Real-Time Monitoring Systems That Provide M2M Communication between Machines

被引:1
作者
Zhong, Ya [1 ]
机构
[1] Tongren Polytech Coll, Dept Informat Engn, Tongren, Peoples R China
关键词
machine-to-machine communication; trust; wireless systems; offline operation; data transmission; Internet of Things; intelligent control; INTERNET; AUTHENTICATION; SCHEME;
D O I
10.1587/transfun.2023EAP1049
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Artificial intelligence and the introduction of Internet of Things technologies have benefited from technological advances and new automated computer system technologies. Eventually, it is now possible to integrate them into a single offline ffl ine industrial system. This is accomplished through machine-to-machine communication, which eliminates the human factor. The purpose of this article is to examine security systems for machine-to-machine communication systems that rely on identification and authentication algorithms for real-time monitoring. The article investigates security methods for quickly resolving data processing issues by using the Security operations Center's main machine to identify and authenticate devices from 19 different ff erent machines. The results indicate that when machines are running offline ffl ine and performing various tasks, they can be exposed to data leaks and malware attacks by both the individual machine and the system as a whole. The study looks at the operation of 19 computers, 7 of which were subjected to data leakage and malware attacks. AnyLogic software is used to create visual representations of the results using wireless networks and algorithms based on previously processed methods. The W76S is used as a protective element within intelligent sensors due to its built-in memory protection. For 4 machines, the data leakage time with malware attacks was 70 s. For 10 machines, the duration was 150 s with 3 attacks. Machine 15 had the longest attack duration, lasting 190 s and involving 6 malware attacks, while machine 19 had the shortest attack duration, lasting 200 s and involving 7 malware attacks. The highest numbers indicated that attempting to hack a system increased the risk of damaging a device, potentially resulting in the entire system with connected devices failing. Thus, illegal attacks by attackers using malware may be identified over time, and data processing effects ff ects can be prevented by intelligent control. The results reveal that applying identification and authentication methods using a protocol increases cyber-physical system security while also allowing real-time monitoring of offline ffl ine system security.
引用
收藏
页码:1019 / 1026
页数:8
相关论文
共 35 条
[1]  
[Anonymous], 2017, W76S(2/4)MR(KD/DN/D1/Q1/Q3/4F) Winbond TrustMETM Secure Element Security Target Lite
[2]  
Bao Fenye., 2012, World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a, P1, DOI [10.1109/WoWMoM.2012.6263792, DOI 10.1145/2378023.2378025, DOI 10.1109/WOWMOM.2012.6263792]
[3]   M2M Security: Challenges and Solutions [J].
Barki, Amira ;
Bouabdallah, Abdelmadjid ;
Gharout, Said ;
Traore, Jacques .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1241-1254
[4]  
Bedhief I, 2018, I C COMP SYST APPLIC
[5]  
Corici AA, 2020, CONF INNOV CLOUD, P102, DOI 10.1109/ICIN48450.2020.9059457
[6]   Efficient pavement crack detection and classification [J].
Cubero-Fernandez, A. ;
Rodriguez-Lozano, Fco. J. ;
Villatoro, Rafael ;
Olivares, Joaquin ;
Palomares, Jose M. .
EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2017,
[7]  
Poonam Ninad Railkar DPNMS, 2021, Turkish Journal of Computer and Mathematics Education (TURCOMAT), V12, P2483, DOI [10.17762/turcomat.v12i6.5691, 10.17762/turcomat.v12i6.5691, DOI 10.17762/TURCOMAT.V12I6.5691]
[8]  
El-Hajj M, 2017, 2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET)
[9]   A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment [J].
Esfahani, Alireza ;
Mantas, Georgios ;
Matischek, Rainer ;
Saghezchi, Firooz B. ;
Rodriguez, Jonathan ;
Bicaku, Ani ;
Maksuti, Silia ;
Tauber, Markus G. ;
Schmittner, Christoph ;
Bastos, Joaquim .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :288-296
[10]   A review of data centers as prosumers in district energy systems: Renewable energy integration and waste heat reuse for district heating [J].
Huang, Pei ;
Copertaro, Benedetta ;
Zhang, Xingxing ;
Shen, Jingchun ;
Lofgren, Isabelle ;
Ronnelid, Mats ;
Fahlen, Jan ;
Andersson, Dan ;
Svanfeldt, Mikael .
APPLIED ENERGY, 2020, 258