Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (34)
  • Open Access

    ARTICLE

    Artificial Intelligence Based Threat Detection in Industrial Internet of Things Environment

    Fahad F. Alruwaili*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5809-5824, 2022, DOI:10.32604/cmc.2022.031613 - 28 July 2022

    Abstract Internet of Things (IoT) is one of the hottest research topics in recent years, thanks to its dynamic working mechanism that integrates physical and digital world into a single system. IoT technology, applied in industries, is termed as Industrial IoT (IIoT). IIoT has been found to be highly susceptible to attacks from adversaries, based on the difficulties observed in IIoT and its increased dependency upon internet and communication network. Intentional or accidental attacks on these approaches result in catastrophic effects like power outage, denial of vital health services, disruption to civil service, etc., Thus, there… More >

  • Open Access

    ARTICLE

    NOMA-Based Cooperative Relaying Transmission for the Industrial Internet of Things

    Yinghua Zhang1,*, Rui Cao1, Lixin Tian1, Rong Dai2, Zhennan Cao2, Jim Feng3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6513-6534, 2022, DOI:10.32604/cmc.2022.029467 - 28 July 2022

    Abstract With the continuous maturity of the fifth generation (5G) communications, industrial Internet of Things (IIoT) technology has been widely applied in fields such as smart factories. In smart factories, 5G-based production line monitoring can improve production efficiency and reduce costs, but there are problems with limited monitoring coverage and insufficient wireless spectrum resources, which restricts the application of IIoT in the construction of smart factories. In response to these problems, we propose a hybrid spectrum access mechanism based on Non-Orthogonal Multiple Access (NOMA) cooperative relaying transmission to improve the monitoring coverage and spectrum efficiency. As… More >

  • Open Access

    ARTICLE

    Anomaly Detection Framework in Fog-to-Things Communication for Industrial Internet of Things

    Tahani Alatawi*, Ahamed Aljuhani

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1067-1086, 2022, DOI:10.32604/cmc.2022.029283 - 18 May 2022

    Abstract The rapid development of the Internet of Things (IoT) in the industrial domain has led to the new term the Industrial Internet of Things (IIoT). The IIoT includes several devices, applications, and services that connect the physical and virtual space in order to provide smart, cost-effective, and scalable systems. Although the IIoT has been deployed and integrated into a wide range of industrial control systems, preserving security and privacy of such a technology remains a big challenge. An anomaly-based Intrusion Detection System (IDS) can be an effective security solution for maintaining the confidentiality, integrity, and… More >

  • Open Access

    ARTICLE

    A Sustainable WSN System with Heuristic Schemes in IIoT

    Wenjun Li1, Siyang Zhang1, Guangwei Wu2, Aldosary Saad3, Amr Tolba3,4, Gwang-jun Kim5,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4215-4231, 2022, DOI:10.32604/cmc.2022.024204 - 21 April 2022

    Abstract Recently, the development of Industrial Internet of Things has taken the advantage of 5G network to be more powerful and more intelligent. However, the upgrading of 5G network will cause a variety of issues increase, one of them is the increased cost of coverage. In this paper, we propose a sustainable wireless sensor networks system, which avoids the problems brought by 5G network system to some extent. In this system, deploying relays and selecting routing are for the sake of communication and charging. The main aim is to minimize the total energy-cost of communication under More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning Enabled Intrusion Detection in Clustered IIoT Environment

    Radwa Marzouk1, Fadwa Alrowais2, Noha Negm3, Mimouna Abdullah Alkhonaini4, Manar Ahmed Hamza5,*, Mohammed Rizwanullah5, Ishfaq Yaseen5, Abdelwahed Motwakel5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3763-3775, 2022, DOI:10.32604/cmc.2022.027483 - 29 March 2022

    Abstract Industrial Internet of Things (IIoT) is an emerging field which connects digital equipment as well as services to physical systems. Intrusion detection systems (IDS) can be designed to protect the system from intrusions or attacks. In this view, this paper presents a novel hybrid deep learning with metaheuristics enabled intrusion detection (HDL-MEID) technique for clustered IIoT environments. The HDL-MEID model mainly intends to organize the IIoT devices into clusters and enabled secure communication. Primarily, the HDL-MEID technique designs a new chaotic mayfly optimization (CMFO) based clustering approach for the effective choice of the Cluster Heads More >

