SIEMS: A Secure Intelligent Energy Management System for Industrial IoT Applications

Microgrids are industrial technologies that can provide energy resources for the Internet of Things (IoT) demands in smart grids. Hybrid microgrids supply quality power to the IoT devices and ensure high resiliency in supply and demand for PV-based grid-tied microgrids. In this system, the usage of predictive energy management systems (EMS) is essential to dispatch power from different resources, while the battery energy storage system (BESS) is feeding the loads. In this article, we deploy a one-day-ahead prediction algorithm using a deep neural network for a fast-response BESS in an intelligent energy management system (I-EMS) that is called SIEMS. The main role of the SIEMS is to maintain the SOC at high rates based on the one-day-ahead information about solar power, which depends on meteorological conditions. The remaining power is supplied by the main grid for sustained power streaming between BESS and end-users. Considering the usage of information and communication technology components in the microgrids, the main objective of this article is focused on the hybrid microgrid performance under cyber-physical security adversarial attacks. Fast gradient sign, basic iterative, and DeepFool methods, which are investigated for the first time in power systems e.g., smart grid and microgrids, in order to produce perturbation for training data. To secure the microgrid’s SIEMS, we propose two Defence algorithms based on defensive distillation and adversarial training strategies for the first time in EMSs. We apply and evaluate these benchmark adversarial attack and Defence methods against the proposed machine learning models to increase the robustness of the models in the system against adversarial attacks.

Mitigating Malicious Adversaries Evasion Attacks in Industrial Internet of Things

With advanced 5G/6G networks, data-driven interconnected devices will increase exponentially. As a result, the Industrial Internet of Things (IIoT) requires data secure information extraction to apply digital services, medical diagnoses, and financial forecasting. This introduction of high-speed network mobile applications will also adapt. As a consequence, the scale and complexity of Android malware are rising. Detection of malware classification is vulnerable to attacks. A fabricated feature can force misclassification to produce the desired output. This article proposes a subset feature selection method to evade fabricated attacks in the IIoT environment. The method extracts application-aware features from a single android application to train an independent classification model. Ensemble-based learning is then used to train the distinct classification models. Finally, the collaborative ML classifier makes independent decisions to fight against adversarial evasion attacks. We compare and evaluate the benchmark Android malware dataset. The proposed method achieved 91% accuracy with 14 fabricated input features.

Deep Bayesian Slow Feature Extraction With Application to Industrial Inferential Modeling

Inferential modeling has been of significance for modern manufacturing in estimating the quality-related process variables. As an effective inferential model, probabilistic slow feature analysis (PSFA) has gained attention in regression tasks to interpret dynamic properties with a slowness preference. However, PSFA is often challenged by the nonlinear sequential data due to its linear state-space structure. In this article, a new nonlinear extension of PSFA is proposed under the deep learning framework to enhance the dynamic feature extraction with limited labels, incorporating variational inference and Monte Carlo inference to derive the objective function. The proposed model considers the relevance of inputs with outputs as the input weights to upgrade prediction performance. The proposed model is verified through an industrial hydrocracking process to predict diesel yield with missing labels ranged from 0% to 50%, and the root mean squared error is reduced by at least 8.78% compared to PSFA.

TRUTH: Trust and Authentication Scheme in 5G-IIoT

Due to the extremely important role of data in the industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this article, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-party authenticated key exchange (AKE) protocol with privacy-preserving to secure data exchanged via wireless communication, cope with unauthorized entities, and ensure data integrity. Moreover, we develop a trust model based on the Dempster–Shafer theory to check the trustworthiness of data collected by smart devices/sensor nodes. Security analysis performed on our scheme demonstrates that it can withstand different well known attacks in the IIoT environment. We also analyzed the validity of our scheme by using the automated validation of internet security protocols and applications tool. Additionally, the performance evaluation and experimental results prove the effectiveness of the proposed scheme compared to the existing works in terms of accuracy, delay, trust, and throughput.

