Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things

    Senshan Ouyang1,2, Xiang Liu2, Lei Liu2, Shangchao Wang2, Baichuan Shao3, Yang Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 903-915, 2024, DOI:10.32604/cmes.2023.028895

    Abstract With the continuous expansion of the Industrial Internet of Things (IIoT), more and more organisations are placing large amounts of data in the cloud to reduce overheads. However, the channel between cloud servers and smart equipment is not trustworthy, so the issue of data authenticity needs to be addressed. The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems. Unfortunately, it still suffers from the problem of key exposure. In order to address this concern, this study first introduces a key-insulated scheme, SM2-KI-SIGN, based on the SM2 algorithm. This scheme boasts strong key insulation… More >

  • Open Access

    ARTICLE

    Edge Cloud Selection in Mobile Edge Computing (MEC)-Aided Applications for Industrial Internet of Things (IIoT) Services

    Dae-Young Kim1, SoYeon Lee2, MinSeung Kim2, Seokhoon Kim1,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2049-2060, 2023, DOI:10.32604/csse.2023.040473

    Abstract In many IIoT architectures, various devices connect to the edge cloud via gateway systems. For data processing, numerous data are delivered to the edge cloud. Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency. There are two types of costs for this kind of IoT network: a communication cost and a computing cost. For service efficiency, the communication cost of data transmission should be minimized, and the computing cost in the edge cloud should be also minimized. Therefore, in this paper, the communication cost for data transmission is defined as the delay factor, and the… More >

  • Open Access

    ARTICLE

    Intelligent Intrusion Detection for Industrial Internet of Things Using Clustering Techniques

    Noura Alenezi, Ahamed Aljuhani*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2899-2915, 2023, DOI:10.32604/csse.2023.036657

    Abstract The rapid growth of the Internet of Things (IoT) in the industrial sector has given rise to a new term: the Industrial Internet of Things (IIoT). The IIoT is a collection of devices, apps, and services that connect physical and virtual worlds to create smart, cost-effective, and scalable systems. Although the IIoT has been implemented and incorporated into a wide range of industrial control systems, maintaining its security and privacy remains a significant concern. In the IIoT contexts, an intrusion detection system (IDS) can be an effective security solution for ensuring data confidentiality, integrity, and availability. In this paper, we… More >

  • Open Access

    ARTICLE

    Optimization Scheme of Trusted Task Offloading in IIoT Scenario Based on DQN

    Xiaojuan Wang1, Zikui Lu1,*, Siyuan Sun2, Jingyue Wang1, Luona Song3, Merveille Nicolas4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2055-2071, 2023, DOI:10.32604/cmc.2023.031750

    Abstract With the development of the Industrial Internet of Things (IIoT), end devices (EDs) are equipped with more functions to capture information. Therefore, a large amount of data is generated at the edge of the network and needs to be processed. However, no matter whether these computing tasks are offloaded to traditional central clusters or mobile edge computing (MEC) devices, the data is short of security and may be changed during transmission. In view of this challenge, this paper proposes a trusted task offloading optimization scheme that can offer low latency and high bandwidth services for IIoT with data security. Blockchain… More >

  • Open Access

    ARTICLE

    A Novel Approach for Network Vulnerability Analysis in IIoT

    K. Sudhakar*, S. Senthilkumar

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 263-277, 2023, DOI:10.32604/csse.2023.029680

    Abstract Industrial Internet of Things (IIoT) offers efficient communication among business partners and customers. With an enlargement of IoT tools connected through the internet, the ability of web traffic gets increased. Due to the raise in the size of network traffic, discovery of attacks in IIoT and malicious traffic in the early stages is a very demanding issues. A novel technique called Maximum Posterior Dichotomous Quadratic Discriminant Jaccardized Rocchio Emphasis Boost Classification (MPDQDJREBC) is introduced for accurate attack detection with minimum time consumption in IIoT. The proposed MPDQDJREBC technique includes feature selection and categorization. First, the network traffic features are collected… More >

