139
Views
0
CrossRef citations to date
0
Altmetric
Special Issue: SI-Machine Learning Methods for Cloud Based IOT Applications for Manufacturing

Application of internet of things-based efficient security solution for industrial

, , , , &
Received 03 Sep 2022, Accepted 30 Dec 2022, Published online: 01 Feb 2023

References

  • Abdel-Basset, M., G. Manogaran, and M. Mohamed. 2018. “Internet of Things (IoT) and Its Impact on Supply Chain: A Framework for Building Smart, Secure and Efficient Systems.” Future Generation Computer Systems 86: 614–628. doi:10.1016/j.future.2018.04.051.
  • Abdel-Basset, M., R. Mohamed, M. Elhoseny, A. K. Bashir, A. Jolfaei, and N. Kumar. 2021. “Energy-Aware Marine Predators Algorithm for Task Scheduling in IoT-Based Fog Computing Applications.” IEEE Transactions on Industrial Informatics 17 (7): 5068–5076. doi:10.1109/TII.2020.3001067.
  • Abuhasel, K. A., and M. A. Khan. 2020. “A secure Industrial Internet of Things (IIoT) Framework for Resource Management in Smart Manufacturing.” IEEE Access 8: 117354–117364. doi:10.1109/ACCESS.2020.3004711.
  • Ali, M. H. 1 2014. “Towards a Exceptional Distributed Database Model for Multi DBMS.” In Advanced Computer and Communication Engineering Technology. Lecture Notes in Electrical Engineering, edited by H. Sulaiman, M. Othman, M. Othman, Y. Rahim, and N. Pee, 553–560. Cham: Springer.
  • Ali, M. H., and M. F. Zolkipli. 2016. “Review on Hybrid Extreme Learning Machine and Genetic Algorithm to Work as Intrusion Detection System in Cloud Computing.” ARPN Journal of Engineering and Applied Sciences 11 (1): 460–464.
  • Ali, M. H., and M. F. Zolkipli. 2019. “Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System.” In Intelligent Computing & Optimization. ICO 2018. Advances in Intelligent Systems and Computing, edited by P. Vasant, I. Zelinka, and G. W. Weber. Cham: Springer. doi:10.1007/978-3-030-00979-3.
  • Ali, M. H., and M. Mohammed. 2016. “Optimize Machine Learning Based Intrusion Detection for Cloud Computing: Review Paper.” Journal of Engineering and Applied Sciences 11 (4): 3254–3264. doi:10.3923/jeasci.2016.3254.3264.
  • Arachchige, P. C. M., P. Bertok, I. Khalil, D. Liu, S. Camtepe, and M. Atiquzzaman. 2020. “A trustworthy Privacy Preserving Framework for Machine Learning in Industrial Iot Systems.” IEEE Transactions on Industrial Informatics 16 (9): 6092–6102. doi:10.1109/TII.2020.2974555.
  • Bera, B., D. Chattaraj, and A. K. Das. 2020. “Designing secure Blockchain-Based Access Control Scheme in IoT-Enabled Internet of Drones Deployment.” Computer Communications 153: 229–249. doi:10.1016/j.comcom.2020.02.011.
  • Bi, D., S. Kadry, and P. M. Kumar. 2020. “Internet of Things Assisted Public Security Management Platform for Urban Transportation Using Hybridised Cryptographic‐Integrated Steganography.” IET Intelligent Transport Systems 14 (11): 1497–1506. doi:10.1049/iet-its.2019.0833.
  • Costa, Felipe S., Silvia M. Nassar, Sergio Gusmeroli, Ralph Schultz, André G. S. Conceição, Miguel Xavier, Fabiano Hessel, and Mario A. R. Dantas. 2020. “FASTEN IIoT: An Open Real-Time Platform for Vertical, Horizontal and End-to-End Integration.” Sensors 20 (19): 5499. doi:10.3390/s20195499.
  • Do, D. T., M. S. Van Nguyen, T. N. Nguyen, X. Li, and K. Choi. 2020. “Enabling multiple Power Beacons for Uplink of Noma-Enabled Mobile Edge Computing in Wirelessly Powered IOT.” IEEE Access. 8: 148892–148905. doi:10.1109/ACCESS.2020.3015741.
