Volume 1 , Issue 1 , PP: 59-68, 2021 | Cite this article as | XML | Html | PDF | Full Length Article
Abdullah Ali Salamai 1 *
The industrial sector is among the most suited sectors that may considerably advantage from the implementation of the ideas and technology of the Industrial Internet of Things (IIoT), and it is one of the most competitive industries in the world. The increased use of automated processes in manufacturing sectors results in a wide variety of applications based on IIoT. These applications call for the efficient integration of a wide variety of different systems and the execution of smooth operations across all machines. The issue of integration and smooth operation presents IIoT as a new subject of study in smart manufacturing. This carries with it several problems, including those on security, accountability, confidence, and dependability. As part of the Industrial Internet of Things (IIoT), many devices will be linked to one another and interact with one another through wireless and internet infrastructure. When this kind of situation plays out, the reliability of the IIoT devices becomes a key component in the process of preventing injection by hostile machines. As a result, an intelligent computer model is required to effectively cluster and categorize the level of trustworthiness possessed by the IIoT devices. In this article, we describe a trust model for the Internet of Things (IIoT) that is based on the neutrosophic TOPSIS and is utilized by IIoT apps to determine the trust score of IIoT devices. The reliability of devices is evaluated by the model that was constructed using the historical knowledge, chronological knowledge, and network behavior information that is received from IIoT devices. In addition to that, the model suggests KNN, and a Decision tree to categorize the attributes that were collected.
Machine Learning , Neutrosophic Sets , IoT , IIoT , Smart manufacturing
[1] X. Xu, M. Han, S. M. Nagarajan, and P. Anandhan, “Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment,” Computer communications, vol. 160, pp. 423–430, 2020.
[2] T. Wang, H. Luo, W. Jia, A. Liu, and M. Xie, “MTES: An intelligent trust evaluation scheme in sensor-cloud-enabled industrial Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 2054–2062, 2019.
[3] Y. Ren, F. Zhu, J. Qi, J. Wang, and A. K. Sangaiah, “Identity management and access control based on blockchain under edge computing for the industrial internet of things,” Applied Sciences, vol. 9, no. 10, p. 2058, 2019.
[4] K. Huang et al., “Building redactable consortium blockchain for industrial Internet-of-Things,” IEEE Transactions on Industrial Informatics, vol. 15, no. 6, pp. 3670–3679, 2019.
[5] P. Nikander, J. Autiosalo, and S. Paavolainen, “Interledger for the industrial internet of things,” in 2019 IEEE 17th International Conference on Industrial Informatics (INDIN), 2019, vol. 1, pp. 908–915.
[6] W. Z. Khan, M. H. Rehman, H. M. Zangoti, M. K. Afzal, N. Armi, and K. Salah, “Industrial internet of things: Recent advances, enabling technologies and open challenges,” Computers & Electrical Engineering, vol. 81, p. 106522, 2020.
[7] S. Zhao, S. Li, and Y. Yao, “Blockchain enabled industrial Internet of Things technology,” IEEE Transactions on Computational Social Systems, vol. 6, no. 6, pp. 1442–1453, 2019.
[8] W. Sun, S. Lei, L. Wang, Z. Liu, and Y. Zhang, “Adaptive federated learning and digital twin for industrial internet of things,” IEEE Transactions on Industrial Informatics, vol. 17, no. 8, pp. 5605–5614, 2020.
[9] T. Gebremichael et al., “Security and privacy in the industrial internet of things: Current standards and future challenges,” IEEE Access, vol. 8, pp. 152351–152366, 2020.
[10] S. He, W. Ren, T. Zhu, and K.-K. R. Choo, “BoSMoS: A blockchain-based status monitoring system for defending against unauthorized software updating in industrial Internet of Things,” IEEE Internet of Things Journal, vol. 7, no. 2, pp. 948–959, 2019.
[11] A.-R. Sadeghi, C. Wachsmann, and M. Waidner, “Security and privacy challenges in industrial internet of things,” in Proceedings of the 52nd annual design automation conference, 2015, pp. 1–6.
[12] K. Rose, S. Eldridge, and L. Chapin, “The internet of things: An overview,” The internet society (ISOC), vol. 80, pp. 1–50, 2015.
[13] M. H. ur Rehman, I. Yaqoob, K. Salah, M. Imran, P. P. Jayaraman, and C. Perera, “The role of big data analytics in industrial Internet of Things,” Future Generation Computer Systems, vol. 99, pp. 247–259, 2019.
[14] H. Boyes, B. Hallaq, J. Cunningham, and T. Watson, “The industrial internet of things (IIoT): An analysis framework,” Computers in industry, vol. 101, pp. 1–12, 2018.