  • Open Access

    ARTICLE

    Anomaly Detection for Industrial Internet of Things Cyberattacks

    Rehab Alanazi*, Ahamed Aljuhani

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2361-2378, 2023, DOI:10.32604/csse.2023.026712

    Abstract The evolution of the Internet of Things (IoT) has empowered modern industries with the capability to implement large-scale IoT ecosystems, such as the Industrial Internet of Things (IIoT). The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational and financial harm to organizations. To preserve the confidentiality, integrity, and availability of IIoT networks, an anomaly-based intrusion detection system (IDS) can be used to provide secure, reliable, and efficient IIoT ecosystems. In this paper, we propose an anomaly-based IDS for IIoT networks as an effective security solution to efficiently and effectively… More >

  • Open Access

    ARTICLE

    Anomaly Detection Framework in Fog-to-Things Communication for Industrial Internet of Things

    Tahani Alatawi*, Ahamed Aljuhani

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1067-1086, 2022, DOI:10.32604/cmc.2022.029283

    Abstract The rapid development of the Internet of Things (IoT) in the industrial domain has led to the new term the Industrial Internet of Things (IIoT). The IIoT includes several devices, applications, and services that connect the physical and virtual space in order to provide smart, cost-effective, and scalable systems. Although the IIoT has been deployed and integrated into a wide range of industrial control systems, preserving security and privacy of such a technology remains a big challenge. An anomaly-based Intrusion Detection System (IDS) can be an effective security solution for maintaining the confidentiality, integrity, and availability of data transmitted in… More >

  • Open Access

    ARTICLE

    An Efficient Security Solution for Industrial Internet of Things Applications

    Alaa Omran Almagrabi*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3961-3983, 2022, DOI:10.32604/cmc.2022.026513

    Abstract The Industrial Internet of Things (IIoT) has been growing for presentations in industry in recent years. Security for the IIoT has unavoidably become a problem in terms of creating safe applications. Due to continual needs for new functionality, such as foresight, the number of linked devices in the industrial environment increases. Certification of fewer signatories gives strong authentication solutions and prevents trustworthy third parties from being publicly certified among available encryption instruments. Hence this blockchain-based endpoint protection platform (BCEPP) has been proposed to validate the network policies and reduce overall latency in isolation or hold endpoints. A resolver supports the… More >

  • Open Access

    ARTICLE

    Cyber Security and Privacy Issues in Industrial Internet of Things

    NZ Jhanjhi1, Mamoona Humayun2,*, Saleh N. Almuayqil2

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 361-380, 2021, DOI:10.32604/csse.2021.015206

    Abstract The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades. Consequently, there has been a huge paradigm shift in the manufacturing and production sectors. However, this poses a challenge for cybersecurity and highlights the need to address the possible threats targeting (various pillars of) industry 4.0. However, before providing a concrete solution certain aspect need to be researched, for instance, cybersecurity threats and privacy issues in the industry. To fill this gap, this paper discusses potential solutions to cybersecurity targeting this industry and highlights the consequences of possible attacks… More >

  • Open Access

    ARTICLE

    Robust Attack Detection Approach for IIoT Using Ensemble Classifier

    V. Priya1, I. Sumaiya Thaseen1, Thippa Reddy Gadekallu1, Mohamed K. Aboudaif2,*, Emad Abouel Nasr3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2457-2470, 2021, DOI:10.32604/cmc.2021.013852

    Abstract Generally, the risks associated with malicious threats are increasing for the Internet of Things (IoT) and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices. Thus, anomaly-based intrusion detection models for IoT networks are vital. Distinct detection methodologies need to be developed for the Industrial Internet of Things (IIoT) network as threat detection is a significant expectation of stakeholders. Machine learning approaches are considered to be evolving techniques that learn with experience, and such approaches have resulted in superior performance in various applications, such as pattern recognition, outlier analysis, and speech recognition.… More >

Displaying 1-10 on page 1 of 11. Per Page