Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (38)
  • Open Access

    ARTICLE

    GSLDWOA: A Feature Selection Algorithm for Intrusion Detection Systems in IIoT

    Wanwei Huang1,*, Huicong Yu1, Jiawei Ren2, Kun Wang3, Yanbu Guo1, Lifeng Jin4

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-24, 2026, DOI:10.32604/cmc.2025.068493 - 10 November 2025

    Abstract Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity. These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy. This paper proposes an industrial Internet of Things intrusion detection feature selection algorithm based on an improved whale optimization algorithm (GSLDWOA). The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to, such as local optimality, long detection time, and reduced accuracy. First, the initial population’s diversity is increased using the Gaussian Mutation More >

  • Open Access

    ARTICLE

    A Dynamic Deceptive Defense Framework for Zero-Day Attacks in IIoT: Integrating Stackelberg Game and Multi-Agent Distributed Deep Deterministic Policy Gradient

    Shigen Shen1,2, Xiaojun Ji1,*, Yimeng Liu1

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3997-4021, 2025, DOI:10.32604/cmc.2025.069332 - 23 September 2025

    Abstract The Industrial Internet of Things (IIoT) is increasingly vulnerable to sophisticated cyber threats, particularly zero-day attacks that exploit unknown vulnerabilities and evade traditional security measures. To address this critical challenge, this paper proposes a dynamic defense framework named Zero-day-aware Stackelberg Game-based Multi-Agent Distributed Deep Deterministic Policy Gradient (ZSG-MAD3PG). The framework integrates Stackelberg game modeling with the Multi-Agent Distributed Deep Deterministic Policy Gradient (MAD3PG) algorithm and incorporates defensive deception (DD) strategies to achieve adaptive and efficient protection. While conventional methods typically incur considerable resource overhead and exhibit higher latency due to static or rigid defensive mechanisms,… More >

  • Open Access

    ARTICLE

    Unveiling CyberFortis: A Unified Security Framework for IIoT-SCADA Systems with SiamDQN-AE FusionNet and PopHydra Optimizer

    Kuncham Sreenivasa Rao1, Rajitha Kotoju2, B. Ramana Reddy3, Taher Al-Shehari4, Nasser A. Alsadhan5, Subhav Singh6,7,8, Shitharth Selvarajan9,10,11,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1899-1916, 2025, DOI:10.32604/cmc.2025.064728 - 29 August 2025

    Abstract Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things (SCADA-IIoT) systems against intruders has become essential since industrial control systems now oversee critical infrastructure, and cyber attackers more frequently target these systems. Due to their connection of physical assets with digital networks, SCADA-IIoT systems face substantial risks from multiple attack types, including Distributed Denial of Service (DDoS), spoofing, and more advanced intrusion methods. Previous research in this field faces challenges due to insufficient solutions, as current intrusion detection systems lack the necessary accuracy, scalability, and adaptability needed for IIoT environments. This paper introduces CyberFortis, a… More >

  • Open Access

    ARTICLE

    Enhancing IoT Resilience at the Edge: A Resource-Efficient Framework for Real-Time Anomaly Detection in Streaming Data

    Kirubavathi G.1,*, Arjun Pulliyasseri1, Aswathi Rajesh1, Amal Ajayan1, Sultan Alfarhood2,*, Mejdl Safran2, Meshal Alfarhood2, Jungpil Shin3

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3005-3031, 2025, DOI:10.32604/cmes.2025.065698 - 30 June 2025

    Abstract The exponential expansion of the Internet of Things (IoT), Industrial Internet of Things (IIoT), and Transportation Management of Things (TMoT) produces vast amounts of real-time streaming data. Ensuring system dependability, operational efficiency, and security depends on the identification of anomalies in these dynamic and resource-constrained systems. Due to their high computational requirements and inability to efficiently process continuous data streams, traditional anomaly detection techniques often fail in IoT systems. This work presents a resource-efficient adaptive anomaly detection model for real-time streaming data in IoT systems. Extensive experiments were carried out on multiple real-world datasets, achieving… More >

  • Open Access

    REVIEW

    Digital Twins in the IIoT: Current Practices and Future Directions Toward Industry 5.0

    Bisni Fahad Mon1, Mohammad Hayajneh1,2,*, Najah Abu Ali1, Farman Ullah1, Hikmat Ullah3, Shayma Alkobaisi4

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 3675-3712, 2025, DOI:10.32604/cmc.2025.061411 - 19 May 2025

    Abstract In this paper, we explore the ever-changing field of Digital Twins (DT) in the Industrial Internet of Things (IIoT) context, emphasizing their critical role in advancing Industry 4.0 toward the frontiers of Industry 5.0. The article explores the applications of DT in several industrial sectors and their smooth integration into the IIoT, focusing on the fundamentals of digital twins and emphasizing the importance of virtual-real integration. It discusses the emergence of DT, contextualizing its evolution within the framework of IIoT. The study categorizes the different types of DT, including prototypes and instances, and provides an… More >

