Discriminant Analysis (LDA) for Intrusion Detection in IIoT

    B. Yasotha1,*, T. Sasikala2, M. Krishnamurthy3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1625-1640, 2023, DOI:10.32604/csse.2023.025669

    Abstract The internet has become a part of every human life. Also, various devices that are connected through the internet are increasing. Nowadays, the Industrial Internet of things (IIoT) is an evolutionary technology interconnecting various industries in digital platforms to facilitate their development. Moreover, IIoT is being used in various industrial fields such as logistics, manufacturing, metals and mining, gas and oil, transportation, aviation, and energy utilities. It is mandatory that various industrial fields require highly reliable security and preventive measures against cyber-attacks. Intrusion detection is defined as the detection in the network of security threats targeting privacy information and sensitive… More >

  • Open Access

    ARTICLE

    Optimization Scheme of Trusted Task Offloading in IIoT Scenario Based on DQN

    Xiaojuan Wang1, Zikui Lu1,*, Siyuan Sun2, Jingyue Wang1, Luona Song3, Merveille Nicolas4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2055-2071, 2023, DOI:10.32604/cmc.2023.031750

    Abstract With the development of the Industrial Internet of Things (IIoT), end devices (EDs) are equipped with more functions to capture information. Therefore, a large amount of data is generated at the edge of the network and needs to be processed. However, no matter whether these computing tasks are offloaded to traditional central clusters or mobile edge computing (MEC) devices, the data is short of security and may be changed during transmission. In view of this challenge, this paper proposes a trusted task offloading optimization scheme that can offer low latency and high bandwidth services for IIoT with data security. Blockchain… More >

  • Open Access

    ARTICLE

    A Novel Approach for Network Vulnerability Analysis in IIoT

    K. Sudhakar*, S. Senthilkumar

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 263-277, 2023, DOI:10.32604/csse.2023.029680

    Abstract Industrial Internet of Things (IIoT) offers efficient communication among business partners and customers. With an enlargement of IoT tools connected through the internet, the ability of web traffic gets increased. Due to the raise in the size of network traffic, discovery of attacks in IIoT and malicious traffic in the early stages is a very demanding issues. A novel technique called Maximum Posterior Dichotomous Quadratic Discriminant Jaccardized Rocchio Emphasis Boost Classification (MPDQDJREBC) is introduced for accurate attack detection with minimum time consumption in IIoT. The proposed MPDQDJREBC technique includes feature selection and categorization. First, the network traffic features are collected… More >

  • Open Access

    ARTICLE

    Anomaly Detection for Industrial Internet of Things Cyberattacks

    Rehab Alanazi*, Ahamed Aljuhani

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2361-2378, 2023, DOI:10.32604/csse.2023.026712

    Abstract The evolution of the Internet of Things (IoT) has empowered modern industries with the capability to implement large-scale IoT ecosystems, such as the Industrial Internet of Things (IIoT). The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational and financial harm to organizations. To preserve the confidentiality, integrity, and availability of IIoT networks, an anomaly-based intrusion detection system (IDS) can be used to provide secure, reliable, and efficient IIoT ecosystems. In this paper, we propose an anomaly-based IDS for IIoT networks as an effective security solution to efficiently and effectively… More >

  • Open Access

    ARTICLE

    NOMA-Based Cooperative Relaying Transmission for the Industrial Internet of Things

    Yinghua Zhang1,*, Rui Cao1, Lixin Tian1, Rong Dai2, Zhennan Cao2, Jim Feng3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6513-6534, 2022, DOI:10.32604/cmc.2022.029467

    Abstract With the continuous maturity of the fifth generation (5G) communications, industrial Internet of Things (IIoT) technology has been widely applied in fields such as smart factories. In smart factories, 5G-based production line monitoring can improve production efficiency and reduce costs, but there are problems with limited monitoring coverage and insufficient wireless spectrum resources, which restricts the application of IIoT in the construction of smart factories. In response to these problems, we propose a hybrid spectrum access mechanism based on Non-Orthogonal Multiple Access (NOMA) cooperative relaying transmission to improve the monitoring coverage and spectrum efficiency. As there are a large number… More >

  • Open Access

    ARTICLE

    An Efficient SDFRM Security System for Blockchain Based Internet of Things

    Vivekraj Mannayee1,*, Thirumalai Ramanathan2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1545-1563, 2023, DOI:10.32604/iasc.2023.027675

    Abstract Blockchain has recently sparked interest in both the technological and business firms. The Internet of Things's (IoT) core principle emerged due to the connectivity of several new technologies, including wireless technology, the Internet, embedded automation systems, and micro-electromechanical devices. Manufacturing environments and operations have been successfully converted by implementing recent advanced technology like Cloud Computing (CC), Cyber-Physical System (CSP), Information and Communication Technologies (ICT) and Enterprise Model, and other technological innovations into the fourth industrial revolution referred to as Industry 4.0. Data management is defined as the process of accumulation in order to make better business decisions, and process, secure… More >

  • Open Access

    ARTICLE

    Anomaly Detection Framework in Fog-to-Things Communication for Industrial Internet of Things

    Tahani Alatawi*, Ahamed Aljuhani

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1067-1086, 2022, DOI:10.32604/cmc.2022.029283

    Abstract The rapid development of the Internet of Things (IoT) in the industrial domain has led to the new term the Industrial Internet of Things (IIoT). The IIoT includes several devices, applications, and services that connect the physical and virtual space in order to provide smart, cost-effective, and scalable systems. Although the IIoT has been deployed and integrated into a wide range of industrial control systems, preserving security and privacy of such a technology remains a big challenge. An anomaly-based Intrusion Detection System (IDS) can be an effective security solution for maintaining the confidentiality, integrity, and availability of data transmitted in… More >

  • Open Access

    ARTICLE

    Network Traffic Obfuscation System for IIoT-Cloud Control Systems

    Yangjae Lee1, Sung Hoon Baek2, Jung Taek Seo3, Ki-Woong Park1,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4911-4929, 2022, DOI:10.32604/cmc.2022.026657

    Abstract One of the latest technologies enabling remote control, operational efficiency upgrades, and real-time big-data monitoring in an industrial control system (ICS) is the IIoT-Cloud ICS, which integrates the Industrial Internet of Things (IIoT) and the cloud into the ICS. Although an ICS benefits from the application of IIoT and the cloud in terms of cost reduction, efficiency improvement, and real-time monitoring, the application of this technology to an ICS poses an unprecedented security risk by exposing its terminal devices to the outside world. An adversary can collect information regarding senders, recipients, and prime-time slots through traffic analysis and use it… More >

Displaying 1-10 on page 1 of 23. Per Page  

Share Link