  • Edge-IIoTset Cyber Security Dataset. n.d. https://www.kaggle.com/datasets/mohamedamineferrag/edgeiiotset-cyber-security-dataset-of-iot-iiot
  • Ezhilmaran, D., and M. Adhiyaman. 2018. “Soft computing Method for Minutiae-Based Fingerprint Authentication.” International Journal of Industrial and Systems Engineering 30 (2): 237–252. doi:10.1504/IJISE.2018.094845.
  • Farivar, F., M. S. Haghighi, A. Jolfaei, and M. Alazab. 2020. “Artificial intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT.” IEEE Transactions on Industrial Informatics 16 (4): 2716–2725. doi:10.1109/TII.2019.2956474.
  • Gad, R., M. Talha, A. A. Abd El-Latif, M. Zorkany, E. S. Ayman, E. F. Nawal, and G. Muhammad. 2018. “Iris recognition Using Multi-Algorithmic Approaches for Cognitive Internet of Things (CIoT) Framework.” Future Generation Computer Systems 89: 178–191. doi:10.1016/j.future.2018.06.020.
  • Gao, J., H. Wang, and H. Shen. 2020. “Smartly handling Renewable Energy Instability in Supporting a Cloud Datacenter.” 2020 IEEE international Parallel and Distributed Processing Symposium (IPDPS), 769–778. IEEE. doi:10.1109/IPDPS47924.2020.00084.
  • Gao, J., H. Wang, and H. Shen. 2020. “Task Failure Prediction in Cloud Data Centers Using Deep Learning.” 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA.
  • Gao, Y., Y. Chen, X. Hu, H. Lin, Y. Liu, and L. Nie. 2021. “Blockchain based IIoT Data Sharing Framework for SDN-Enabled Pervasive Edge Computing.” IEEE Transactions on Industrial Informatics 17 (7): 5041–5049. doi:10.1109/TII.2020.3012508.
  • Hassan, M. M., S. Huda, S. Sharmeen, J. Abawajy, and G. Fortino. 2021. “An adaptive Trust Boundary Protection for IIoT Networks Using Deep-Learning Feature-Extraction-Based Semisupervised Model.” IEEE Transactions on Industrial Informatics 17 (4): 2860–2870. doi:10.1109/TII.2020.3015026.
  • Jang, J. W., S. Kwon, S. Kim, J. Seo, J. Oh, and K. H. Lee. 2020. “Cybersecurity framework for IIoT-Based Power System Connected to Microgrid.” KSII Transactions on Internet and Information Systems (TIIS) 14 (5): 2221–2235.
  • Khan, P. W., and Y. Byun. 2020. “A blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things.” Entropy 22 (2): 175. doi:10.3390/e22020175.
  • Kumar, Priyan Malarvizhi, Ushadevi Gandhi, R. Varatharajan, Gunasekaran Manogaran, Jidhesh R, and Thanjai Vadivel. 2019. “Intelligent face Recognition and Navigation System Using Neural Learning for Smart Security in Internet of Things.” Cluster Computing 22 (S4): 7733–7744. doi:10.1007/s10586-017-1323-4.
  • Latif, S., Z. Idrees, J. Ahmad, L. Zheng, and Z. Zou. 2021. “A blockchain-Based Architecture for Secure and Trustworthy Operations in the Industrial Internet of Things.” Journal of Industrial Information Integration 21: 100190. doi:10.1016/j.jii.2020.100190.
  • Lv, Z., Y. Han, A. K. Singh, G. Manogaran, and H. Lv. 2021. “Trustworthiness in Industrial IoT Systems Based on Artificial Intelligence.” IEEE Transactions on Industrial Informatics 17 (2): 1496–1504. doi:10.1109/TII.2020.2994747.
  • Manogaran, G., M. Alazab, P. M. Shakeel, and C. H. Hsu. 2022. “Blockchain assisted Secure Data Sharing Model for Internet of Things Based Smart Industries.” IEEE Transactions on Reliability 71 (1): 348–358. doi:10.1109/TR.2020.3047833.
