4.7 Article

Joint Differential Game and Double Deep Q-Networks for Suppressing Malware Spread in Industrial Internet of Things

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies

Mohammad Reza Nosouhi et al.

Summary: In this article, a secure mix-based approach called UCoin is proposed to address the issues in preserving privacy of users in cryptocurrencies. It breaks the link between input and output addresses in transactions, utilizes a secure shuffling protocol, and achieves higher performance and compatibility with the existing cryptocurrency architecture.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Automation & Control Systems

Harmonic Transfer-Function-Based α,β-Frame SISO Impedance Modeling of Droop Inverters-Based Islanded Microgrid With Unbalanced Loads

Jian Guo et al.

Summary: This article proposes an impedance-based approach for stability analysis of droop inverters in an islanded microgrid with unbalanced loads. The harmonic transfer function (HTF) based alpha beta-impedance modeling methods are used to simplify impedance measurement and stability analysis, while preserving the coupling and multiple-frequency characteristics. Experimental results validate the accuracy of the proposed SISO impedance models, which accurately reveal low-frequency oscillations in the islanded microgrid.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2023)

Article Mathematics, Applied

Analysis of COVID-19 in Japan with extended SEIR model and ensemble Kalman filter

Q. Sun et al.

Summary: We introduce an extended SEIR infectious disease model with data assimilation to study the spread of COVID-19, taking into account undetected asymptomatic and pre-symptomatic cases. An ensemble Kalman filter is implemented to assimilate reliable observations and estimate the effective reproduction number and unobservable subpopulations. The analysis is conducted for three main prefectures of Japan and the entire country, revealing more stable estimated reproduction numbers compared to a different method. Sensitivity tests also suggest the decreasing efficiency of states of emergency.

JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS (2023)

Article Computer Science, Artificial Intelligence

One-dimensional VGGNet for high-dimensional data

Sheng Feng et al.

Summary: This article proposes a deep learning model for classifying high-dimensional data and aims to achieve optimal evaluation accuracy and robustness using multicriteria decision-making. A novel one-dimensional visual geometry group network (1D_VGGNet) is introduced to overcome the complexity and instability of high-dimensional data. Additionally, a one-dimensional convolutional neural network (1D_CNN) is used to effectively handle one-dimensional multicriteria decision-making.

APPLIED SOFT COMPUTING (2023)

Article Computer Science, Hardware & Architecture

STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things

Guowen Wu et al.

Summary: Social Internet of Things (SIoT) is a fusion of Internet of Things and social networks, which has attracted attention as a target for hackers to spread viruses and breach data confidentiality. To address these problems, a novel virus spread model (STSIR) based on epidemic theory and game theory is proposed, which considers people behavior and the characteristics of SIoTs. The model STSIR introduces an individual-group game to establish the attack and defense model between infected and susceptible SIoT nodes, and differential equations to represent the model. Simulation results show that the model STSIR is more effective in curbing virus spread compared to traditional SIS and SIR models.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2023)

Article Computer Science, Theory & Methods

Multi-agent DRL for joint completion delay and energy consumption with queuing theory in MEC-based IIoT

Guowen Wu et al.

Summary: To meet the computing requirements of industrial production, EIIoT that combines mobile edge computing with IIoT has emerged. An optimization model based on queuing theory is proposed to solve the task offloading problem in EIIoT. The improved MAQDRL algorithm achieves optimal offloading strategy in dynamic and random multiuser offloading environments.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2023)

Article Computer Science, Information Systems

Blockchain-Aided Network Resource Orchestration in Intelligent Internet of Things

Chao Wang et al.

Summary: This article proposes a blockchain-enabled resource orchestration scheme for IoT using deep reinforcement learning. The scheme allows the IoT edge server and end user to reach a consensus on network resource allocation based on blockchain theory. By utilizing a policy network, the intelligent agent can perceive changes in the network's state and make dynamic resource allocation decisions. Simulation results demonstrate that the proposed scheme performs better than other security resource allocation algorithms, with average revenue, user request acceptance rate, and profitability increased by 8.5%, 1.8%, and 11.9%, respectively.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Interdisciplinary Applications

Improving efficiency and security of IIoT communications using in-network validation of server certificate

Asier Atutxa et al.

Summary: The use of advanced communications and smart mechanisms in industry is rapidly increasing, making cybersecurity a crucial aspect. Most industrial communication protocols rely on TLS for secure communication, but for UDP-based communications used in IIoT scenarios, DTLS is used due to its mechanisms to handle unreliable transport layers. However, the heavy (D)TLS handshake process sacrifices security for performance, particularly in resource-limited IIoT devices. This paper presents a solution that offloads server certificate validation to a resource-rich network element, improving security and performance by reducing DTLS handshake times and CPU usage in IIoT devices.

COMPUTERS IN INDUSTRY (2023)

Article Computer Science, Artificial Intelligence

Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems

Shigen Shen et al.

