Cellular networks are envisioned to be a cornerstone in future industrial Internet of Things (IIoT) wireless connectivity in terms of fulfilling the industrial-grade coverage, capacity, robustness, ...and timeliness requirements. This vision has led to the design of vertical-centric service-based architecture of 5G radio access and core networks. The design incorporates the capabilities to include 5G-AI-Edge ecosystem for computing, intelligence, and flexible deployment and integration options (e.g., centralized and distributed, physical, and virtual) while eliminating the privacy/security concerns of mission-critical systems. In this article, driven by the industrial interest in enabling large-scale wireless IIoT deployments for operational agility, flexible, and cost-efficient production, we present the state-of-the-art 5G architecture, transformative technologies, and recent design trends, which we also selectively supplemented with new results. We also identify several research challenges in these promising design trends that beyond-5G systems must overcome to support rapidly unfolding transition in creating value-centric industrial wireless networks.
Although the Internet of Things (IoT) can increase efficiency and productivity through intelligent and remote management, it also increases the risk of cyber-attacks. The potential threats to IoT ...applications and the need to reduce risk have recently become an interesting research topic. It is crucial that effective Intrusion Detection Systems (IDSs) tailored to IoT applications be developed. Such IDSs require an updated and representative IoT dataset for training and evaluation. However, there is a lack of benchmark IoT and IIoT datasets for assessing IDSs-enabled IoT systems. This paper addresses this issue and proposes a new data-driven IoT/IIoT dataset with the ground truth that incorporates a label feature indicating normal and attack classes, as well as a type feature indicating the sub-classes of attacks targeting IoT/IIoT applications for multi-classification problems. The proposed dataset, which is named TON_IoT, includes Telemetry data of IoT/IIoT services, as well as Operating Systems logs and Network traffic of IoT network, collected from a realistic representation of a medium-scale network at the Cyber Range and IoT Labs at the UNSW Canberra (Australia). This paper also describes the proposed dataset of the Telemetry data of IoT/IIoT services and their characteristics. TON_IoT has various advantages that are currently lacking in the state-of-the-art datasets: i) it has various normal and attack events for different IoT/IIoT services, and ii) it includes heterogeneous data sources. We evaluated the performance of several popular Machine Learning (ML) methods and a Deep Learning model in both binary and multi-class classification problems for intrusion detection purposes using the proposed Telemetry dataset.
Blockchain is an emerging technology that has widespread applications, such as those relating to Internet of Things (IoT) and Industrial IoT (IIoT). While there are many (potential) applications of ...blockchain in IIoT (the focus of this special issue), there are a number of ongoing challenges. For example, blockchain technology provides a solution to ensure a trust relationship without a centralized entity. However, such technology is still under development and suffers from a number of limitations and challenges during implementation, such as computational costs (e.g., mining), security (e.g., attacks such as distributed denial-of-service attacks, and theft of content). In an IIoT application, such as smart cities, Industry 4.0, and in military and battlefield context (also referred to as Internet of battlefield things and Internet of Military Things), there are more factors that need to be taken into consideration in the design of blockchain-based solutions. Therefore, in the following sections we will describe the advances presented in the editorial accepted in this special issue, designed to address different security and privacy challenges associated with the deployment of blockchain-based solutions in an IIoT setting.
While the industrial Internet of Things (IIoT) can support efficient control of the physical world through large amounts of industrial data, data security has been a challenge due to various ...interconnections and accesses. Blockchain technology can support security and privacy preservation in IIoT data with its trusted and reliable security mechanism. Sharding technology can help improve the overall throughput and scalability of blockchain networks. However, the effectiveness of sharding is still challenging due to the uneven distribution of malicious nodes. By aiming to improve the performance of blockchain networks and reduce the possibility of malicious node aggregation, in this article, we propose a many-objective optimization algorithm based on the dynamic reward and penalty mechanism (MaOEA-DRP) to optimize the shard validation validity model. Then, an optimal blockchain sharding scheme is obtained. Compared with other state-of-the-art many-objective optimization algorithms, MaOEA-DRP performs better on the DTLZ test suite. The simulation results demonstrate that our proposed algorithm can significantly improve the throughput and validity of sharding for better security in the blockchain-enabled IIoT.
