Research article Special Issues

The risk assessment on the security of industrial internet infrastructure under intelligent convergence with the case of G.E.'s intellectual transformation

  • academic editor: Thippa Reddy Gadekallu
  • Received: 29 September 2021 Revised: 01 December 2021 Accepted: 05 December 2021 Published: 14 January 2022
  • The industrial internet depends on the development of cloud computing, artificial intelligence, and big data analysis. Intelligent fusion is dependent on the architecture and security features of the industrial internet. Firstly, the paper studies the infrastructure mode that needs to be solved urgently in the industrial internet and provides a possible infrastructure mode and related security evaluation system. Secondly, it analyses the digital transformation process with the case of G.E.os industrial nternet development practice. It clarifies that G.E. is forming a new value closed-loop through digital and strategy mixed channels. Thirdly, industrial internet security research is described within multiple viewpoints based on industrial internet applications, the security service and security assurance defense systemos architecture, and the non-user entrance probability model. Finally, the paper illustrates the changes in knowledge workflow and social collaboration caused by the industrial internet under intelligent manufacture.

    Citation: Jiang Zhao, Dan Wu. The risk assessment on the security of industrial internet infrastructure under intelligent convergence with the case of G.E.'s intellectual transformation[J]. Mathematical Biosciences and Engineering, 2022, 19(3): 2896-2912. doi: 10.3934/mbe.2022133

    Related Papers:

  • The industrial internet depends on the development of cloud computing, artificial intelligence, and big data analysis. Intelligent fusion is dependent on the architecture and security features of the industrial internet. Firstly, the paper studies the infrastructure mode that needs to be solved urgently in the industrial internet and provides a possible infrastructure mode and related security evaluation system. Secondly, it analyses the digital transformation process with the case of G.E.os industrial nternet development practice. It clarifies that G.E. is forming a new value closed-loop through digital and strategy mixed channels. Thirdly, industrial internet security research is described within multiple viewpoints based on industrial internet applications, the security service and security assurance defense systemos architecture, and the non-user entrance probability model. Finally, the paper illustrates the changes in knowledge workflow and social collaboration caused by the industrial internet under intelligent manufacture.



