Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (28)
  • Open Access

    ARTICLE

    Optimization Scheme of Trusted Task Offloading in IIoT Scenario Based on DQN

    Xiaojuan Wang1, Zikui Lu1,*, Siyuan Sun2, Jingyue Wang1, Luona Song3, Merveille Nicolas4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2055-2071, 2023, DOI:10.32604/cmc.2023.031750

    Abstract With the development of the Industrial Internet of Things (IIoT), end devices (EDs) are equipped with more functions to capture information. Therefore, a large amount of data is generated at the edge of the network and needs to be processed. However, no matter whether these computing tasks are offloaded to traditional central clusters or mobile edge computing (MEC) devices, the data is short of security and may be changed during transmission. In view of this challenge, this paper proposes a trusted task offloading optimization scheme that can offer low latency and high bandwidth services for IIoT with data security. Blockchain… More >

  • Open Access

    ARTICLE

    A Novel Approach for Network Vulnerability Analysis in IIoT

    K. Sudhakar*, S. Senthilkumar

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 263-277, 2023, DOI:10.32604/csse.2023.029680

    Abstract Industrial Internet of Things (IIoT) offers efficient communication among business partners and customers. With an enlargement of IoT tools connected through the internet, the ability of web traffic gets increased. Due to the raise in the size of network traffic, discovery of attacks in IIoT and malicious traffic in the early stages is a very demanding issues. A novel technique called Maximum Posterior Dichotomous Quadratic Discriminant Jaccardized Rocchio Emphasis Boost Classification (MPDQDJREBC) is introduced for accurate attack detection with minimum time consumption in IIoT. The proposed MPDQDJREBC technique includes feature selection and categorization. First, the network traffic features are collected… More >

  • Open Access

    ARTICLE

    Anomaly Detection for Industrial Internet of Things Cyberattacks

    Rehab Alanazi*, Ahamed Aljuhani

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2361-2378, 2023, DOI:10.32604/csse.2023.026712

    Abstract The evolution of the Internet of Things (IoT) has empowered modern industries with the capability to implement large-scale IoT ecosystems, such as the Industrial Internet of Things (IIoT). The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational and financial harm to organizations. To preserve the confidentiality, integrity, and availability of IIoT networks, an anomaly-based intrusion detection system (IDS) can be used to provide secure, reliable, and efficient IIoT ecosystems. In this paper, we propose an anomaly-based IDS for IIoT networks as an effective security solution to efficiently and effectively… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Based Threat Detection in Industrial Internet of Things Environment

    Fahad F. Alruwaili*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5809-5824, 2022, DOI:10.32604/cmc.2022.031613

    Abstract Internet of Things (IoT) is one of the hottest research topics in recent years, thanks to its dynamic working mechanism that integrates physical and digital world into a single system. IoT technology, applied in industries, is termed as Industrial IoT (IIoT). IIoT has been found to be highly susceptible to attacks from adversaries, based on the difficulties observed in IIoT and its increased dependency upon internet and communication network. Intentional or accidental attacks on these approaches result in catastrophic effects like power outage, denial of vital health services, disruption to civil service, etc., Thus, there is a need exists to… More >

  • Open Access

    ARTICLE

    NOMA-Based Cooperative Relaying Transmission for the Industrial Internet of Things

    Yinghua Zhang1,*, Rui Cao1, Lixin Tian1, Rong Dai2, Zhennan Cao2, Jim Feng3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6513-6534, 2022, DOI:10.32604/cmc.2022.029467

    Abstract With the continuous maturity of the fifth generation (5G) communications, industrial Internet of Things (IIoT) technology has been widely applied in fields such as smart factories. In smart factories, 5G-based production line monitoring can improve production efficiency and reduce costs, but there are problems with limited monitoring coverage and insufficient wireless spectrum resources, which restricts the application of IIoT in the construction of smart factories. In response to these problems, we propose a hybrid spectrum access mechanism based on Non-Orthogonal Multiple Access (NOMA) cooperative relaying transmission to improve the monitoring coverage and spectrum efficiency. As there are a large number… More >

  • Open Access

    ARTICLE

    Intelligent Intrusion Detection System for Industrial Internet of Things Environment

