首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
    
The rapid growth of the Internet of Things (IoT) in the industrialsector has given rise to a new term: the Industrial Internet of Things (IIoT).The IIoT is a collection of devices, apps, and services that connect physical and virtual worlds to create smart, cost-effective, and scalable systems.Although the IIoT has been implemented and incorporated into a wide rangeof industrial control systems, maintaining its security and privacy remainsa significant concern. In the IIoT contexts, an intrusion detection system(IDS) can be an effective security solution for ensuring data confidentiality,integrity, and availability. In this paper, we propose an intelligent intrusiondetection technique that uses principal components analysis (PCA) as afeature engineering method to choose the most significant features, minimizedata dimensionality, and enhance detection performance. In the classificationphase, we use clustering algorithms such as K-medoids and K-means todetermine whether a given flow of IIoT traffic is normal or attack for binaryclassification and identify the group of cyberattacks according to its specifictype for multi-class classification. To validate the effectiveness and robustnessof our proposed model, we validate the detection method on a new drivenIIoT dataset called X-IIoTID. The performance results showed our proposeddetection model obtained a higher accuracy rate of 99.79% and reduced errorrate of 0.21% when compared to existing techniques.  相似文献   

2.
    
This paper presents a comprehensive review of emerging technologies for the internet of things(IoT)-based smart agriculture.We begin by summarizing the existing surveys and describing emergent technologies for the agricultural IoT,such as unmanned aerial vehicles,wireless technologies,open-source IoT platforms,software defined networking(SDN),network function virtualization(NFV)technologies,cloud/fog computing,and middleware platforms.We also provide a classification of IoT applications for smart agriculture into seven categories:including smart monitoring,smart water management,agrochemicals applications,disease management,smart harvesting,supply chain management,and smart agricultural practices.Moreover,we provide a taxonomy and a side-by-side comparison of the state-ofthe-art methods toward supply chain management based on the blockchain technology for agricultural IoTs.Furthermore,we present real projects that use most of the aforementioned technologies,which demonstrate their great performance in the field of smart agriculture.Finally,we highlight open research challenges and discuss possible future research directions for agricultural IoTs.  相似文献   

3.
    
As communication technology and smart manufacturing have developed, the industrial internet of things (IIoT) has gained considerable attention from academia and industry. Wireless sensor networks (WSNs) have many advantages with broad applications in many areas including environmental monitoring, which makes it a very important part of IIoT. However, energy depletion and hardware malfunctions can lead to node failures in WSNs. The industrial environment can also impact the wireless channel transmission, leading to network reliability problems, even with tightly coupled control and data planes in traditional networks, which obviously also enhances network management cost and complexity. In this paper, we introduce a new software defined network (SDN), and modify this network to propose a framework called the improved software defined wireless sensor network (improved SD-WSN). This proposed framework can address the following issues. 1) For a large scale heterogeneous network, it solves the problem of network management and smooth merging of a WSN into IIoT. 2) The network coverage problem is solved which improves the network reliability. 3) The framework addresses node failure due to various problems, particularly related to energy consumption. Therefore, it is necessary to improve the reliability of wireless sensor networks, by developing certain schemes to reduce energy consumption and the delay time of network nodes under IIoT conditions. Experiments have shown that the improved approach significantly reduces the energy consumption of nodes and the delay time, thus improving the reliability of WSN.   相似文献   

4.
    
In industrial manufacturing, with the deep integration and development of advanced digital technologies such as industrial big data, industrial Internet and industrial artificial intelligence with manufacturing industry, the manufacturing model is gradually developing and evolving from the direction of networking, platform, integration, collaboration and ecology. Therefore, for industrial manufacturing process, the research of construction of comprehensive industrial ecosystem oriented Networked Collaborative Manufacturing Platform (NCMP) system is great industrial application value by integrating network characteristics, platform elements, integrated mechanism, collaborative model and ecological format. In this paper, the system model of NCMP is constructed from four perspectives, including network perspective, collaborative manufacturing perspective, platform perspective, and industrial ecosystem perspective. Then, a system framework of NCMP based on three chains (manufacturing chain, value chain, and industrial chain) is proposed. Three collaborative subsystems of NCMP (vertical collaboration subsystem from multi perspective, horizontal collaboration subsystem from multi process, end to end collaboration subsystem from multi operator) are constructed. At last, a comprehensive system construction for NCMP in automobile industry is giving. The research results show that the most important elements to construct NCMP are purchasing department collaboration, demand department collaboration, design collaboration, data integration between enterprises and factories, etc.  相似文献   