  • Open Access

    ARTICLE

    An Efficient Security Solution for Industrial Internet of Things Applications

    Alaa Omran Almagrabi*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3961-3983, 2022, DOI:10.32604/cmc.2022.026513 - 29 March 2022

    Abstract The Industrial Internet of Things (IIoT) has been growing for presentations in industry in recent years. Security for the IIoT has unavoidably become a problem in terms of creating safe applications. Due to continual needs for new functionality, such as foresight, the number of linked devices in the industrial environment increases. Certification of fewer signatories gives strong authentication solutions and prevents trustworthy third parties from being publicly certified among available encryption instruments. Hence this blockchain-based endpoint protection platform (BCEPP) has been proposed to validate the network policies and reduce overall latency in isolation or hold… More >

  • Open Access

    ARTICLE

    Metaheuristic Resource Allocation Strategy for Cluster Based 6G Industrial Applications

    Anwer Mustafa Hilal1,*, Lamia Osman Widaa2, Fahd N. Al-Wesabi3, Mohammad Medani3, Manar Ahmed Hamza1, Mesfer Al Duhayyim4

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 667-681, 2022, DOI:10.32604/cmc.2022.021338 - 03 November 2021

    Abstract The emergence of Beyond 5G (B5G) and 6G networks translated personal and industrial operations highly effective, reliable, and gainful by speeding up the growth of next generation Internet of Things (IoT). Industrial equipment in 6G encompasses a huge number of wireless sensors, responsible for collecting massive quantities of data. At the same time, 6G network can take real-world intelligent decisions and implement automated equipment operations. But the inclusion of different technologies into the system increased its energy consumption for which appropriate measures need to be taken. This has become mandatory for optimal resource allocation in… More >

  • Open Access

    ARTICLE

    An Intelligent Hybrid Mutual Authentication Scheme for Industrial Internet of Thing Networks

    Muhammad Adil1, Jehad Ali2, Muhammad Sajjad Khan3, Junsu Kim3, Ryan Alturki4, Mohammad Zakarya4, Mukhtaj Khan4, Rahim Khan4, Su Min Kim3,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 447-470, 2021, DOI:10.32604/cmc.2021.014967 - 22 March 2021

    Abstract Internet of Things (IoT) network used for industrial management is vulnerable to different security threats due to its unstructured deployment, and dynamic communication behavior. In literature various mechanisms addressed the security issue of Industrial IoT networks, but proper maintenance of the performance reliability is among the common challenges. In this paper, we proposed an intelligent mutual authentication scheme leveraging authentication aware node (AAN) and base station (BS) to identify routing attacks in Industrial IoT networks. The AAN and BS uses the communication parameter such as a route request (RREQ), node-ID, received signal strength (RSS), and More >

  • Open Access

    ARTICLE

    Cyber Security and Privacy Issues in Industrial Internet of Things

    NZ Jhanjhi1, Mamoona Humayun2,*, Saleh N. Almuayqil2

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 361-380, 2021, DOI:10.32604/csse.2021.015206 - 08 March 2021

    Abstract The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades. Consequently, there has been a huge paradigm shift in the manufacturing and production sectors. However, this poses a challenge for cybersecurity and highlights the need to address the possible threats targeting (various pillars of) industry 4.0. However, before providing a concrete solution certain aspect need to be researched, for instance, cybersecurity threats and privacy issues in the industry. To fill this gap, this paper discusses potential solutions to cybersecurity targeting this industry and highlights… More >

  • Open Access

    ARTICLE

    Social Distancing and Isolation Management Using Machine-to-Machine Technologies to Prevent Pandemics

    Muhammad Saad1, Maaz Bin Ahmad1, Muhammad Asif2,*, Khalid Masood2, Mohammad A. Al Ghamdi3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3545-3562, 2021, DOI:10.32604/cmc.2021.015720 - 01 March 2021

    Abstract Social distancing and self-isolation management are crucial preventive measures that can save millions of lives during challenging pandemics of diseases such as the Spanish flu, swine flu, and coronavirus disease 2019 (COVID-19). This study describes the comprehensive and effective implementation of the Industrial Internet of Things and machine-to-machine technologies for social distancing and smart self-isolation management. These technologies can help prevent outbreaks of any disease that can disperse widely and develop into a pandemic. Initially, a smart wristband is proposed that incorporates Bluetooth beacon technology to facilitate the tracing and tracking of Bluetooth Low Energy… More >

Displaying 21-30 on page 3 of 34. Per Page