Summary: This study proposes a signaling game approach for privacy preservation in edge-computing-based IoT networks. It addresses the issue of malicious IoT nodes requesting private data from an IoT cloud storage system across edge nodes. The optimal privacy preservation strategies for edge nodes are derived and a signaling Q-learning algorithm is designed to achieve convergent equilibrium and game parameters. Simulation results show that the proposed algorithm effectively decreases the optimal probability of malicious requests, enhancing privacy preservation in edge-computing-based IoT cloud storage systems.

EXPERT SYSTEMS WITH APPLICATIONS (2023)

Article Engineering, Electrical & Electronic

NFLCS: An Service Function Chain Path Optimization Strategy Based on Network-Functional Layout Clustering

Youxiang Duan et al.

Summary: This paper proposes an SFC path optimization strategy based on the clustering of network functional layouts. By designing a topological network identification algorithm and a multi-headed attention mechanism, different types of SFC layouts can be optimized in a targeted manner. The experimental results demonstrate the effectiveness of this strategy in optimizing SFC paths and its ability to optimize service function chain paths in future complex network situations.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Information Systems

Computation Offloading Method Using Stochastic Games for Software-Defined-Network-Based Multiagent Mobile Edge Computing

Guowen Wu et al.

Summary: In the scenario of Industry 4.0, mobile smart devices face challenges in processing massive amounts of data. To address this issue, a software-defined network-based mobile edge computing system is proposed to offload computation tasks to edge servers, reducing processing latency and energy consumption. A stochastic game-based computation offloading model is established, demonstrating the achievement of Nash Equilibrium. The proposed stochastic game-based resource allocation algorithm with prioritized experience replays (SGRA-PERs) outperforms other algorithms in reducing processing delay and energy consumption, even in large-scale MEC systems.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Telecommunications

A multi-point collaborative DDoS defense mechanism for IIoT environment

Hongcheng Huang et al.

Summary: Nowadays, intelligent devices in the Industrial Internet of Things (IIoT) face unprecedented cybersecurity challenges. Due to limited security budget, IIoT devices are vulnerable to Distributed Denial-of-Service (DDoS) attacks, leading to disastrous consequences. Traditional defense solutions for networks cannot be directly applied to IIoT, requiring a multi-point collaborative defense mechanism. This mechanism includes an edge-centric mechanism called EdgeDefense for detecting and mitigating DDoS attacks, as well as a blockchain-based collaborative defense model for securely sharing defense information across the network.

DIGITAL COMMUNICATIONS AND NETWORKS (2023)

Article Computer Science, Theory & Methods

A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions

Abhishek Hazra et al.

Summary: This review investigates the interoperability issues faced by Industrial IoT (IIoT) and discusses the advancements in technologies, solutions, and standards. Challenges and directions for future research are also highlighted.

ACM COMPUTING SURVEYS (2023)

Article Automation & Control Systems

Resilient Distributed Coordination Control of Multiarea Power Systems Under Hybrid Attacks

Zihao Cheng et al.

Summary: Resilient distributed coordination control is studied on multiarea power systems with low inertia under hybrid attacks, including denial-of-service (DoS) attack and deception attack. The proposed resilient distributed scheme combines load-frequency control (LFC) with virtual inertia control (VIC), and uses a linear matrix inequality (LMI) technique to design the distributed resilient control gains. The validity of the theory is verified through simulation of a four-area power system.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2022)

Review Computer Science, Interdisciplinary Applications

Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review

Angelo Corallo et al.

Summary: Cybersecurity awareness is crucial in the context of the Industrial Internet of Things (IIoT) to protect companies from cyber-attacks and data breaches. This study conducts a systematic literature review to analyze the existing state of the art in cybersecurity awareness, including definitions, industrial contexts, techniques, and benefits. The findings can be valuable for practitioners and researchers in future research and applications.

COMPUTERS IN INDUSTRY (2022)

Article Automation & Control Systems

Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures

Lei Cui et al.

Summary: This article presents a decentralized and asynchronous IoT anomaly detection framework based on blockchain and federated learning. The framework ensures data integrity and prevents single-point failure while improving efficiency. Additionally, an improved differentially private federated learning method based on generative adversarial networks is proposed to optimize data utility. Simulation results demonstrate superior performance in terms of robustness, accuracy, and fast convergence, while maintaining a high level of privacy and security protection.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Automation & Control Systems

OPTIMAL INCENTIVES TO MITIGATE EPIDEMICS: A STACKELBERG MEAN FIELD GAME APPROACH

Alexander Aurell et al.

Summary: Motivated by epidemic control models, this paper studies a Stackelberg mean field game model between a principal and a mean field of agents. The game is analyzed using a probabilistic approach and applied to an SIR-type epidemic model. An innovative numerical method is proposed to compute the solutions.

SIAM JOURNAL ON CONTROL AND OPTIMIZATION (2022)

Article Computer Science, Information Systems

Signaling game-based availability assessment for edge computing-assisted IoT systems with malware dissemination

Yizhou Shen et al.