5.
工业互联网是国家倡导的技术方向,是“新基建”的重点领域之一,也是企业和学术界普遍关注的热点话题。工业互联网技术健康发展的关键在于能否为企业带来经济效益。从经济性的角度,结合国内外众多实践案例的经验和教训,分析了该技术对企业业务的影响、价值创造的途径和难点,并对技术的发展趋势进行了总结和分析。理论和实践都表明,工业互联网创造价值的能力与应用场景密切相关。分别针对企业内部和企业之间两类场景,分析了各自的问题、技术特点和发展前景。工业互联网平台技术是促进工业互联网发展的工具,会对我国制造业的产业生态产生重大和深远的影响。促进工业互联网的发展,需要从战略和管理的角度着眼,而不能仅仅着眼于具体技术。  相似文献   

6.
如果不联接,物联网(IoT)和工业物联网(IIoT)就会成为数十亿台设备的集合,其功能和用途有限。互联和联接到云的能力使得这些节点成为我们现在家庭、办公室、工厂和公共场所非常依赖的有用设备。虽然使用有线联接,但在许多情况下,无线技术是首选技术,但各种不同的节点类型和应用意味着没有单一的普遍方案.事实上,方案的数量在增加,包括以标准为导向的技术和在许可和无许可证频谱中运行的协议,以及专有技术。即使如此,情况也在发生变化,因为软件无线电(SDR)提供灵活性,而这种灵活性是纯硬件方案不可能做到的。  相似文献   

7.
    
The evolution of the Internet of Things (IoT) has empowered modern industries with the capability to implement large-scale IoT ecosystems, such as the Industrial Internet of Things (IIoT). The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational and financial harm to organizations. To preserve the confidentiality, integrity, and availability of IIoT networks, an anomaly-based intrusion detection system (IDS) can be used to provide secure, reliable, and efficient IIoT ecosystems. In this paper, we propose an anomaly-based IDS for IIoT networks as an effective security solution to efficiently and effectively overcome several IIoT cyberattacks. The proposed anomaly-based IDS is divided into three phases: pre-processing, feature selection, and classification. In the pre-processing phase, data cleaning and normalization are performed. In the feature selection phase, the candidates’ feature vectors are computed using two feature reduction techniques, minimum redundancy maximum relevance and neighborhood components analysis. For the final step, the modeling phase, the following classifiers are used to perform the classification: support vector machine, decision tree, k-nearest neighbors, and linear discriminant analysis. The proposed work uses a new data-driven IIoT data set called X-IIoTID. The experimental evaluation demonstrates our proposed model achieved a high accuracy rate of 99.58%, a sensitivity rate of 99.59%, a specificity rate of 99.58%, and a low false positive rate of 0.4%.  相似文献   

8.
    
The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades. Consequently, there has been a huge paradigm shift in the manufacturing and production sectors. However, this poses a challenge for cybersecurity and highlights the need to address the possible threats targeting (various pillars of) industry 4.0. However, before providing a concrete solution certain aspect need to be researched, for instance, cybersecurity threats and privacy issues in the industry. To fill this gap, this paper discusses potential solutions to cybersecurity targeting this industry and highlights the consequences of possible attacks and countermeasures (in detail). In particular, the focus of the paper is on investigating the possible cyber-attacks targeting 4 layers of IIoT that is one of the key pillars of Industry 4.0. Based on a detailed review of existing literature, in this study, we have identified possible cyber threats, their consequences, and countermeasures. Further, we have provided a comprehensive framework based on an analysis of cybersecurity and privacy challenges. The suggested framework provides for a deeper understanding of the current state of cybersecurity and sets out directions for future research and applications.  相似文献   

9.
为了提高电动车充电的安全性与稳定性,该文设计了一种基于物联网互联网的电动车充电系统,系统主要由网络层、控制层与使用层构成,具有电路监控、过载保护及插座防拔功能。系统选用STM32F407作为主控芯片,利用ESP8266进行TCP网络通讯,用户通过APP(用户终端),可以实时获取充电系统的功率值且可对充电系统下达通电、断电及开锁指令,主控芯片STM32F407通过ESP8266接收到指令后,根据指令内容完成相关操作。系统具有网络化、智能化的特点,且可扩展预约、视频监控等功能。  相似文献   

10.
通信网络的多样性导致的信息割裂是物联网物与物互联互通目标的一个障碍,物联网网关正是为解决异构网络之间互联互通而提出的,是物联网应用系统中重要的基础设备.该文介绍了一个采用面向对象思想设计的与异构网络无关的可移植、易扩展、松耦合的通用物联网网关平台G2W,旨在解决传统网关面对新的应用场景和需求适应性差的问题.G2的软件架构按照网关数据处理流程分通信抽象、数据编解码和应用服务3层,文中详细介绍了每一层的功能目标和实现方式.最后给出一个基于G2w设计的Z-GateWay网关实例和基于Z-GateWay实现的数采系统.  相似文献   

11.
    
