A Secure Industrial Internet of Things (IIoT) Framework for Resource Management in Smart Manufacturing

The Industrial Internet of Things (IIoT) can transform an existing isolated industrial system to a connected network. The IIoT and the related wireless connectivity requirements for industrial sensors are very significant. The deployed sensors in IIoT monitors the conditions of the industrial devices and machines. Therefore, reliability and security become the most important concerns in IIoT. This introduces many familiar and ever-increasing risks associated with the industrial system. The IIoT devices can be vulnerable to vast array of viruses, threats, and attacks. Therefore, an efficient protection strategy is required to ensure that the millions of IIoT devices are safe from these risks. However, resource constraint IIoT devices have not been designed to have effective security features. Due to this, in recent years, cloud, fog, and edge-based IIoT has received great attention in the research community. The computationally intensive tasks such as security, data analytics, decision making, and reporting are performed at the cloud or fog using a powerful computing infrastructure. The data security of the IIoT device has been provided by employing improved Rivest-Shamir-Adelman (RSA) and hash signatures. The proposed RSA algorithm has a four-prime number of 512- bits. The device authentication is performed by employing a hash signature. For long network life, an efficient clustering technique for the sensor devices which is based on node degree(N), distance from the cluster(D), residual energy(R), and fitness (NDRF) has been proposed. The fitness of the sensor nodes is computed using the Salp swarm algorithm (SSA). In order to reduce the latency and communication overhead for IIoT devices a resource scheduling using SoftMax deep neural network (DNN) is proposed. All the requests coming from the cluster head are classified using SoftMax-DNN for best resource scheduling on the basis of storage, computing, and bandwidth requirements. The proposed framework produces superior results, especially in terms of energy consumption, latency, and strength of security.

[1]  Azzedine Boukerche,et al.  Modeling and Analysis of a Shared Edge Caching System for Connected Cars and Industrial IoT-Based Applications , 2020, IEEE Transactions on Industrial Informatics.

[2]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[3]  Mohammad Ayoub Khan,et al.  A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data , 2020, IEEE Access.

[4]  John Scott Bridle,et al.  Probabilistic Interpretation of Feedforward Classification Network Outputs, with Relationships to Statistical Pattern Recognition , 1989, NATO Neurocomputing.

[5]  Junhua Wu,et al.  Methods of Resource Scheduling Based on Optimized Fuzzy Clustering in Fog Computing , 2019, Sensors.

[6]  Pan Xue-zeng Cloud scheduling algorithm based on fuzzy clustering , 2012 .

[7]  Deepak Gupta,et al.  Hashed Needham Schroeder Industrial IoT based Cost Optimized Deep Secured data transmission in cloud , 2020 .

[8]  Lake Bu,et al.  A secure and robust scheme for sharing confidential information in IoT systems , 2019, Ad Hoc Networks.

[9]  Hossam Faris,et al.  Salp Swarm Algorithm: A bio-inspired optimizer for engineering design problems , 2017, Adv. Eng. Softw..

[10]  Petar Popovski,et al.  Network Slicing in Industry 4.0 Applications: Abstraction Methods and End-to-End Analysis , 2018, IEEE Transactions on Industrial Informatics.

[11]  Osama M. Abu Zaid,et al.  Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms , 2007, Int. J. Netw. Secur..

[12]  Guisheng Fan,et al.  Energy and time efficient task offloading and resource allocation on the generic IoT-fog-cloud architecture , 2020, Peer-to-Peer Netw. Appl..

[13]  Lav Gupta,et al.  Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things , 2019, IEEE Internet of Things Journal.

[14]  Mohsen Nickray,et al.  Saving time and cost on the scheduling of fog-based IoT applications using deep reinforcement learning approach , 2020, Future Gener. Comput. Syst..

[15]  Haipeng Yao,et al.  Resource Trading in Blockchain-Based Industrial Internet of Things , 2019, IEEE Transactions on Industrial Informatics.

[16]  Deyu Qi,et al.  A Task Scheduling Algorithm Based on Classification Mining in Fog Computing Environment , 2018, Wirel. Commun. Mob. Comput..

[17]  Melody Moh,et al.  Prioritized task scheduling in fog computing , 2018, ACM Southeast Regional Conference.

[18]  Sandeep K. Sood,et al.  Quantumized approach of load scheduling in fog computing environment for IoT applications , 2020, Computing.

[19]  Aamir Mahmood,et al.  Fog Computing Enabling Industrial Internet of Things: State-of-the-Art and Research Challenges , 2019, Sensors.

[20]  El-Sayed M. El-Rabaie,et al.  HEVC Selective Encryption Using RC6 Block Cipher Technique , 2018, IEEE Transactions on Multimedia.

[21]  S. El-Rabaie,et al.  Homomorphic image encryption , 2009, J. Electronic Imaging.

[22]  Abdul Quaiyum Ansari,et al.  Fundamentals of Industrial Informatics and Communication Technologies , 2012 .

[23]  Binh Minh Nguyen,et al.  Evolutionary Algorithms to Optimize Task Scheduling Problem for the IoT Based Bag-of-Tasks Application in Cloud–Fog Computing Environment , 2019, Applied Sciences.

[24]  Giancarlo Fortino,et al.  A development approach for collective opportunistic Edge-of-Things services , 2019, Inf. Sci..

[25]  Georges Kaddoum,et al.  Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0 , 2020, IEEE Internet of Things Journal.

[26]  Zhaolong Ning,et al.  Local Electricity Storage for Blockchain-Based Energy Trading in Industrial Internet of Things , 2019, IEEE Transactions on Industrial Informatics.

[27]  Hemraj Saini,et al.  Fog assisted task allocation and secure deduplication using 2FBO2 and MoWo in cluster-based industrial IoT (IIoT) , 2020, Comput. Commun..

[28]  Joe Cunningham,et al.  The industrial internet of things (IIoT): An analysis framework , 2018, Comput. Ind..

[29]  Feng Yang,et al.  Data Scheduling and Resource Optimization for Fog Computing Architecture in Industrial IoT , 2019, ICDCIT.