The rapid development of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) brings new security threats by exposing secret and private data. Thus, information security has ...become a major concern in the communication environment of IIoT and AI, where security and privacy must be ensured for the messages between a sender and the intended recipient. In this article, we propose a method called Harris hawks optimization-integer wavelet transform (HHO-IWT) for covert communication and secure data in the IIoT environment based on digital image steganography. The method embeds secret data in the cover images using a metaheuristic optimization algorithm called HHO to efficiently select image pixels that can be used to hide bits of secret data within integer wavelet transforms. The HHO-based pixel selection operation uses an objective function evaluation depending on the following two phases: exploitation and exploration. The objective function is employed to determine an optimal encoding vector to transform secret data into an encoded form generated by the HHO algorithm. Several experiments are conducted to validate the performance of the proposed method with respect to visual quality, payload capacity, and security against attacks. The obtained results reveal that the HHO-IWT method achieves higher levels of security than the state-of-the-art methods and that it resists various forms of steganalysis. Thus, utilizing this approach can keep unauthorized individuals away from the transmitted information and solve some security challenges in the IIoT.
In-home healthcare services based on the Internet-of-Things (IoT) have great business potential; however, a comprehensive platform is still missing. In this paper, an intelligent home-based platform, ...the iHome Health-IoT, is proposed and implemented. In particular, the platform involves an open-platform-based intelligent medicine box (iMedBox) with enhanced connectivity and interchangeability for the integration of devices and services; intelligent pharmaceutical packaging (iMedPack) with communication capability enabled by passive radio-frequency identification (RFID) and actuation capability enabled by functional materials; and a flexible and wearable bio-medical sensor device (Bio-Patch) enabled by the state-of-the-art inkjet printing technology and system-on-chip. The proposed platform seamlessly fuses IoT devices (e.g., wearable sensors and intelligent medicine packages) with in-home healthcare services (e.g., telemedicine) for an improved user experience and service efficiency. The feasibility of the implemented iHome Health-IoT platform has been proven in field trials.
Industrial Internet of Things (IIoT) refers connecting sensing and actuating devices ubiquitously with Internet. Due to interconnection between different Internet-enabled objects around the globe, ...there is high volume of data generation in smart environment which raises serious security (e.g., rapid evolution of hacking techniques), privacy and scalability issues. To mitigate these issues, this paper presents, a new Privacy-Preserving based Threat Intelligence Framework (P2TIF).The P2TIF framework has two main modules. First a scalable blockchain module is designed to securely transmit the IIoT data and to prevent data from poisoning attacks. Second, a deep learning module is designed that uses Deep Variational Autoencoder (DVAE) for data transformation, and prevents data from inference attacks. The encoded data is further used by the Deep Gated Recurrent Neural Network (DGRNN)-based threat detection system to recognize malicious patterns in IIoT environment. The proposed framework is validated on ToN-IoT and IoT-Botnet datasets.
The impact of Internet of Things (IoT) has become increasingly significant in smart manufacturing, while deep generative model (DGM) is viewed as a promising learning technique to work with large ...amount of continuously generated industrial Big Data in facilitating modern industrial applications. However, it is still challenging to handle the imbalanced data when using conventional Generative Adversarial Network (GAN) based learning strategies. In this article, we propose a distribution bias aware collaborative GAN (DB-CGAN) model for imbalanced deep learning in industrial IoT, especially to solve limitations caused by distribution bias issue between the generated data and original data, via a more robust data augmentation. An integrated data augmentation framework is constructed by introducing a complementary classifier into the basic GAN model. Specifically, a conditional generator with random labels is designed and trained adversarially with the classifier to effectively enhance augmentation of the number of data samples in minority classes, while a weight sharing scheme is newly designed between two separated feature extractors, enabling the collaborative adversarial training among generator, discriminator, and classifier. An augmentation algorithm is then developed for intelligent anomaly detection in imbalanced learning, which can significantly improve the classification accuracy based on the correction of distribution bias using the rebalanced data. Compared with five baseline methods, experiment evaluations based on two real-world imbalanced datasets demonstrate the outstanding performance of our proposed model in tackling the distribution bias issue for multiclass classification in imbalanced learning for industrial IoT applications.
This paper presents a comprehensive review of emerging technologies for the internet of things (IoT)-based smart agriculture. We begin by summarizing the existing surveys and describing emergent ...technologies for the agricultural IoT, such as unmanned aerial vehicles, wireless technologies, open-source IoT platforms, software defined networking (SDN), network function virtualization (NFV) technologies, cloud/fog computing, and middleware platforms. We also provide a classification of IoT applications for smart agriculture into seven categories: including smart monitoring, smart water management, agrochemicals applications, disease management, smart harvesting, supply chain management, and smart agricultural practices. Moreover, we provide a taxonomy and a side-by-side comparison of the state-of-the-art methods toward supply chain management based on the blockchain technology for agricultural IoTs. Furthermore, we present real projects that use most of the aforementioned technologies, which demonstrate their great performance in the field of smart agriculture. Finally, we highlight open research challenges and discuss possible future research directions for agricultural IoTs.