scholarly journals VoNR-IPD: A Novel Timing-Based Network Steganography for Industrial Internet

2020 ◽  
Vol 2020 ◽  
pp. 1-14
Author(s):  
Mingqian Wang ◽  
Shuai Cao ◽  
Yunliang Wang

As the predominant trade secret of manufacturing enterprises, industrial data may be monitored and stolen by competitive adversaries during the transmission via open wireless link. Such information leakage will cause severe economic losses. Hence, a VoNR-IPD covert timing steganography based on 5G network is proposed in this paper, in which VoNR traffic is employed as the steganographic carrier of covert communication in Industrial Internet. Interference of network jitter noise is fully considered and the high-order statistical properties of jittered VoNR interpacket delays (IPDs) are imitated during the modulation of confidential industrial data. Thus, the generated covert VoNR IPDs can possess consistent statistical properties with the normal case in order to improve undetectability. Besides, the synchronization mechanism of steganographic embedding mode is designed to control the embedding density of industrial data flexibly. The experimental results show that our scheme can resist statistical-based detections and the network noise effectively, which outperforms the existing methods in terms of undetectability and robustness.

Author(s):  
Yushan Siriwardhana ◽  
Pawani Porambage ◽  
Madhusanka Liyanage ◽  
Jaspreet Singh Walia ◽  
Marja Matinmikko-Blue ◽  
...  

2011 ◽  
Vol 55-57 ◽  
pp. 1483-1488
Author(s):  
Wei Li

In a network production enterprise, if some complex faults happen, it may be possible of resulting in huge economic losses. For resolving real problems in modern manufacturing enterprises, a remote B/S maintenance pattern is designed for manufacturing network equipments by adopting some core information technologies, by the use of knowledge reason and data management view, some remote maintenance support technologies of maintenance decision suitable for network equipments have been minutely analyzed and constructed, finally in some practice the advantage and efficiency for manufacturing network equipments about this network maintenance way have been tested and verified with improved and better services.


2019 ◽  
Vol 2019 ◽  
pp. 1-12
Author(s):  
Tao Wang ◽  
Bo Yang ◽  
Guoyong Qiu ◽  
Lina Zhang ◽  
Yong Yu ◽  
...  

Massive data are generated and collected by devices in the industrial Internet of Things. Data sources would encrypt the data and send them to the data center through the gateway. For some supervision purpose, the gateway needs to observe the encrypted data stream and label the suspicious data. Instead of decrypting ciphertext at the gateway, which is not efficient, this paper presents a Φ-searchable functional encryption scheme that supports inner product evaluations on encrypted data. Based on this scheme, an approach enabling various queries on the encrypted industrial data stream is proposed. The adaptive security of our proposed underlying functional encryption scheme can be proven under general subgroup decision assumptions, and our scheme has the smaller public key, the smaller secret key, and the smaller ciphertext size compared to the related schemes. In addition, the experimental results show that our proposed scheme is efficient. Especially for the gateway, querying on the encrypted data only needs less than 20ms, which is practical for industrial data stream auditing scenario.


2020 ◽  
Vol 2020 ◽  
pp. 1-16 ◽  
Author(s):  
Jing Liu ◽  
Changbo Yuan ◽  
Yingxu Lai ◽  
Hua Qin

Industrial Internet technology has developed rapidly, and the security of industrial data has received much attention. At present, industrial enterprises lack a safe and professional data security system. Thus, industries urgently need a complete and effective data protection scheme. This study develops a three-layer framework with local/fog/cloud storage for protecting sensitive industrial data and defines a threat model. For real-time sensitive industrial data, we use the improved local differential privacy algorithm M-RAPPOR to perturb sensitive information. We encode the desensitized data using Reed–Solomon (RS) encoding and then store them in local equipment to realize low cost, high efficiency, and intelligent data protection. For non-real-time sensitive industrial data, we adopt a cloud-fog collaborative storage scheme based on AES-RS encoding to invisibly provide multilayer protection. We adopt the optimal solution of distributed storage in local equipment and the cloud-fog collaborative storage scheme in fog nodes and cloud nodes to alleviate the storage pressure on local equipment and to improve security and recoverability. According to the defined threat model, we conduct a security analysis and prove that the proposed scheme can provide stronger data protection for sensitive data. Compared with traditional methods, this approach strengthens the protection of sensitive information and ensures real-time continuity of open data sharing. Finally, the feasibility of our scheme is validated through experimental evaluation.


Machines ◽  
2021 ◽  
Vol 9 (10) ◽  
pp. 232
Author(s):  
Juan Manuel Castillo ◽  
Giacomo Barbieri ◽  
Alejandro Mejia ◽  
José Daniel Hernandez ◽  
Kelly Garces

Within the Industry 4.0 revolution, manufacturing enterprises are transforming to intelligent enterprises constituted by Smart Manufacturing Systems (SMSs). A key capability of SMSs is the ability to connect and communicate with each other through Industrial Internet of Things technologies, and protocols with standard syntax and semantics. In this context, the GEMMA-GRAFCET Methodology (GG-Methodology) provides a standard approach and vocabulary for the management of the Operational Modes (OMs) of SMSs through the automation software, bringing a common understanding of the exchanged data. Considering the lack of tools to implement the methodology, this work introduces an online tool based on Model-Driven Engineering–GEMMA-GRAFCET Generator (GG-Generator)–to specify and generate PLCopen XML code compliant with the GG-Methodology. The proposed GG-Generator is applied to a case study and validated using Virtual Commissioning and Dynamic Software Testing. Due to the consistency obtained between the GG-Methodology and the generated PLC code, the GG-Generator is expected to support the adoption of the methodology, thus contributing to the interoperability of SMSs through the standardization of the automation software for the management of their OMs.


Sign in / Sign up

Export Citation Format

Share Document