[15] A. Bahga and V. K. Madisetti, “Blockchain platform for industrial internet of things,” Journal of Software Engineering and Applications, vol. 9, no. 10, pp. 533–546, 2016.
[16] W. H. Hassan, “Current research on Internet of Things (IoT) security: A survey,” Computer networks, vol. 148, pp. 283–294, 2019.
[17] Y. He, J. Guo, and X. Zheng, “From surveillance to digital twin: Challenges and recent advances of signal processing for industrial internet of things,” IEEE Signal Processing Magazine, vol. 35, no. 5, pp. 120–129, 2018.
[18] I. Lee and K. Lee, “The Internet of Things (IoT): Applications, investments, and challenges for enterprises,” Business horizons, vol. 58, no. 4, pp. 431–440, 2015.
[19] H. Wang, O. L. Osen, G. Li, W. Li, H.-N. Dai, and W. Zeng, “Big data and industrial internet of things for the maritime industry in northwestern norway,” in TENCON 2015-2015 IEEE Region 10 Conference, 2015, pp. 1–5.
[20] F. Al-Turjman and S. Alturjman, “Context-sensitive access in industrial internet of things (IIoT) healthcare applications,” IEEE Transactions on Industrial Informatics, vol. 14, no. 6, pp. 2736–2744, 2018.
[21] C. Qiu, F. R. Yu, H. Yao, C. Jiang, F. Xu, and C. Zhao, “Blockchain-based software-defined industrial Internet of Things: A dueling deep ${Q} $-learning approach,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4627–4639, 2018.
[22] H. Xu, W. Yu, D. Griffith, and N. Golmie, “A survey on industrial Internet of Things: A cyber-physical systems perspective,” Ieee access, vol. 6, pp. 78238–78259, 2018.
[23] H. P. Breivold and K. Sandström, “Internet of things for industrial automation--challenges and technical solutions,” in 2015 IEEE International Conference on Data Science and Data Intensive Systems, 2015, pp. 532–539.
[24] O. Vermesan and P. Friess, Internet of things applications-from research and innovation to market deployment. Taylor & Francis, 2014.
[25] H. Sharma, A. Tandon, P. K. Kapur, and A. G. Aggarwal, “Ranking hotels using aspect ratings based sentiment classification and interval-valued neutrosophic TOPSIS,” International Journal of System Assurance Engineering and Management, vol. 10, no. 5, pp. 973–983, 2019.
[26] P. Biswas, S. Pramanik, and B. C. Giri, “TOPSIS method for multi-attribute group decision-making under single-valued neutrosophic environment,” Neural computing and Applications, vol. 27, no. 3, pp. 727–737, 2016.
[27] Y. Ben-Haim and E. Tom-Tov, “A Streaming Parallel Decision Tree Algorithm.,” Journal of Machine Learning Research, vol. 11, no. 2, 2010.
[28] A. Priyam, G. R. Abhijeeta, A. Rathee, and S. Srivastava, “Comparative analysis of decision tree classification algorithms,” International Journal of current engineering and technology, vol. 3, no. 2, pp. 334–337, 2013.
[29] H. Chauhan and A. Chauhan, “Implementation of decision tree algorithm c4. 5,” International Journal of Scientific and Research Publications, vol. 3, no. 10, pp. 1–3, 2013.
[30] M. Pandey and V. K. Sharma, “A decision tree algorithm pertaining to the student performance analysis and prediction,” International Journal of Computer Applications, vol. 61, no. 13, pp. 1–5, 2013.
[31] N. Bhargava, G. Sharma, R. Bhargava, and M. Mathuria, “Decision tree analysis on j48 algorithm for data mining,” Proceedings of international journal of advanced research in computer science and software engineering, vol. 3, no. 6, 2013.
[32] W. Xing and Y. Bei, “Medical health big data classification based on KNN classification algorithm,” IEEE Access, vol. 8, pp. 28808–28819, 2019.
[33] S. Zhang, X. Li, M. Zong, X. Zhu, and R. Wang, “Efficient kNN classification with different numbers of nearest neighbors,” IEEE transactions on neural networks and learning systems, vol. 29, no. 5, pp. 1774–1785, 2017.
[34] S. Zhang, X. Li, M. Zong, X. Zhu, and D. Cheng, “Learning k for knn classification,” ACM Transactions on Intelligent Systems and Technology (TIST), vol. 8, no. 3, pp. 1–19, 2017.
[35] Z. Deng, X. Zhu, D. Cheng, M. Zong, and S. Zhang, “Efficient kNN classification algorithm for big data,” Neurocomputing, vol. 195, pp. 143–148, 2016.