Skip to main content

Advertisement

Log in

IoT anomaly detection method in intelligent manufacturing industry based on trusted evaluation

  • ORIGINAL ARTICLE
  • Published:
The International Journal of Advanced Manufacturing Technology Aims and scope Submit manuscript

Abstract

With the development of industrial Internet of Things technology, the relatively closed industrial control system has become more complex and open, and it is facing increasingly serious information security problems. Aiming at the security problems existing in the current intelligent manufacturing industrial Internet of Things, this paper proposes a credible overall architecture of the IoT industrial control system. By adding a trusted function module, the credibility level is evaluated and abnormal operations are monitored. The sensing environment for the Internet of Things is more complicated. This paper proposes a cluster-based routing method. While ensuring the trustworthiness and security of data routing, the routing protocol is maintained efficiently and reliably. A scenario of node cooperation is proposed for scenarios of a large number of malicious nodes. Abnormal attacks are suppressed by maintaining dynamic Bayesian balance between the attacker and the detection node. The simulation results show that the mechanism cooperation game can significantly improve the event detection success rate of abnormal detection nodes and greatly reduce the number of forged reports.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Pinto S, Gomes T, Pereira J et al (2017) IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput 21(1):40–47

    Article  Google Scholar 

  2. Ouyang Z, Sun X, Chen J et al (2018) Multi-view stacking ensemble for power consumption anomaly detection in the context of industrial Internet of Things. IEEE Access 6:9623–9631

    Article  Google Scholar 

  3. Wang H, Chen Z, Zhao J et al (2018) A vulnerability assessment method in industrial Internet of Things based on attack graph and maximum flow. IEEE Access 6(99):8599–8609

    Article  Google Scholar 

  4. Qiang L, Xuan F, Wang H et al (2018) Understanding the usage of industrial control system devices on the Internet. IEEE Internet Things J 5(3):2178–2189

    Article  Google Scholar 

  5. Antonini M, Vecchio M, Antonelli F et al (2019) Smart audio sensors in the Internet of Things edge for anomaly detection. IEEE Access 6(99):67594–67610

    Google Scholar 

  6. Wang X, Luo G, Ling T (2017) Application of hyperspectral image anomaly detection algorithm for Internet of things. Multimed Tools Appl 78:2):1–2)13

    Google Scholar 

  7. Deng X, Yang LT, Yi L et al (2018) Detecting confident information coverage holes in industrial Internet of Things: an energy-efficient perspective. IEEE Commun Mag 56(9):68–73

    Article  Google Scholar 

  8. Williams JM, Khanna R, Ruiz-Rosero JP et al (2017) Weaving the wireless web: toward a low-power, dense wireless sensor network for the industrial IoT. IEEE Microw Mag 18(7):40–63

    Article  Google Scholar 

  9. Kleinmann A, Wool A (2017) Automatic construction of statechart-based anomaly detection models for multi-threaded industrial control systems. ACM Trans Intell Syst Technol 8(4):1–21

    Article  Google Scholar 

  10. Zhao G, Liu YJ, Shi Y (2018) Real-time assessment of the cross-task mental workload using physiological measures during anomaly detection. IEEE Trans Human-Machine Syst 48(2):1–12

    Article  Google Scholar 

  11. Zhou C, Shuang H, Xiong N et al (2017) Design and analysis of multimodel-based anomaly intrusion detection systems in industrial process automation. IEEE Trans Syst Man Cybern Syst 45(10):1345–1360

    Article  Google Scholar 

  12. Ratre A, Pankajakshan V (2018) Tucker tensor decomposition-based tracking and Gaussian mixture model for anomaly localisation and detection in surveillance videos. IET Comput Vis 12(6):933–940

    Article  Google Scholar 

  13. Gitinavard H, Mousavi SM, Vahdani B (2017) Soft computing-based new interval-valued hesitant fuzzy multi-criteria group assessment method with last aggregation to industrial decision problems. Soft Comput 21(12):1–19

    Article  Google Scholar 

  14. Pace P, Aloi G, Gravina R et al (2019) An edge-based architecture to support efficient applications for healthcare Industry 4.0. IEEE Trans Ind Inf 15(1):481–489

    Article  Google Scholar 

  15. Mahmood A, Sisinni E, Guntupalli L et al (2019) Scalability analysis of a LoRa network under imperfect orthogonality. IEEE Trans Ind Inform 15(3):1425–1436

    Article  Google Scholar 

  16. Murillo Y, Reynders B, Chiumento A et al (2019) A multiprotocol low-cost automated testbed for BLE mesh. IEEE Commun Mag 57(3):76–83

    Article  Google Scholar 

  17. Laaki H, Miche Y, Tammi K (2019) Prototyping a digital twin for real time remote control over mobile networks: application of remote surgery. IEEE Access 7(99):20325–20336

    Article  Google Scholar 

  18. Nezami Z, Zamanifar K (2019) Internet of Things/Internet of Everything: structure and ingredients. IEEE Potentials 38(2):12–17

    Article  Google Scholar 

  19. Rakovic V, Karamachoski J, Atanasovski V et al (2019) Blockchain Paradigm and Internet of Things. Wirel Pers Commun 106(3):219–235

    Article  Google Scholar 

  20. Liu S, Guo L, Webb H et al (2019) Internet of Things monitoring system of modern eco-agriculture based on cloud computing. IEEE Access 7(99):37050–37058

    Article  Google Scholar 

  21. Han Y, Seed D, Wang C et al (2019) Delay-aware application protocol for Internet of Things. IEEE Netw 33(1):1–8

    Article  Google Scholar 

Download references

Funding

This research was financially supported by the Fundamental Research Funds for Central University: Research on Storing Unstructured Data in the Relational Database Model (Grant No. 2019NQN53).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chao Wang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, C. IoT anomaly detection method in intelligent manufacturing industry based on trusted evaluation. Int J Adv Manuf Technol 107, 993–1005 (2020). https://doi.org/10.1007/s00170-019-04274-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00170-019-04274-0

Keywords

Navigation