TaLWaR: Blockchain-Based Trust Management Scheme for Smart Enterprises With Augmented Intelligence

In recent years, the Internet of Things (IoT) and enterprise management systems (EMS) have been rapidly growing and applied in advanced Industries. It provides better big data analytics and the most promising computing platforms. Moreover, IoT is transforming into the augmented intelligence of things (AIoT), developing a human-oriented paradigm for enterprises with AI. Still, smart enterprises and industries have additional requirements, such as device and data trust, robust decision-making, communication latency, and secure data storage. However, previous emerging paradigms and approaches did not fully address all of the aforementioned requirements. Therefore, this article proposes a blockchain-based trust management scheme for smart enterprises with augmented intelligence. The blockchain-based device trust authentication mechanism is used at the device connection layer for device authentication in clusters of IoT devices (smart enterprises branch-SEB). Furthermore, the blockchain-based augmented intelligence enabled approach is leveraged for data authentication at the authentication layer. Finally, smart enterprise data are stored in the distributed hash table (DHTs) and decentralized cloud layer with distributed hash table. We evaluated the proposed scheme using qualitative and quantitative analysis and compared it to the existing studies, showing better performance as 40.887-ms computational cost and 1872-bits transactional cost.

Multiphase Overtaking Maneuver Planning for Autonomous Ground Vehicles Via a Desensitized Trajectory Optimization Approach

This article studies the problem of trajectory optimization for autonomous ground vehicles with the consideration of irregularly placed on-road obstacles and multiple maneuver phases. By introducing a series of event sequences, a new multiphase constrained optimal control formulation is constructed to describe the automatic overtaking process. Although existing trajectory optimization techniques can be applied to address the constructed problem, they may suffer from poor or premature convergence issues due to the complexity of the mission formulation. Thus, to offer an effective alternative, a novel desensitized trajectory optimization method is designed and implemented to explore the optimal overtaking maneuver for the AGVs. The proposed method applies a double layer structure, where an enhanced intelligent optimization method is used in the outer layer such that the main inner optimization routine can be boosted by starting at a better reference solution. The algorithm convergence as well as the solution optimality conditions are theoretically analyzed. Numerical results are provided to illustrate the validity of the established formulation. Comparative case studies were executed to demonstrate the quality of the obtained solution and the enhanced performance of the proposed trajectory optimization method.

<italic>AutoConf:</italic> New Algorithm for Reconfiguration of Cyber-Physical Production Systems

The increasing size and complexity of cyber-physical production systems (CPPS) lead to an increasing number of faults, such as broken components or interrupted connections. Nowadays, faults are handled manually, which is time-consuming because for most operators mapping from symptoms (i.e., warnings) to repair instructions is rather difficult. To enable CPPS to adapt to faults autonomously, reconfiguration, i.e., the identification of a new configuration that allows either reestablishing production or a safe shutdown, is necessary. This article addresses the reconfiguration problem of CPPS and presents a novel algorithm called AutoConf. AutoConf operates on a hybrid automaton that models the CPPS and a specification of the controller to construct a QSM. This QSM is based on propositional logic and represents the CPPS in the reconfiguration context. Evaluations on an industrial use case and simulations from process engineering illustrate the effectiveness and examine the scalability of AutoConf.

Tightly Coupled Modeling and Reliable Fusion Strategy for Polarization-Based Attitude and Heading Reference System

The polarization-based attitude and heading reference system (PAHRS) provides an effective solution for attitude and heading information acquisition. Its practical performance, however, will be degraded due to partial loss and/or occlusion of the optical signal. To improve the adaptivity of PAHRS, in this article, we establish a polarization-based tightly coupled model (PTCM) and propose a reliable fusion strategy for information extraction from the polarization sensor (PS) and inertial navigation system (INS). As compared to the existing PS/INS fusion model, the proposed PTCM directly adopt PS raw observations (polarized skylight intensity) to compensate for the accumulation errors of INS, thereby removing the constraints on the least number of PS observation channels and avoiding nonlinear transformation of PS noises. Moreover, the reliable fusion strategy consists of a reliable observation channel selection step followed by a nonlinear filtering step, which can reduce the effect of unreliable polarized skylight intensity measurement. Finally, the simulation, static and semi-physical vehicle-mounted tests confirm the effectiveness of the proposed PTCM and fusion strategy.