ShanghaiTech University Knowledge Management System
Fuzzy Harmony Search Technique for Cyber Risks in Industry 4.0 Wireless Communication Networks | |
2023-03-01 | |
Source Publication | PROCESSES
![]() |
ISSN | 2227-9717 |
EISSN | 2227-9717 |
Volume | 11Issue:3 |
Status | 已发表 |
DOI | 10.3390/pr11030951 |
Abstract | Industry 4.0 houses diverse technologies including wireless communication and shared networks for internal and external operations. Due to the wireless nature and remote operability, the exposure to security threats is high. Cyber risk detection and mitigation are prominent for secure industrial operations and planned outcomes. In addition, the system faces the threat of intelligence attacks, security standards issues, privacy concerns and scalability problems. The cyber risk related research problems influence overall data transmission in industry wireless communication networks. For augmenting communication security through cyber risk detection, this article introduces an Explicit Risk Detection and Assessment Technique (ERDAT) for cyber threat mitigation in the industrial process. A fuzzy harmony search algorithm powers this technique for identifying the risk and preventing its impact. The harmony search algorithm mimics the adversary impact using production factors such as process interruption or halting and production outcome. The search performs a mimicking operation for a high objective function based on production output for the admitted plan. The fuzzy operation admits the above factors for identifying the cyber impacting risk, either for its impacts or profitable outcome. In this process, the fuzzy optimization identifies the maximum or minimum objective output targeted for either outcome or risk interrupts, respectively. The fuzzy threshold is identified using a mediated acceptable range, computed as the ratio between minimum and maximum, mimicking occurrences between the risk and scheduled production outcomes. Therefore, the mimicking crossing or falling behind the threshold for the interruption/halting or production, respectively, are identified as risks and their source is detected. The detection communication source is disconnected from the industrial process for preventing further adversary impacts. The introduced system achieves 8.52% high-risk detection, 12.5% fewer outcome interrupts, 8.3% fewer halted schedules, 8.08% less interrupt span, and 7.94% less detection time compared to traditional methods. |
Keyword | communication networks cyber security FHS industry 4 0 risk detection |
URL | 查看原文 |
Indexed By | SCI ; EI |
Language | 英语 |
WOS Research Area | Engineering |
WOS Subject | Engineering, Chemical |
WOS ID | WOS:000958023400001 |
Publisher | MDPI |
EI Accession Number | 20241515856859 |
EI Keywords | Industry 4.0 |
EI Classification Number | 723 Computer Software, Data Handling and Applications ; 723.2 Data Processing and Image Processing ; 723.4.2 Machine Learning ; 913.4 Manufacturing ; 914.1 Accidents and Accident Prevention |
Original Document Type | Journal article (JA) |
Document Type | 期刊论文 |
Identifier | https://kms.shanghaitech.edu.cn/handle/2MSLDSTB/292194 |
Collection | 创意与艺术学院 创意与艺术学院_特聘教授组_汪军组 |
Corresponding Author | Sun, Fanglei |
Affiliation | 1.Tongji Univ, Coll Design & Innovat, Shanghai 200092, Peoples R China 2.ShanghaiTech Univ, Sch Creat & Art, Shanghai 201210, Peoples R China |
Corresponding Author Affilication | School of Creative and Art |
Recommended Citation GB/T 7714 | Diao, Zhifeng,Sun, Fanglei. Fuzzy Harmony Search Technique for Cyber Risks in Industry 4.0 Wireless Communication Networks[J]. PROCESSES,2023,11(3). |
APA | Diao, Zhifeng,&Sun, Fanglei.(2023).Fuzzy Harmony Search Technique for Cyber Risks in Industry 4.0 Wireless Communication Networks.PROCESSES,11(3). |
MLA | Diao, Zhifeng,et al."Fuzzy Harmony Search Technique for Cyber Risks in Industry 4.0 Wireless Communication Networks".PROCESSES 11.3(2023). |
Files in This Item: | ||||||
File Name/Size | DocType | Version | Access | License |
Edit Comment
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.