  • Manogaran, G., R. Varatharajan, D. Lopez, P. M. Kumar, R. Sundarasekar, and C. Thota. 2018. “A New Architecture of Internet of Things and Big Data Ecosystem for Secured Smart Healthcare Monitoring and Alerting System.” Future Generation Computer Systems 82: 375–387. doi:10.1016/j.future.2017.10.045.
  • Manogaran, Gunasekaran, Mamoun Alazab, Vijayalakshmi Saravanan, Bharat S. Rawal, P. Mohamed Shakeel, Revathi Sundarasekar, Senthil Murugan Nagarajan, Seifedine Nimer Kadry, and Carlos Enrique Montenegro-Marin. 2021. “Machine learning Assisted Information Management Scheme in Service Concentrated Iot.” IEEE Transactions on Industrial Informatics 17 (4): 2871–2879. doi:10.1109/TII.2020.3012759.
  • Mohammed Hasan Ali, M. F. Z. 2018. “Intrusion-Detection System Based on Fast Learning Network in Cloud Computing.” Journal of Computational and Theoretical Nanoscience 24 (10): 7360–7363. doi:10.1166/asl.2018.12942.
  • Molano, J. I. R., J. M. C. Lovelle, C. E. Montenegro, J. J. R. Granados, and R. G. Crespo. 2018. “Metamodel for Integration of Internet of Things, Social Networks, the Cloud and Industry 4.0.” Journal of Ambient Intelligence and Humanized Computing 9 (3): 709–723. doi:10.1007/s12652-017-0469-5.
  • Nguyen, T. G., T. V. Phan, D. T. Hoang, T. N. Nguyen, and C. So-In. 2020. December“Efficient SDN-Based Traffic Monitoring in IoT Networks with Double Deep Q-Network.” In International Conference on Computational Data and Social Networks (pp. 26–38). Springer, Cham.
  • Sathishkumar, V. E., J. Lim, M. Lee, K. Cho, J. Park, C. Shin, and Y. Cho. 2020. “Industry Energy Consumption Prediction Using Data Mining Techniques.” International Journal of Energy, Information and Communications, 11 (1): 7–14.
  • Sathishkumar, V. E., Changsun Shin, and Yongyun Cho. 2021. “Efficient energy Consumption Prediction Model for a Data Analytic-Enabled Industry Building in a Smart City.” Building Research & Information 49 (1): 127–143. doi:10.1080/09613218.2020.1809983.
  • Sengupta, J., S. Ruj, and S. D. Bit. 2020. “A comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT.” Journal of Network and Computer Applications 149: 102481. doi:10.1016/j.jnca.2019.102481.
  • Seyhan, K., T. N. Nguyen, S. Akleylek, K. Cengiz, and S. H. Islam. 2021. “Bi-GISIS KE: Modified Key Exchange Protocol with Reusable Keys for IoT Security.” Journal of Information Security and Applications 58: 102788. doi:10.1016/j.jisa.2021.102788.
  • Sultana, T., A. Almogren, M. Akbar, M. Zuair, I. Ullah, and N. Javaid. 2020. “Data sharing System Integrating Access Control Mechanism Using Blockchain-Based Smart Contracts for IoT Devices.” Applied Sciences 10 (2): 488. doi:10.3390/app10020488.
  • Wu, Y., H. N. Dai, and H. Wang. 2021. “Convergence of Blockchain and Edge Computing for Secure and Scalable IIoT Critical Infrastructures in Industry 4.0.” IEEE Internet of Things Journal 8 (4): 2300–2317. doi:10.1109/JIOT.2020.3025916.
  • Xu, X., M. Han, S. M. Nagarajan, and P. Anandhan. 2020. “Industrial Internet of Things for Smart Manufacturing Applications Using Hierarchical Trustful Resource Assignment.” Computer Communications 160: 423–430. doi:10.1016/j.comcom.2020.06.004.
  • Xu, X., Z. Zeng, S. Yang, and H. Shao. 2020. “A novel Blockchain Framework for Industrial IoT Edge Computing.” Sensors 20 (7): 2061. doi:10.3390/s20072061.
  • Yan, X., Y. Xu, X. Xing, B. Cui, Z. Guo, and T. Guo. 2020. “Trustworthy network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIot.” IEEE Transactions on Industrial Informatics 16 (9): 6182–6192. doi:10.1109/TII.2020.2975227.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.