    加载中


    [1] W. Z. Khan, M. H. Rehman, H. M. Zangoti, M. K. Afzal, N. Armi, K. Salah, Industrial internet of things: Recent advances, enabling technologies and open challenges, Comput. Electr. Eng., 81 (2020), 106522. https://doi.org/10.1016/j.compeleceng.2019.106522. doi: 10.1016/j.compeleceng.2019.106522
    [2] D. Yin, Exploration on industrial internet to promoting the integration development of factory network and internet, China Manage. Inf., 22 (2019), 74-75.
    [3] P. K. R. Maddikunta, Q. V. Pham, B. Prabadevi, N. Deepa, K. Dev, T. R. Gadekallu, et al., Industry 5.0: A survey on enabling technologies and potential applications, J. Ind. Inf. Integr., (2021), 100257. https://doi.org/10.1016/j.jii.2021.100257. doi: 10.1016/j.jii.2021.100257
    [4] J. Posada, C. Toro, I. Barandiaran, D. Oyarzun, D. Stricker, R. D. Amicis, et al., Visual computing as a key enabling technology for industrie 4.0 and industrial internet, IEEE Comput. Graphics Appl., 35 (2015), 26-40. https://doi.org/10.1109/MCG.2015.45. doi: 10.1109/MCG.2015.45
    [5] K. Wang, Y. Wang, Y. Sun, S. Guo, J. Wu, Green industrial internet of things architecture: An energy-efficient perspective, IEEE Commun. Mag., 54 (2016), 48-54. https://doi.org/10.1109/MCOM.2016.1600399CM. doi: 10.1109/MCOM.2016.1600399CM
    [6] D. Liu, W. Zhou, A smart factory system based on edge computing, J. Hubei Univ. Technol., 34 (2019), 74-77.
    [7] S. W. Lin, B. Miller, J. Durand, G. Bleakley, A. Chigani, R. Martin, et al., The Industrial Internet of Things Volume G1: Reference Rrchitecture, Industrial Internet Consortium, (2017), 10-46.
    [8] A. Gilchrist, Designing industrial internet systems, Industry 4.0. Apress, Berkeley, (2016), 87-118. https://doi.org/10.1007/978-1-4842-2047-4_5.
    [9] M. Iivari, P. Ahokangas, M. Komi, M. Tihinen, K. Valtanen, Toward ecosystemic business models in the context of industrial internet, in the 23rd Nordic Academy of Management Conference (NFF 2015), Business in Society, Copenhagen, 2015.
    [10] A, Sadeghi, W. Cristian, M. Waidner, Security and privacy challenges in industrial internet of things, in Proceedings of the 52nd Annual Design Automation Conference, (2015), 1-6. https://doi.org/10.1145/2744769.2747942.
    [11] Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng, Y. Zhang, Consortium blockchain for secure energy trading in industrial internet of things, IEEE Trans. Ind. Inf., 14 (2018), 3690-3700. https://doi.org/10.1109/TII.2017.2786307. doi: 10.1109/TII.2017.2786307
    [12] A. Bahga, V. K. Madisetti, Blockchain platform for industrial internet of things, J. Software Eng. Appl., 9 (2016), 533-546. https://doi.org/10.4236/jsea.2016.910036. doi: 10.4236/jsea.2016.910036
    [13] J. Q. Li, F. R. Yu, G. Deng, C. Luo, Z. Ming, Q. Yan, Industrial internet: A survey on the enabling technologies, applications, and challenges, IEEE Commun. Surv. Tutorials, 19 (2017), 1504-1526. https://doi.org/10.1109/COMST.2017.2691349. doi: 10.1109/COMST.2017.2691349
    [14] M. S. Hossain, G. Muhammad, Cloud-assisted industrial internet of Things (iiot)-enabled framework for health monitoring, Comput. Networks, 101 (2016), 192-202. https://doi.org/10.1016/j.comnet.2016.01.009. doi: 10.1016/j.comnet.2016.01.009
    [15] H. Wang, O. L. Osen, G. Li, H. N. Dai, W. Zeng, Big data and Industrial Internet of Things for the maritime industry in northwestern Norway, in TENCON 2015-2015 IEEE Region 10 Conference, (2015), 1-5. https://doi.org/10.1109/TENCON.2015.7372918.
    [16] J. Guo, Research on automatic control system based on intelligent non-ferrous metal industry internet, World Nonferrous Met., 3 (2019), 14-15.
    [17] H. W. Liu, Research on technology of intelligent factory industrial internet simulation and evaluation system based on electronic products, Electron. Test, 8 (2019), 134-136.
    [18] L. L. Xiao, Jing Yu, Y. J. Xia, J. Huang, Z. M. Zhang, An empirical study on the application of global industrial internet platform, Technol. IoT AI, 51 (2019), 1-8.
    [19] L. Wang, G. Wang, Big data in cyber-physical systems, digital manufacturing and industry 4.0, Int. J. Eng. Manuf. (IJEM), 6 (2016), 1-8. https://doi.org/10.5815/ijem.2016.04.01. doi: 10.5815/ijem.2016.04.01
    [20] S. Gierej, The framework of business model in the context of Industrial Internet of Things, Procedia Eng., 182 (2017), 206-212. https://doi.org/10.1016/j.proeng.2017.03.166. doi: 10.1016/j.proeng.2017.03.166
    [21] S. M. Laudien, B. Daxböck, The influence of the Industrial Internet of Things on business model design: A qualitative-empirical analysis, Int. J. Innovation Manage., 20 (2016), 1640014. https://doi.org/10.1142/S1363919616400144. doi: 10.1142/S1363919616400144
    [22] V. Mothukuri, R. M. Parizi, S. Pouriyeh, Y. Huang, A. Dehghantanha, G. Srivastava, A survey on security and privacy of federated learning, Future Gener. Comput. Syst., 115 (2021), 619-640. https://doi.org/10.1016/j.future.2020.10.007. doi: 10.1016/j.future.2020.10.007
    [23] W. Wang, H. Xu, M. Alazab, T. R. Gadekallu, Z. Han, C. Su, Blockchain-based reliable and efficient certificateless signature for IIoT devices, IEEE Trans. Ind. Inf., 2021. https://doi.org/10.1109/TII.2021.3084753. doi: 10.1109/TII.2021.3084753
    [24] C. Thirumalai, S. Mohan, G. Srivastava, An efficient public key secure scheme for cloud and IoT security, Comput. Commun., 150 (2020), 634-643. https://doi.org/10.1016/j.comcom.2019.12.015. doi: 10.1016/j.comcom.2019.12.015
    [25] L. Malina, G. Srivastava, P. Dzurenda, J. Hajny, R. Fujdiak, A secure publish/subscribe protocol for Internet of Things, in Proceedings of the 14th International Conference on Availability, Reliability and Security, (2019), 1-10. https://doi.org/10.1145/3339252.3340503.
    [26] Q. Li, Q. Tang, L. Chan, H. Wei, Y. Pu, H. Jiang, et al., Smart manufacturing standardization: Architectures, reference models and standards framework, Comput. Ind., 101 (2018), 91-106. https://doi.org/10.1016/j.compind.2018.06.005. doi: 10.1016/j.compind.2018.06.005
    [27] Y. Lv, J. Zhang, Intelligent factory technology framework based on big data, Comput. Integr. Manuf. Syst., 22 (2016), 2691-2697. Available from:https://kns.cnki.net/kcms/detail/11.3619.tp.20161021.1035.010.html.
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2416) PDF downloads(118) Cited by(7)

Article outline

Figures and Tables

Figures(5)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog