Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (37)
  • Open Access

    REVIEW

    Enhancing Internet of Things Intrusion Detection Using Artificial Intelligence

    Shachar Bar1, P. W. C. Prasad2, Md Shohel Sayeed3,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1-23, 2024, DOI:10.32604/cmc.2024.053861 - 15 October 2024

    Abstract Escalating cyber security threats and the increased use of Internet of Things (IoT) devices require utilisation of the latest technologies available to supply adequate protection. The aim of Intrusion Detection Systems (IDS) is to prevent malicious attacks that corrupt operations and interrupt data flow, which might have significant impact on critical industries and infrastructure. This research examines existing IDS, based on Artificial Intelligence (AI) for IoT devices, methods, and techniques. The contribution of this study consists of identification of the most effective IDS systems in terms of accuracy, precision, recall and F1-score; this research also… More >

  • Open Access

    ARTICLE

    Blockchain-Based Certificateless Cross-Domain Authentication Scheme in the Industrial Internet of Things

    Zhaobin Li*, Xiantao Liu*, Nan Zhang, Zhanzhen Wei

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3835-3854, 2024, DOI:10.32604/cmc.2024.053950 - 12 September 2024

    Abstract The Industrial Internet of Things (IIoT) consists of massive devices in different management domains, and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange. To address the above challenges, a viable solution that combines Certificateless Public Key Cryptography (CL-PKC) with blockchain technology can be utilized. However, as many existing schemes rely on a single Key Generation Center (KGC), they are prone to problems such as single points of failure and high computational overhead. In this case, this paper proposes a novel blockchain-based certificateless cross-domain authentication… More >

  • Open Access

    ARTICLE

    Multivariate Time Series Anomaly Detection Based on Spatial-Temporal Network and Transformer in Industrial Internet of Things

    Mengmeng Zhao1,2,3, Haipeng Peng1,2,*, Lixiang Li1,2, Yeqing Ren1,2

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2815-2837, 2024, DOI:10.32604/cmc.2024.053765 - 15 August 2024

    Abstract In the Industrial Internet of Things (IIoT), sensors generate time series data to reflect the working state. When the systems are attacked, timely identification of outliers in time series is critical to ensure security. Although many anomaly detection methods have been proposed, the temporal correlation of the time series over the same sensor and the state (spatial) correlation between different sensors are rarely considered simultaneously in these methods. Owing to the superior capability of Transformer in learning time series features. This paper proposes a time series anomaly detection method based on a spatial-temporal network and… More >

  • Open Access

    ARTICLE

    Blockchain-Enabled Federated Learning for Privacy-Preserving Non-IID Data Sharing in Industrial Internet

    Qiuyan Wang, Haibing Dong*, Yongfei Huang, Zenglei Liu, Yundong Gou

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1967-1983, 2024, DOI:10.32604/cmc.2024.052775 - 15 August 2024

    Abstract Sharing data while protecting privacy in the industrial Internet is a significant challenge. Traditional machine learning methods require a combination of all data for training; however, this approach can be limited by data availability and privacy concerns. Federated learning (FL) has gained considerable attention because it allows for decentralized training on multiple local datasets. However, the training data collected by data providers are often non-independent and identically distributed (non-IID), resulting in poor FL performance. This paper proposes a privacy-preserving approach for sharing non-IID data in the industrial Internet using an FL approach based on blockchain… More >

  • Open Access

    ARTICLE

    Intrusion Detection System for Smart Industrial Environments with Ensemble Feature Selection and Deep Convolutional Neural Networks

    Asad Raza1,*, Shahzad Memon1, Muhammad Ali Nizamani1, Mahmood Hussain Shah2

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 545-566, 2024, DOI:10.32604/iasc.2024.051779 - 11 July 2024

    Abstract Smart Industrial environments use the Industrial Internet of Things (IIoT) for their routine operations and transform their industrial operations with intelligent and driven approaches. However, IIoT devices are vulnerable to cyber threats and exploits due to their connectivity with the internet. Traditional signature-based IDS are effective in detecting known attacks, but they are unable to detect unknown emerging attacks. Therefore, there is the need for an IDS which can learn from data and detect new threats. Ensemble Machine Learning (ML) and individual Deep Learning (DL) based IDS have been developed, and these individual models achieved… More >

