IoT anomaly detection method in intelligent manufacturing industry based on trusted evaluation

With the development of industrial Internet of Things technology, the relatively closed industrial control system has become more complex and open, and it is facing increasingly serious information security problems. Aiming at the security problems existing in the current intelligent manufacturing industrial Internet of Things, this paper proposes a credible overall architecture of the IoT industrial control system. By adding a trusted function module, the credibility level is evaluated and abnormal operations are monitored. The sensing environment for the Internet of Things is more complicated. This paper proposes a cluster-based routing method. While ensuring the trustworthiness and security of data routing, the routing protocol is maintained efficiently and reliably. A scenario of node cooperation is proposed for scenarios of a large number of malicious nodes. Abnormal attacks are suppressed by maintaining dynamic Bayesian balance between the attacker and the detection node. The simulation results show that the mechanism cooperation game can significantly improve the event detection success rate of abnormal detection nodes and greatly reduce the number of forged reports.

[1]  Shubo Liu,et al.  Internet of Things Monitoring System of Modern Eco-Agriculture Based on Cloud Computing , 2019, IEEE Access.

[2]  S. Meysam Mousavi,et al.  Soft computing-based new interval-valued hesitant fuzzy multi-criteria group assessment method with last aggregation to industrial decision problems , 2017, Soft Comput..

[3]  Pietro Ducange,et al.  Smart Audio Sensors in the Internet of Things Edge for Anomaly Detection , 2018, IEEE Access.

[4]  Sarvapali D. Ramchurn,et al.  Algorithms for Graph-Constrained Coalition Formation in the Real World , 2017, TIST.

[5]  Yong-Jin Liu,et al.  Real-Time Assessment of the Cross-Task Mental Workload Using Physiological Measures During Anomaly Detection , 2018, IEEE Transactions on Human-Machine Systems.

[6]  Kamran Zamanifar,et al.  Internet of Things\/Internet of Everything: Structure and Ingredients , 2019, IEEE Potentials.

[7]  Chonggang Wang,et al.  Delay-Aware Application Protocol for Internet of Things , 2018, IEEE Network.

[8]  Zhiliang Zhu,et al.  Detecting Confident Information Coverage Holes in Industrial Internet of Things: An Energy-Efficient Perspective , 2018, IEEE Communications Magazine.

[9]  Giancarlo Fortino,et al.  An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0 , 2019, IEEE Transactions on Industrial Informatics.

[10]  Cheng Li,et al.  Full-Duplex Relay-Assisted Macrocell with Millimeter Wave Backhauls: Framework and Prospects , 2019, IEEE Network.

[11]  Dan Liu,et al.  A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow , 2018, IEEE Access.

[12]  Qiang Li,et al.  Understanding the Usage of Industrial Control System Devices on the Internet , 2018, IEEE Internet of Things Journal.

[13]  Dong Yue,et al.  Multi-View Stacking Ensemble for Power Consumption Anomaly Detection in the Context of Industrial Internet of Things , 2018, IEEE Access.

[14]  Ling Tian,et al.  Application of hyperspectral image anomaly detection algorithm for Internet of things , 2017, Multimedia Tools and Applications.

[15]  Aamir Mahmood,et al.  Scalability Analysis of a LoRa Network Under Imperfect Orthogonality , 2018, IEEE Transactions on Industrial Informatics.

[16]  Sofie Pollin,et al.  A Multiprotocol Low-Cost Automated Testbed for BLE Mesh , 2019, IEEE Communications Magazine.

[17]  Jorge Pereira,et al.  IIoTEED: An Enhanced, Trusted Execution Environment for Industrial IoT Edge Devices , 2017, IEEE Internet Computing.

[18]  Derong Liu,et al.  Optimization of electricity consumption in office buildings based on adaptive dynamic programming , 2017, Soft Comput..

[19]  Rahul Khanna,et al.  Weaving the Wireless Web: Toward a Low-Power, Dense Wireless Sensor Network for the Industrial IoT , 2017, IEEE Microwave Magazine.

[20]  Avishai Wool,et al.  Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems , 2017, TIST.

[21]  Heikki Laaki,et al.  Prototyping a Digital Twin for Real Time Remote Control Over Mobile Networks: Application of Remote Surgery , 2019, IEEE Access.

[22]  Valentin Rakovic,et al.  Blockchain Paradigm and Internet of Things , 2019, Wirel. Pers. Commun..

[23]  Vinod Pankajakshan,et al.  Tucker tensor decomposition-based tracking and Gaussian mixture model for anomaly localisation and detection in surveillance videos , 2018, IET Comput. Vis..

[24]  Naixue Xiong,et al.  Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.