To overcome the shortcomings of the conventional trial and error mode for new material development, a full-process collaborative design platform for steel rolling is developed based on an industrial internet of things (IIoT) system in this study. Equipment, process and product entities are modeled in both the physical domain and the cyber domain. A systematic data-driven Mamdani-type fuzzy modeling methodology is proposed to map the relationship between material chemical compositions, organizational structures, process parameters and mechanical performances. The proposed methodology employs a random forest (RF) algorithm to select important parameters from mechanism models, simulation models and production process variables, utilizes a K-means algorithm to merge diverse steel grades into sub-clusters, and implements a multi-objective particle swarm optimization (MOPSO) algorithm to further improve the fuzzy model in terms of both the structure and the membership function parameters. A dataset of 3500 steel coils collected by the prototype platform built in a large hot rolling mill is used to evaluate the performance of the proposed approach. Experiment results show that the proposed methodology performs well in predicting the yield strength, tensile strength and elongation, with the coverage probability over 90% under 10% deviation and about 70% under 5% deviation on average.  相似文献   

12.
随着物联网智慧管理平台的飞速发展,设备远程智慧服务广泛应用于各行各业.重庆某制造企业有若干分厂,每个分厂生产不同的仪表与设备,各个分厂下有不同的生产线与设备,具有分厂与生产线多、地域分布较广、设备种类众多等特点.针对该企业对于设备监测困难、无法实时监控设备运行状态、不利于企业提高产能等特点,采用基于物联网的设备智能管理...  相似文献   

13.
5G通讯技术的迅猛发展使工业物联网得到了全面提升, 工业物联网数据规模将越来越大、数据维度也越来越高, 如何高效利用流聚类进行工业物联网数据挖掘工作是一个亟需解决的问题. 提出了一种基于工业物联网数据流自适应聚类方法. 该算法利用微簇之间的高密性, 计算各微簇节点的局部密度峰值以自适应产生宏簇数; 采用引力能量函数对微...  相似文献   

14.
史洪玮 《计算机仿真》2020,37(4):102-106
在物联网环境下,智能车位锁使用传统的唤醒控制方法存在着唤醒效率低下的问题.为了解决上述问题,提出智能车位锁的感应式唤醒控制方法.引入感应式控制器,从发送端和接收端两个方面,对低频唤醒电路进行设计;根据智能车位锁的休眠参数来监测车位锁的工作状态,结合车辆的识别结果,判断车位锁对应的车位是否存在异常情况.当检测车位存在异常...  相似文献   

15.
    
The purpose of the next internet of things (IoT) is that of making available myriad of services to people by high sensing intelligent devices capable of reasoning and real time acting. The convergence of IoT and multi-agent systems (MAS) provides the opportunity to benefit from the social attitude of agents in order to perform machine-to-machine (M2M) coopera-tion among smart entities. However, the selection of reliable partners for cooperation represents a hard task in a mobile and federated context, especially because the trustworthiness of devices is largely unreferenced. The issues discussed above can be synthesized by recalling the well known concept of social resilience in IoT systems, i.e., the capability of an IoT network to resist to possible attacks by malicious agent that potentially could infect large areas of the network, spamming unreliable infor-mation and/or assuming unfair behaviors. In this sense, social resilience is devoted to face malicious activities of software agents in their social interactions, and do not deal with the correct working of the sensors and other information devices. In this setting, the use of a reputation model can be a practicable and effective solution to form local communities of agents on the basis of their social capabilities. In this paper, we propose a framework for agents operating in an IoT environment, called ResIoT, where the formation of communities for collaborative purposes is performed on the basis of agent reputation. In order to validate our approach, we performed an experimental campaign by means of a simulated framework, which allowed us to verify that, by our approach, devices have not any economic convenience to performs misleading behaviors. Moreover, further experimental results have shown that our approach is able to detect the nature of the active agents in the systems (i.e., honest and malicious), with an accuracy of not less than 11% compared to the best competitor tested and highlighting a high resilience with respect to some malicious activities.   相似文献   

16.
    
The reliability and latency requirements of wireless sensor network-based smart grid communications are met in large part by MAC protocols. Developed by IEEE, time slotted channel hopping (TSCH), a method that is effective, dependable, and predictable. However, the TSCH standard does not enable mobility and does not offer any solution for scheduling, especially in IEEE 802.15.4 TSCH, the most recent generation of extremely dependable and low-power MAC protocols. Recently, MSU-TSCH a time-frequency communication schedule was proposed to provide mobility to TSCH. Despite its distinctive qualities, MSU-TSCH has the drawback of computing the TSCH schedule at each node independently of its traffic load, which can significantly increase the communication delay. Due to this limitation, MSU-TSCH is not suitable for some delay-sensitive smart grid applications. In this article, we provide an improved MSU-TSCH-based TSCH protocol, called Mobility-TSCH, that dynamically adjusts time slot assignments based on traffic volume and latency requirement. Moreover, the protocol Mobility-TSCH adapts to topology changes and supports mobility. Additionally, it optimizes time slot allocation by prioritizing nodes closest to the sink. The performance and evaluation analysis of Mobility-TSCH compared to the original MSU-TSCH, reveal that the communication delay is greatly reduced, decreases the average end-to-end latency, the high packet delivery ratio (PDR), Increase the performance of both metrics, parent connectivity ratio (PCR) and convergence time (CT), while maintaining a minimal overhead signaling.  相似文献   

17.
    