Summary: This study addresses the issue of IoT malware dissemination in edge computing-assisted IoT systems. It predicts the optimal dissemination strategy and develops an algorithm to assess IoT availability. The research provides insights into the impact of system features on malware dissemination and availability assessment.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2022)

Article Mathematics, Applied

A stochastic SEIRS rabies model with population dispersal: Stationary distribution and probability density function

Zhenfeng Shi et al.

Summary: This paper proposes a stochastic SEIRS rabies epidemic model with two patches to investigate the spatial spread of rabies under the influence of environmental noise. By adopting a new technique to construct stochastic Lyapunov functions, sufficient conditions for the existence of an ergodic stationary distribution are obtained. Moreover, the exact expression of probability density function around a quasi-equilibrium point is derived when the movement of dogs is forbidden.

APPLIED MATHEMATICS AND COMPUTATION (2022)

Article Computer Science, Information Systems

A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT

Zequn Niu et al.

Summary: This paper proposes an approach based on adaptive online analysis to accurately determine the families of malware in Industrial Internet of Things (IIoT) by analyzing encrypted, drift, and imbalanced traffic streams. The experiments show that the proposed method achieves a high classification accuracy.

INFORMATION SCIENCES (2022)

Article Computer Science, Information Systems

Reinforcement Learning Assisted Bandwidth Aware Virtual Network Resource Allocation

Peiying Zhang et al.

Summary: Space-air-ground integration is a key trend in the 6G era, and efficient scheduling of multi-dimension network resources is a major challenge. By employing reinforcement learning and a bandwidth-aware virtual network resource allocation algorithm, the proposed approach outperforms conventional algorithms in terms of long-term average reward, acceptance rate, and long-term reward/cost.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2022)

Article Automation & Control Systems

Stimulating trust cooperation in edge services: An evolutionary tripartite game

Panjun Sun et al.

Summary: This paper constructs a new tripartite game model to enhance trust and cooperation among service participants. By calculating the ideal stable state point, it addresses the trust issues in network edge services, and designs relevant experimental studies to verify and compare the correctness and effectiveness of several factors that affect the convergence stability of the evolutionary games.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2022)

Article Computer Science, Theory & Methods

RKD-VNE: Virtual network embedding algorithm assisted by resource knowledge description and deep reinforcement learning in IIoT scenario

Peiying Zhang et al.

Summary: This paper proposes a virtual network embedding (VNE) algorithm assisted by resource knowledge description (RKD) and deep reinforcement learning (DRL) to address the requirements of efficient network resource utilization and security in industrial Internet of Things (IIoT) applications. By using social attribute perception to measure the security of physical nodes, standardizing resource constraints with RKD, and using a DRL agent to derive the probability of physical node embedding, the algorithm shows significant advantages in VNE, as demonstrated by simulation experiments.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Computer Science, Information Systems

IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks

Muhammad Naveed Aman et al.

Summary: This article presents a secure patching framework for IoT, using remote attestation and physical unclonable functions (PUFs) to control and mitigate malware propagation.

IEEE SYSTEMS JOURNAL (2022)

Article Engineering, Multidisciplinary

A Closed-Loop Framework for Inference, Prediction, and Control of SIR Epidemics on Networks

Ashish R. Hota et al.

Summary: Motivated by the COVID-19 pandemic, a closed-loop framework is proposed to control the spread of the epidemic on networks by incorporating key factors in testing data and evaluating the trade-off between controlling the growth-rate of the epidemic and the cost of NPIs. Results show the importance of early testing and the risk of a second wave of infections if NPIs are prematurely withdrawn.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Computer Science, Theory & Methods

A Survey of IIoT Protocols: A Measure of Vulnerability Risk Analysis Based on CVSS

Santiago Figueroa-Lorenzo et al.

ACM COMPUTING SURVEYS (2020)

Article Computer Science, Information Systems

A DDoS Attack Information Fusion Method Based on CNN for Multi-Element Data

Jieren Cheng et al.

CMC-COMPUTERS MATERIALS & CONTINUA (2020)

Article Computer Science, Theory & Methods

Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation

Dawei Zhao et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach

Lu-Xing Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Hardware & Architecture

HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNs

Shigen Shen et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Automation & Control Systems

Industrial Internet of Things: Challenges, Opportunities, and Directions

Emiliano Sisinni et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks

Shigen Shen et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Engineering, Electrical & Electronic

Traffic-Aware Patching for Cyber Security in Mobile IoT

Shin-Ming Cheng et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Computer Science, Software Engineering

Malware Methodologies and Its Future: A Survey

Chandan Kumar Behera et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY (2017)

Article Engineering, Multidisciplinary

The impact of patch forwarding on the prevalence of computer virus: A theoretical assessment approach

Lu-Xing Yang et al.

APPLIED MATHEMATICAL MODELLING (2017)

Article Computer Science, Hardware & Architecture

Optimal Patching in Clustered Malware Epidemics

Soheil Eshghi et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2016)