  • Open Access

    ARTICLE

    A Robust Security Detection Strategy for Next Generation IoT Networks

    Hafida Assmi1, Azidine Guezzaz1, Said Benkirane1, Mourade Azrour2,*, Said Jabbour3, Nisreen Innab4, Abdulatif Alabdulatif5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 443-466, 2025, DOI:10.32604/cmc.2024.059047 - 03 January 2025

    Abstract Internet of Things (IoT) refers to the infrastructures that connect smart devices to the Internet, operating autonomously. This connectivity makes it possible to harvest vast quantities of data, creating new opportunities for the emergence of unprecedented knowledge. To ensure IoT securit, various approaches have been implemented, such as authentication, encoding, as well as devices to guarantee data integrity and availability. Among these approaches, Intrusion Detection Systems (IDS) is an actual security solution, whose performance can be enhanced by integrating various algorithms, including Machine Learning (ML) and Deep Learning (DL), enabling proactive and accurate detection of… More >

  • Open Access

    ARTICLE

    Blockchain-Based Certificateless Cross-Domain Authentication Scheme in the Industrial Internet of Things

    Zhaobin Li*, Xiantao Liu*, Nan Zhang, Zhanzhen Wei

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3835-3854, 2024, DOI:10.32604/cmc.2024.053950 - 12 September 2024

    Abstract The Industrial Internet of Things (IIoT) consists of massive devices in different management domains, and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange. To address the above challenges, a viable solution that combines Certificateless Public Key Cryptography (CL-PKC) with blockchain technology can be utilized. However, as many existing schemes rely on a single Key Generation Center (KGC), they are prone to problems such as single points of failure and high computational overhead. In this case, this paper proposes a novel blockchain-based certificateless cross-domain authentication… More >

  • Open Access

    ARTICLE

    Evaluation of Industrial IoT Service Providers with TOPSIS Based on Circular Intuitionistic Fuzzy Sets

    Elif Çaloğlu Büyükselçuk*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 715-746, 2024, DOI:10.32604/cmc.2024.052509 - 18 July 2024

    Abstract Industrial Internet of Things (IIoT) service providers have become increasingly important in the manufacturing industry due to their ability to gather and process vast amounts of data from connected devices, enabling manufacturers to improve operational efficiency, reduce costs, and enhance product quality. These platforms provide manufacturers with real-time visibility into their production processes and supply chains, allowing them to optimize operations and make informed decisions. In addition, IIoT service providers can help manufacturers create new revenue streams through the development of innovative products and services and enable them to leverage the benefits of emerging technologies… More >

  • Open Access

    REVIEW

    A Review of Hybrid Cyber Threats Modelling and Detection Using Artificial Intelligence in IIoT

    Yifan Liu1, Shancang Li1,*, Xinheng Wang2, Li Xu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1233-1261, 2024, DOI:10.32604/cmes.2024.046473 - 20 May 2024

    Abstract The Industrial Internet of Things (IIoT) has brought numerous benefits, such as improved efficiency, smart analytics, and increased automation. However, it also exposes connected devices, users, applications, and data generated to cyber security threats that need to be addressed. This work investigates hybrid cyber threats (HCTs), which are now working on an entirely new level with the increasingly adopted IIoT. This work focuses on emerging methods to model, detect, and defend against hybrid cyber attacks using machine learning (ML) techniques. Specifically, a novel ML-based HCT modelling and analysis framework was proposed, in which regularisation and Random Forest were More >

  • Open Access

    ARTICLE

    Enhancing Energy Efficiency with a Dynamic Trust Measurement Scheme in Power Distribution Network

    Yilei Wang1, Xin Sun1, Guiping Zheng2,3, Ahmar Rashid4, Sami Ullah5, Hisham Alasmary6, Muhammad Waqas7,8,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3909-3927, 2024, DOI:10.32604/cmc.2024.047767 - 26 March 2024

    Abstract The application of Intelligent Internet of Things (IIoT) in constructing distribution station areas strongly supports platform transformation, upgrade, and intelligent integration. The sensing layer of IIoT comprises the edge convergence layer and the end sensing layer, with the former using intelligent fusion terminals for real-time data collection and processing. However, the influx of multiple low-voltage in the smart grid raises higher demands for the performance, energy efficiency, and response speed of the substation fusion terminals. Simultaneously, it brings significant security risks to the entire distribution substation, posing a major challenge to the smart grid. In… More >

Displaying 1-10 on page 1 of 38. Per Page