4.8 Article

A Neural-Network-Based Optimal Resource Allocation Method for Secure IIoT Network

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 9, Issue 4, Pages 2538-2544

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3084636

Keywords

Channel security; convolutional neural network (CNN); Industrial Internet of Things (IIoT); resource allocation; signal-to-interference ratio (SIR); wireless sensor network (WSN)

Funding

  1. National Science Foundation of China [62071003, 41874174]
  2. Fund for Key Laboratory of Electromagnetic Scattering [61424090107]
  3. Natural Science Foundation of Anhui Province [2008085MF186]
  4. University Synergy Innovation Program of Anhui Province [GXXT-2020-50]

Ask authors/readers for more resources

This article discusses the issues of data security and resource allocation in the context of the Internet of Things, particularly in industrial applications. It incorporates the use of convolutional neural networks and channel security calculations to address the problem of fixed resources, improving the flexibility and security of the network.
Data security and resource allocation are two important terms associated with the Internet of Things (IoT). This recent technical evolution has made its mark in industrial applications making the network more flexible and computation friendly through connecting all the devices. As a subset of IoT, the framework of Industrial IoT (IIoT) is based on the huge number of nodes with the continuous process of multiple works at a time. Due to this, multiobjective network, interference in the path always becomes the reason for the loss of network resources as well as the security of data becomes vulnerable. In most of the previous works, dedicated channel states are considered for fixed resources which remains a major issue of IIoT network flexibility along with security. In this article, both the problems are incorporated by calculating the channel security and using convolutional neural network (CNN) optimal channel state extracted for different applications. This results as a fast system with proper utilization of resources and validated with mathematical analysis and simulations.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available