Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (33)
  • Open Access

    ARTICLE

    Robust Attack Detection Approach for IIoT Using Ensemble Classifier

    V. Priya1, I. Sumaiya Thaseen1, Thippa Reddy Gadekallu1, Mohamed K. Aboudaif2,*, Emad Abouel Nasr3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2457-2470, 2021, DOI:10.32604/cmc.2021.013852 - 28 December 2020

    Abstract Generally, the risks associated with malicious threats are increasing for the Internet of Things (IoT) and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices. Thus, anomaly-based intrusion detection models for IoT networks are vital. Distinct detection methodologies need to be developed for the Industrial Internet of Things (IIoT) network as threat detection is a significant expectation of stakeholders. Machine learning approaches are considered to be evolving techniques that learn with experience, and such approaches have resulted in superior performance in various applications, such as pattern recognition,… More >

  • Open Access

    ARTICLE

    Blockchain-Based Data Storage Mechanism for Industrial Internet of Things

    Jin Wang1,2, Wencheng Chen1, Lei Wang3, Yongjun Ren4,*, R. Simon Sherratt5

    Intelligent Automation & Soft Computing, Vol.26, No.5, pp. 1157-1172, 2020, DOI:10.32604/iasc.2020.012174

    Abstract With the development of the Industrial Internet of Things and the continuous expansion of application scenarios, many development bottlenecks have followed. Its data security issue has become an obstacle to its widespread application. It has attracted substantial attention from both academia and industry. Blockchain technology has the characteristics of decentralization, openness and transparency and non-tampering. It has natural advantages in solving the security of the Industrial Internet of Things. Accordingly, this paper first analyzes the security risks associated with data storage in the Industrial Internet of Things and proposes the use of blockchain technology to… More >

  • Open Access

    ARTICLE

    Performance Analysis of Intelligent CR-NOMA Model for Industrial IoT Communications

    Yinghua Zhang1,2, Jian Liu1, Yunfeng Peng1, Yanfang Dong2, Changming Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 239-257, 2020, DOI:10.32604/cmes.2020.010778 - 18 September 2020

    Abstract Aiming for ultra-reliable low-latency wireless communications required in industrial internet of things (IIoT) applications, this paper studies a simple cognitive radio non-orthogonal multiple access (CR-NOMA) downlink system. This system consists of two secondary users (SUs) dynamically interfered by the primary user (PU), and its performance is characterized by the outage probability of the SU communications. This outage probability is calculated under two conditions where, a) the transmission of PU starts after the channel state information (CSI) is acquired, so the base station (BS) is oblivious of the interference, and b) when the BS is aware… More >

Displaying 31-40 on page 4 of 33. Per Page