  • Open Access

    REVIEW

    A Review of Hybrid Cyber Threats Modelling and Detection Using Artificial Intelligence in IIoT

    Yifan Liu1, Shancang Li1,*, Xinheng Wang2, Li Xu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1233-1261, 2024, DOI:10.32604/cmes.2024.046473 - 20 May 2024

    Abstract The Industrial Internet of Things (IIoT) has brought numerous benefits, such as improved efficiency, smart analytics, and increased automation. However, it also exposes connected devices, users, applications, and data generated to cyber security threats that need to be addressed. This work investigates hybrid cyber threats (HCTs), which are now working on an entirely new level with the increasingly adopted IIoT. This work focuses on emerging methods to model, detect, and defend against hybrid cyber attacks using machine learning (ML) techniques. Specifically, a novel ML-based HCT modelling and analysis framework was proposed, in which regularisation and Random Forest were More >

  • Open Access

    ARTICLE

    An Industrial Intrusion Detection Method Based on Hybrid Convolutional Neural Networks with Improved TCN

    Zhihua Liu, Shengquan Liu*, Jian Zhang

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 411-433, 2024, DOI:10.32604/cmc.2023.046237 - 30 January 2024

    Abstract Network intrusion detection systems (NIDS) based on deep learning have continued to make significant advances. However, the following challenges remain: on the one hand, simply applying only Temporal Convolutional Networks (TCNs) can lead to models that ignore the impact of network traffic features at different scales on the detection performance. On the other hand, some intrusion detection methods consider multi-scale information of traffic data, but considering only forward network traffic information can lead to deficiencies in capturing multi-scale temporal features. To address both of these issues, we propose a hybrid Convolutional Neural Network that supports… More >

  • Open Access

    ARTICLE

    An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things

    Senshan Ouyang1,2, Xiang Liu2, Lei Liu2, Shangchao Wang2, Baichuan Shao3, Yang Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 903-915, 2024, DOI:10.32604/cmes.2023.028895 - 22 September 2023

    Abstract With the continuous expansion of the Industrial Internet of Things (IIoT), more and more organisations are placing large amounts of data in the cloud to reduce overheads. However, the channel between cloud servers and smart equipment is not trustworthy, so the issue of data authenticity needs to be addressed. The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems. Unfortunately, it still suffers from the problem of key exposure. In order to address this concern, this study first introduces a key-insulated scheme, SM2-KI-SIGN, based on the SM2 algorithm. This More >

  • Open Access

    ARTICLE

    AID4I: An Intrusion Detection Framework for Industrial Internet of Things Using Automated Machine Learning

    Anıl Sezgin1,2,*, Aytuğ Boyacı3

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2121-2143, 2023, DOI:10.32604/cmc.2023.040287 - 30 August 2023

    Abstract By identifying and responding to any malicious behavior that could endanger the system, the Intrusion Detection System (IDS) is crucial for preserving the security of the Industrial Internet of Things (IIoT) network. The benefit of anomaly-based IDS is that they are able to recognize zero-day attacks due to the fact that they do not rely on a signature database to identify abnormal activity. In order to improve control over datasets and the process, this study proposes using an automated machine learning (AutoML) technique to automate the machine learning processes for IDS. Our ground-breaking architecture, known… More >

  • Open Access

    ARTICLE

    Edge Cloud Selection in Mobile Edge Computing (MEC)-Aided Applications for Industrial Internet of Things (IIoT) Services

    Dae-Young Kim1, SoYeon Lee2, MinSeung Kim2, Seokhoon Kim1,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2049-2060, 2023, DOI:10.32604/csse.2023.040473 - 28 July 2023

    Abstract In many IIoT architectures, various devices connect to the edge cloud via gateway systems. For data processing, numerous data are delivered to the edge cloud. Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency. There are two types of costs for this kind of IoT network: a communication cost and a computing cost. For service efficiency, the communication cost of data transmission should be minimized, and the computing cost in the edge cloud should be also minimized. Therefore, in this paper, the communication cost for data transmission is defined as… More >

Displaying 1-10 on page 1 of 37. Per Page