Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (29)
  • Open Access

    ARTICLE

    Intelligent Deep Learning Model for Privacy Preserving IIoT on 6G Environment

    Anwer Mustafa Hilal1,*, Jaber S. Alzahrani2, Ibrahim Abunadi3, Nadhem Nemri4, Fahd N. Al-Wesabi5,6, Abdelwahed Motwakel1, Ishfaq Yaseen1, Abu Sarwar Zamani1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 333-348, 2022, DOI:10.32604/cmc.2022.024794

    Abstract In recent times, Industrial Internet of Things (IIoT) experiences a high risk of cyber attacks which needs to be resolved. Blockchain technology can be incorporated into IIoT system to help the entrepreneurs realize Industry 4.0 by overcoming such cyber attacks. Although blockchain-based IIoT network renders a significant support and meet the service requirements of next generation network, the performance arrived at, in existing studies still needs improvement. In this scenario, the current research paper develops a new Privacy-Preserving Blockchain with Deep Learning model for Industrial IoT (PPBDL-IIoT) on 6G environment. The proposed PPBDL-IIoT technique aims at identifying the existence of… More >

  • Open Access

    ARTICLE

    Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment

    Mahmoud Ragab1,2,3,*, Samah Alshehri4, Hani A. Alhadrami5,6,7, Faris Kateb1, Ehab Bahaudien Ashary8, S. Abdel-khalek9,10

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1323-1338, 2022, DOI:10.32604/cmc.2022.024775

    Abstract Rapid advancements of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) pose serious security issues by revealing secret data. Therefore, security data becomes a crucial issue in IIoT communication where secrecy needs to be guaranteed in real time. Practically, AI techniques can be utilized to design image steganographic techniques in IIoT. In addition, encryption techniques act as an important role to save the actual information generated from the IIoT devices to avoid unauthorized access. In order to accomplish secure data transmission in IIoT environment, this study presents novel encryption with image steganography based data hiding technique (EIS-DHT) for… More >

  • Open Access

    ARTICLE

    Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications

    Usman Ali1,2, Mohd Yamani Idna Idris1,3,*, Jaroslav Frnda4, Mohamad Nizam Bin Ayub1, Roobaea Alroobaea5, Fahad Almansour6, Nura Modi Shagari1, Insaf Ullah7, Ihsan Ali1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2515-2532, 2022, DOI:10.32604/cmc.2022.019800

    Abstract Industrial internet of things (IIoT) is the usage of internet of things (IoT) devices and applications for the purpose of sensing, processing and communicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-related processes to attain more profits. However, such IoT based smart industries need internet connectivity and interoperability which makes them susceptible to numerous cyber-attacks due to the scarcity of computational resources of IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoT environment. In this paper, we propose a… More >

  • Open Access

    ARTICLE

    IIoT Framework Based ML Model to Improve Automobile Industry Product

    S. Gopalakrishnan1,*, M. Senthil Kumaran2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1435-1449, 2022, DOI:10.32604/iasc.2022.020660

    Abstract In the automotive industry, multiple predictive maintenance units run behind the scenes in every production process to support significant product development, particularly among Accessories Manufacturers (AMs). As a result, they wish to maintain a positive relationship with vehicle manufacturers by providing 100 percent quality assurances for accessories. This is only achievable if they implement an effective anticipatory strategy that prioritizes quality control before and after product development. To do this, many sensors devices are interconnected in the production area to collect operational data (humanity, viscosity, and force) continuously received from machines and sent to backend computers for control operations and… More >

  • Open Access

    ARTICLE

    Blockchain Based Secure Solution for Cloud Storage: A Model for Synchronizing Industry 4.0 and IIoT

    Prakhar Sahu1,*, S. K. Singh1, Arun Kumar Singh2

    Journal of Cyber Security, Vol.3, No.2, pp. 107-115, 2021, DOI:10.32604/jcs.2021.020831

    Abstract Industry 4.0 is one of the hot topic of today’s world where everything in the industry will be data driven and technological advancements will take place accordingly. In the fourth phase of industrial revolution, manufacturers are dependent upon data produced by the consumers to invent, innovate or change anything for the product. Internet of things devices like OBD, RFID, IIoT, Smart devices are the major source of data generation and represents trends in the industry. Since the IoT device are vulnerable to hackers due to its limitation, consumer data security should be tighten up and enhanced. This paper gives an… More >

  • Open Access

    ARTICLE

    Cyber Security and Privacy Issues in Industrial Internet of Things

    NZ Jhanjhi1, Mamoona Humayun2,*, Saleh N. Almuayqil2

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 361-380, 2021, DOI:10.32604/csse.2021.015206

    Abstract The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades. Consequently, there has been a huge paradigm shift in the manufacturing and production sectors. However, this poses a challenge for cybersecurity and highlights the need to address the possible threats targeting (various pillars of) industry 4.0. However, before providing a concrete solution certain aspect need to be researched, for instance, cybersecurity threats and privacy issues in the industry. To fill this gap, this paper discusses potential solutions to cybersecurity targeting this industry and highlights the consequences of possible attacks… More >

  • Open Access

    ARTICLE

    Security Threats to Business Information Systems Using NFC Read/Write Mode

    Sergio Rios-Aguilar1,2,*, Marta Beltrán2, González-Crespo Rubén3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2955-2969, 2021, DOI:10.32604/cmc.2021.014969

    Abstract Radio Frequency IDentification (RFID) and related technologies such as Near Field Communication (NFC) are becoming essential in industrial contexts thanks to their ability to perform contactless data exchange, either device-to-device or tag-to-device. One of the three main operation modes of NFC, called read/write mode, makes use of the latter type of interaction. It is extensively used in business information systems that make use of NFC tags to provide the end-user with augmented information in one of several available NFC data exchange formats, such as plain text, simple URLs or enriched URLs. Using a wide variety of physical form factors, NFC-compatible… More >

  • Open Access

    ARTICLE

    Robust Attack Detection Approach for IIoT Using Ensemble Classifier

    V. Priya1, I. Sumaiya Thaseen1, Thippa Reddy Gadekallu1, Mohamed K. Aboudaif2,*, Emad Abouel Nasr3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2457-2470, 2021, DOI:10.32604/cmc.2021.013852

    Abstract Generally, the risks associated with malicious threats are increasing for the Internet of Things (IoT) and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices. Thus, anomaly-based intrusion detection models for IoT networks are vital. Distinct detection methodologies need to be developed for the Industrial Internet of Things (IIoT) network as threat detection is a significant expectation of stakeholders. Machine learning approaches are considered to be evolving techniques that learn with experience, and such approaches have resulted in superior performance in various applications, such as pattern recognition, outlier analysis, and speech recognition.… More >

  • Open Access

    ARTICLE

    Performance Analysis of Intelligent CR-NOMA Model for Industrial IoT Communications

    Yinghua Zhang1,2, Jian Liu1, Yunfeng Peng1, Yanfang Dong2, Changming Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 239-257, 2020, DOI:10.32604/cmes.2020.010778

    Abstract Aiming for ultra-reliable low-latency wireless communications required in industrial internet of things (IIoT) applications, this paper studies a simple cognitive radio non-orthogonal multiple access (CR-NOMA) downlink system. This system consists of two secondary users (SUs) dynamically interfered by the primary user (PU), and its performance is characterized by the outage probability of the SU communications. This outage probability is calculated under two conditions where, a) the transmission of PU starts after the channel state information (CSI) is acquired, so the base station (BS) is oblivious of the interference, and b) when the BS is aware of the PU interference, and… More >

Displaying 21-30 on page 3 of 29. Per Page