Abstract

The Industrial Internet of Things (IIoT) can transform an existing isolated industrial system to a connected network. The IIoT and the related wireless connectivity requirements for industrial sensors are very significant. The deployed sensors in IIoT monitors the conditions of the industrial devices and machines. Therefore, reliability and security become the most important concerns in IIoT. This introduces many familiar and ever-increasing risks associated with the industrial system. The IIoT devices can be vulnerable to vast array of viruses, threats, and attacks. Therefore, an efficient protection strategy is required to ensure that the millions of IIoT devices are safe from these risks. However, resource constraint IIoT devices have not been designed to have effective security features. Due to this, in recent years, cloud, fog, and edge-based IIoT has received great attention in the research community. The computationally intensive tasks such as security, data analytics, decision making, and reporting are performed at the cloud or fog using a powerful computing infrastructure. The data security of the IIoT device has been provided by employing improved Rivest-Shamir-Adelman (RSA) and hash signatures. The proposed RSA algorithm has a four-prime number of 512- bits. The device authentication is performed by employing a hash signature. For long network life, an efficient clustering technique for the sensor devices which is based on node degree(N), distance from the cluster(D), residual energy(R), and fitness (NDRF) has been proposed. The fitness of the sensor nodes is computed using the Salp swarm algorithm (SSA). In order to reduce the latency and communication overhead for IIoT devices a resource scheduling using SoftMax deep neural network (DNN) is proposed. All the requests coming from the cluster head are classified using SoftMax-DNN for best resource scheduling on the basis of storage, computing, and bandwidth requirements. The proposed framework produces superior results, especially in terms of energy consumption, latency, and strength of security.

Highlights

  • Technologies like the Internet of things (IoT), wireless sensor network (WSN), Cloud computing, edge computing, cyberphysical system, and fog computing, brings new business model and market

  • Due to its involvement in the assignment of the task [14], the technology can be controlled on the best way to match resources for the tasks of the application, which does not go beyond the minimum set times aiming at meeting quality of service (QoS) needs of the Industrial Internet of things (IIoT) devices [15]

  • The simulation results of the proposed and existing techniques are analyzed for performance metrics

Read more

Summary

INTRODUCTION

Technologies like the Internet of things (IoT), wireless sensor network (WSN), Cloud computing, edge computing, cyberphysical system, and fog computing, brings new business model and market. Khan: Secure IIoT Framework for Resource Management in Smart Manufacturing by IoT devices, smart sensors, robotics, actuators, communication devices, machine learning, technologies, and data analytics to automate and enhance the productivity This brings numerous challenges to industrial network systems [9], such as the protection of devices, privacy and architectural flexibility. Due to its involvement in the assignment of the task [14], the technology can be controlled on the best way to match resources for the tasks of the application, which does not go beyond the minimum set times aiming at meeting quality of service (QoS) needs of the IIoT devices [15] This improves the performance of the fog computing, and helps to implement the planning of load balancing.

RELATED WORK
RESOURCE SCHEDULING AND ENCRYPTION
SIMULATION RESULTS AND DISCUSSIONS
ANALYSIS OF NETWORK PERFORMANCE
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.