The growing reliance of industry 4.0/5.0 on emergent technologies has dramatically increased the scope of cyber threats and data privacy issues. Recently, federated learning (FL) based intrusion detection systems (IDS) promote the detection of large-scale cyber-attacks in resource-constrained and heterogeneous industrial systems without exposing data to privacy issues. However, the inherent characteristics of the latter have led to problems such as a trusted validation and consensus of the federation, unreliability, and privacy protection of model upload. To address these challenges, this paper proposes a novel privacy-preserving secure framework, named PPSS, based on the use of blockchain-enabled FL with improved privacy, verifiability, and transparency. The PPSS framework adopts the permissioned-blockchain system to secure multi-party computation as well as to incentivize cross-silo FL based on a lightweight and energy-efficient consensus protocol named Proof-of-Federated Deep-Learning (PoFDL). Specifically, we design two federated stages for global model aggregation. The first stage uses differentially private training of Stochastic Gradient Descent (DP-SGD) to enforce privacy protection of client updates, while the second stage uses PoFDL protocol to prove and add new model-containing blocks to the blockchain. We study the performance of the proposed PPSS framework using a new cyber security dataset (Edge-IIoT dataset) in terms of detection rate, precision, accuracy, computation, and energy cost. The results demonstrate that the PPSS framework system can detect industrial IIoT attacks with high classification performance under two distribution modes, namely, non-independent and identically distributed (Non-IID) and independent and identically distributed (IID).  相似文献   

18.
医院物联网体系结构和关键技术研究   总被引:1,自引:0,他引:1  
医院物联网是物联网技术在医疗行业应用的集中体现。在简单介绍医院物联网基本概念的基础上,结合物联网机制和医院的实际特点,探讨了适用于医院物联网的体系结构,并分析了构建中的关键技术,包括医院物联网的标准建设、中间件技术及嵌入式电子病历的研究与设计等。  相似文献   

19.
基于MQTT协议的分布式泵站物联网系统设计   总被引:1,自引:0,他引:1  
为了解决自来水供水系统中分散的增压泵站运行状态的远程统一监控和数据可视化难题,设计了基于消息队列遥测传输(MQTT)协议的分布式泵站远程监测物联网(IoT)系统。系统子站点以ARM单片机为核心,实时采集现场各种传感器数据和设备运行状态(如压力、温度、变频器状态等参数),并采用PID算法自动调节变频泵运行参数,以实现恒压供水。子站点的触摸屏作为本地数据可视化和组态窗口。子站点通过4G无线传输模块和云平台进行数据通信,云平台采用B/S架构设计,方便维保人员远程通过计算机或手机等移动设备查看泵站运行状态,同时可以通过云端预留的API接口无缝接入其他智慧水务平台。该系统已经某自来水公司投入实际运行。从现场运行情况来看,该系统运行稳定、可靠,已经消除了多起设备故障隐患,极大地提升了泵站运维效率。该系统具有实施简单、便捷、成本低、可复制性高等特点,在智慧城市、智慧水务中具有广阔的应用前景。  相似文献   

20.
    
Machine-to-machine (M2M) communication is a crucial technology for collaborative manufacturing automation in the Industrial Internet of Things (IIoT)-empowered industrial networks. The new decentralized manufacturing automation paradigm features ubiquitous communication and interoperable interactions between machines. However, peer-to-peer (P2P) interoperable communications at the semantic level between industrial machines is a challenge. To address this challenge, we introduce a concept of Semantic-aware Cyber-Physical Systems (SCPSs) based on which manufacturing devices can establish semantic M2M communications. In this work, we propose a generic system architecture of SCPS and its enabling technologies. Our proposed system architecture adds a semantic layer and a communication layer to the conventional cyber-physical system (CPS) in order to maximize compatibility with the diverse CPS implementation architecture. With Semantic Web technologies as the backbone of the semantic layer, SCPSs can exchange semantic messages with maximum interoperability following the same understanding of the manufacturing context. A pilot implementation of the presented work is illustrated with a proof-of-concept case study between two semantic-aware cyber-physical machine tools. The semantic communication provided by the SCPS architecture makes ubiquitous M2M communication in a network of manufacturing devices environment possible, laying the foundation for collaborative manufacturing automation for achieving smart manufacturing. Another case study focusing on decentralized production control between machines in a workshop also proved the merits of semantic-aware M2M communication technologies.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号