Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21)
  • Open Access

    ARTICLE

    An Impact-Aware and Taxonomy-Driven Explainable Machine Learning Framework with Edge Computing for Security in Industrial IoT–Cyber Physical Systems

    Tamara Zhukabayeva1,2, Zulfiqar Ahmad1,3,*, Nurbolat Tasbolatuly4, Makpal Zhartybayeva1, Yerik Mardenov1,4, Nurdaulet Karabayev1,*, Dilaram Baumuratova1,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2573-2599, 2025, DOI:10.32604/cmes.2025.070426 - 26 November 2025

    Abstract The Industrial Internet of Things (IIoT), combined with the Cyber-Physical Systems (CPS), is transforming industrial automation but also poses great cybersecurity threats because of the complexity and connectivity of the systems. There is a lack of explainability, challenges with imbalanced attack classes, and limited consideration of practical edge–cloud deployment strategies in prior works. In the proposed study, we suggest an Impact-Aware Taxonomy-Driven Machine Learning Framework with Edge Deployment and SHapley Additive exPlanations (SHAP)-based Explainable AI (XAI) to attack detection and classification in IIoT-CPS settings. It includes not only unsupervised clustering (K-Means and DBSCAN) to extract… More >

  • Open Access

    ARTICLE

    Fortifying Industry 4.0 Solar Power Systems: A Blockchain-Driven Cybersecurity Framework with Immutable LightGBM

    Asrar Mahboob1, Muhammad Rashad1, Ghulam Abbas1, Zohaib Mushtaq2, Tehseen Mazhar3,*, Ateeq Ur Rehman4,*

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3805-3823, 2025, DOI:10.32604/cmc.2025.067615 - 23 September 2025

    Abstract This paper presents a novel blockchain-embedded cybersecurity framework for industrial solar power systems, integrating immutable machine learning (ML) with distributed ledger technology. Our contribution focused on three factors, Quantum-resistant feature engineering using the UNSW-NB15 dataset adapted for solar infrastructure anomalies. An enhanced Light Gradient Boosting Machine (LightGBM) classifier with blockchain-validated decision thresholds, and A cryptographic proof-of-threat (PoT) consensus mechanism for cyber attack verification. The proposed Immutable LightGBM model with majority voting and cryptographic feature encoding achieves 96.9% detection accuracy with 0.97 weighted average of precision, recall and F1-score, outperforming conventional intrusion detection systems (IDSs) by… More >

  • Open Access

    ARTICLE

    FedCognis: An Adaptive Federated Learning Framework for Secure Anomaly Detection in Industrial IoT-Enabled Cognitive Cities

    Abdulatif Alabdulatif*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1185-1220, 2025, DOI:10.32604/cmc.2025.066898 - 29 August 2025

    Abstract FedCognis is a secure and scalable federated learning framework designed for continuous anomaly detection in Industrial Internet of Things-enabled Cognitive Cities (IIoTCC). It introduces two key innovations: a Quantum Secure Authentication (QSA) mechanism for adversarial defense and integrity validation, and a Self-Attention Long Short-Term Memory (SALSTM) model for high-accuracy spatiotemporal anomaly detection. Addressing core challenges in traditional Federated Learning (FL)—such as model poisoning, communication overhead, and concept drift—FedCognis integrates dynamic trust-based aggregation and lightweight cryptographic verification to ensure secure, real-time operation across heterogeneous IIoT domains including utilities, public safety, and traffic systems. Evaluated on the More >

  • Open Access

    ARTICLE

    IECC-SAIN: Innovative ECC-Based Approach for Secure Authentication in IoT Networks

    Younes Lahraoui1, Jihane Jebrane2, Youssef Amal1, Saiida Lazaar1, Cheng-Chi Lee3,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.1, pp. 615-641, 2025, DOI:10.32604/cmes.2025.067778 - 31 July 2025

    Abstract Due to their resource constraints, Internet of Things (IoT) devices require authentication mechanisms that are both secure and efficient. Elliptic curve cryptography (ECC) meets these needs by providing strong security with shorter key lengths, which significantly reduces the computational overhead required for authentication algorithms. This paper introduces a novel ECC-based IoT authentication system utilizing our previously proposed efficient mapping and reverse mapping operations on elliptic curves over prime fields. By reducing reliance on costly point multiplication, the proposed algorithm significantly improves execution time, storage requirements, and communication cost across varying security levels. The proposed authentication… More >

  • Open Access

    ARTICLE

    A Black-Box Speech Adversarial Attack Method Based on Enhanced Neural Predictors in Industrial IoT

