2021
DOI: 10.1007/s00521-021-05990-z
|View full text |Cite
|
Sign up to set email alerts
|

Design and verification of secure communication scheme for industrial IoT intelligent production line system with multi-path redundancy and collaboration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…• IntroducesanewimprovedK-means+SMOTEbasedoversamplingforsolvingtheoversampling problems. In Li, et al, 2021 In this study, they have developed a redundant collaboration secure communication scheme (TS-RCSCS) for IIoT smart manufacturing line systems. This approach presents a superfluous transmission method based on multiple auxiliary pathways and creates a redundant-synergysafecommunicationmodelbasedonthepeaksignaturestechnique.Thisstrategy may successfully avoid state data transfer interruption due by wireless transmission component failuresinIIoTsmartmanufacturinglinesystems,reducingthelikelihoodofdatapacketbecoming capturedbyhostilenodes.…”
Section: Industrial Iot (Iiot) Network: Ids Requirementmentioning
confidence: 99%
See 1 more Smart Citation
“…• IntroducesanewimprovedK-means+SMOTEbasedoversamplingforsolvingtheoversampling problems. In Li, et al, 2021 In this study, they have developed a redundant collaboration secure communication scheme (TS-RCSCS) for IIoT smart manufacturing line systems. This approach presents a superfluous transmission method based on multiple auxiliary pathways and creates a redundant-synergysafecommunicationmodelbasedonthepeaksignaturestechnique.Thisstrategy may successfully avoid state data transfer interruption due by wireless transmission component failuresinIIoTsmartmanufacturinglinesystems,reducingthelikelihoodofdatapacketbecoming capturedbyhostilenodes.…”
Section: Industrial Iot (Iiot) Network: Ids Requirementmentioning
confidence: 99%
“…effectivelywiththeirclientsandpartners (Althobaiti,et al,2021;Selim,et al,2021;Li,et al,2021).Industrial4.0seekstosolveindustryproductivitychallengesviatheuseof data-drivensolutionsandsmartdevices.Improvedefficiencyaswellasimprovementsthroughout productioncanindeedbeachievedusingthisknowledge.Thisextendedconnection,nevertheless, exposesthoselinkeddevicestodistinctcyber-threats.Cybercriminalshavebecomemoreproficient asmanufacturingsitesbecomeincreasinglynetworked.Theterm"industrialcontrolsystem"refers tothenumeroustypesofcontrolfunctionsaswellasintegratedcomponentsusedonlytomanage manufacturingprocesses.TheICShasindeedbeensubjectedtoanupsurgeincyber-attacksthatalso haveresultedinavarietyofproblems.Safetyprecautionsthatareineffectivehavesuchanegative effectonworkersaswellastheorganisation.Productiondelays,damagetobuildings,healthand compensationexpenditures,materialsexpenses,companysetbacks,legalfees,andequipmentand materialsinjuryarejustafewoftheconsequences.Intrusiondetectionsystems(IDS)uncoversecurity flawsintrafficonthenetworkandnetworkinfrastructure.Itcanalsobeusedtodiscoverwhether attackerscommenceexploringequipment,whichwouldbethefirststeptowardsbuildingtrustworthy IIoT (Basheer,et al,2021;Saigopal,et al,2020;Koroniotis,et al,2021;Wadsworth,et al,2019). The IDS system involves gathering network activity, accounting records, log management, and informationacrossnetworkimportantaspectstodeterminewhetherthenetworkinghasanysecurity vulnerabilities.TheIDSapproachforIIoTmustbetailoredtowardsthetypeoftheinstruments.To increasetheefficiencyofIIoToperations,deeplearningapproachesareemployedalongsideIoT.…”
mentioning
confidence: 99%
“…Reference [5] studies the communication delay in the economic dispatch of the power system. Reference [6] studies the adverse effects of communication delay on economic dispatch. It concludes that communication delays affect the convergence speed of the system, and in severe cases, they can even lead to the failure of the system to converge.…”
Section: Introductionmentioning
confidence: 99%
“…The ZTNA security framework detects the management issues that are presented in Industry 5.0. ZTNA provides a secure authentication policy that prevents third-party members from accessing the network [11]. ZTNA-based applications are also used in Industry 5.0.…”
Section: Introductionmentioning
confidence: 99%