    R. Gopi1, R. Sheeba2, K. Anguraj3, T. Chelladurai4, Haya Mesfer Alshahrani5, Nadhem Nemri6,*, Tarek Lamoudan7

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1567-1582, 2023, DOI:10.32604/csse.2023.025216

    Abstract Rapid increase in the large quantity of industrial data, Industry 4.0/5.0 poses several challenging issues such as heterogeneous data generation, data sensing and collection, real-time data processing, and high request arrival rates. The classical intrusion detection system (IDS) is not a practical solution to the Industry 4.0 environment owing to the resource limitations and complexity. To resolve these issues, this paper designs a new Chaotic Cuckoo Search Optimization Algorithm (CCSOA) with optimal wavelet kernel extreme learning machine (OWKELM) named CCSOA-OWKELM technique for IDS on the Industry 4.0 platform. The CCSOA-OWKELM technique focuses on the design of feature selection with classification… More >

  • Open Access

    ARTICLE

    Anomaly Detection Framework in Fog-to-Things Communication for Industrial Internet of Things

    Tahani Alatawi*, Ahamed Aljuhani

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1067-1086, 2022, DOI:10.32604/cmc.2022.029283

    Abstract The rapid development of the Internet of Things (IoT) in the industrial domain has led to the new term the Industrial Internet of Things (IIoT). The IIoT includes several devices, applications, and services that connect the physical and virtual space in order to provide smart, cost-effective, and scalable systems. Although the IIoT has been deployed and integrated into a wide range of industrial control systems, preserving security and privacy of such a technology remains a big challenge. An anomaly-based Intrusion Detection System (IDS) can be an effective security solution for maintaining the confidentiality, integrity, and availability of data transmitted in… More >

  • Open Access

    ARTICLE

    A Sustainable WSN System with Heuristic Schemes in IIoT

    Wenjun Li1, Siyang Zhang1, Guangwei Wu2, Aldosary Saad3, Amr Tolba3,4, Gwang-jun Kim5,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4215-4231, 2022, DOI:10.32604/cmc.2022.024204

    Abstract Recently, the development of Industrial Internet of Things has taken the advantage of 5G network to be more powerful and more intelligent. However, the upgrading of 5G network will cause a variety of issues increase, one of them is the increased cost of coverage. In this paper, we propose a sustainable wireless sensor networks system, which avoids the problems brought by 5G network system to some extent. In this system, deploying relays and selecting routing are for the sake of communication and charging. The main aim is to minimize the total energy-cost of communication under the precondition, where each terminal… More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning Enabled Intrusion Detection in Clustered IIoT Environment

    Radwa Marzouk1, Fadwa Alrowais2, Noha Negm3, Mimouna Abdullah Alkhonaini4, Manar Ahmed Hamza5,*, Mohammed Rizwanullah5, Ishfaq Yaseen5, Abdelwahed Motwakel5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3763-3775, 2022, DOI:10.32604/cmc.2022.027483

    Abstract Industrial Internet of Things (IIoT) is an emerging field which connects digital equipment as well as services to physical systems. Intrusion detection systems (IDS) can be designed to protect the system from intrusions or attacks. In this view, this paper presents a novel hybrid deep learning with metaheuristics enabled intrusion detection (HDL-MEID) technique for clustered IIoT environments. The HDL-MEID model mainly intends to organize the IIoT devices into clusters and enabled secure communication. Primarily, the HDL-MEID technique designs a new chaotic mayfly optimization (CMFO) based clustering approach for the effective choice of the Cluster Heads (CH) and organize clusters. Moreover,… More >

  • Open Access

    ARTICLE

    An Efficient Security Solution for Industrial Internet of Things Applications

    Alaa Omran Almagrabi*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3961-3983, 2022, DOI:10.32604/cmc.2022.026513

    Abstract The Industrial Internet of Things (IIoT) has been growing for presentations in industry in recent years. Security for the IIoT has unavoidably become a problem in terms of creating safe applications. Due to continual needs for new functionality, such as foresight, the number of linked devices in the industrial environment increases. Certification of fewer signatories gives strong authentication solutions and prevents trustworthy third parties from being publicly certified among available encryption instruments. Hence this blockchain-based endpoint protection platform (BCEPP) has been proposed to validate the network policies and reduce overall latency in isolation or hold endpoints. A resolver supports the… More >

Displaying 11-20 on page 2 of 28. Per Page