    Yun Zhang, Zhenhua Yu*, Xufei Hu, Xuya Cong, Ou Ye

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5403-5426, 2025, DOI:10.32604/cmc.2025.067120 - 30 July 2025

    Abstract Devices in Industrial Internet of Things are vulnerable to voice adversarial attacks. Studying adversarial speech samples is crucial for enhancing the security of automatic speech recognition systems in Industrial Internet of Things devices. Current black-box attack methods often face challenges such as complex search processes and excessive perturbation generation. To address these issues, this paper proposes a black-box voice adversarial attack method based on enhanced neural predictors. This method searches for minimal perturbations in the perturbation space, employing an optimization process guided by a self-attention neural predictor to identify the optimal perturbation direction. This direction… More >

  • Open Access

    ARTICLE

    An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment

    Tarak Dhaouadi1, Hichem Mrabet1,2,*, Adeeb Alhomoud3, Abderrazak Jemai1,4

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4535-4554, 2025, DOI:10.32604/cmc.2025.060935 - 06 March 2025

    Abstract The increasing adoption of Industrial Internet of Things (IIoT) systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems (IDS) to be effective. However, existing datasets for IDS training often lack relevance to modern IIoT environments, limiting their applicability for research and development. To address the latter gap, this paper introduces the HiTar-2024 dataset specifically designed for IIoT systems. As a consequence, that can be used by an IDS to detect imminent threats. Likewise, HiTar-2024 was generated using the AREZZO simulator, which replicates realistic smart manufacturing scenarios.… More >

  • Open Access

    ARTICLE

    Backdoor Malware Detection in Industrial IoT Using Machine Learning

    Maryam Mahsal Khan1, Attaullah Buriro2, Tahir Ahmad3,*, Subhan Ullah4

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4691-4705, 2024, DOI:10.32604/cmc.2024.057648 - 19 December 2024

    Abstract With the ever-increasing continuous adoption of Industrial Internet of Things (IoT) technologies, security concerns have grown exponentially, especially regarding securing critical infrastructures. This is primarily due to the potential for backdoors to provide unauthorized access, disrupt operations, and compromise sensitive data. Backdoors pose a significant threat to the integrity and security of Industrial IoT setups by exploiting vulnerabilities and bypassing standard authentication processes. Hence its detection becomes of paramount importance. This paper not only investigates the capabilities of Machine Learning (ML) models in identifying backdoor malware but also evaluates the impact of balancing the dataset More >

  • Open Access

    ARTICLE

    Evaluation of Industrial IoT Service Providers with TOPSIS Based on Circular Intuitionistic Fuzzy Sets

    Elif Çaloğlu Büyükselçuk*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 715-746, 2024, DOI:10.32604/cmc.2024.052509 - 18 July 2024

    Abstract Industrial Internet of Things (IIoT) service providers have become increasingly important in the manufacturing industry due to their ability to gather and process vast amounts of data from connected devices, enabling manufacturers to improve operational efficiency, reduce costs, and enhance product quality. These platforms provide manufacturers with real-time visibility into their production processes and supply chains, allowing them to optimize operations and make informed decisions. In addition, IIoT service providers can help manufacturers create new revenue streams through the development of innovative products and services and enable them to leverage the benefits of emerging technologies… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment

    Khaled M. Alalayah1, Fatma S. Alrayes2, Jaber S. Alzahrani3, Khadija M. Alaidarous1, Ibrahim M. Alwayle1, Heba Mohsen4, Ibrahim Abdulrab Ahmed5, Mesfer Al Duhayyim6,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3121-3139, 2023, DOI:10.32604/csse.2023.036352 - 03 April 2023

    Abstract With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further,… More >

  • Open Access

    ARTICLE

    Digital Twin-Based Automated Fault Diagnosis in Industrial IoT Applications

    Samah Alshathri1, Ezz El-Din Hemdan2, Walid El-Shafai3,4,*, Amged Sayed5,6

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 183-196, 2023, DOI:10.32604/cmc.2023.034048 - 06 February 2023

    Abstract In recent years, Digital Twin (DT) has gained significant interest from academia and industry due to the advanced in information technology, communication systems, Artificial Intelligence (AI), Cloud Computing (CC), and Industrial Internet of Things (IIoT). The main concept of the DT is to provide a comprehensive tangible, and operational explanation of any element, asset, or system. However, it is an extremely dynamic taxonomy developing in complexity during the life cycle that produces a massive amount of engendered data and information. Likewise, with the development of AI, digital twins can be redefined and could be a… More >

Displaying 1-10 on page 1 of 21. Per Page