Internet of things for smart manufacturing based on advanced encryption standard (AES) algorithm with chaotic system

被引:5
|
作者
Huo, Xiaoyan [1 ]
Wang, Xuemei [2 ]
机构
[1] Jiaozuo Univ, Informat Construct & Management Ctr, Jiaozuo 454003, Peoples R China
[2] Jiaozuo Tech Coll, Acad Affairs Div, Jiaozuo 454000, Peoples R China
关键词
AES; Chaotic system; IoT; Recurrent learning; Smart manufacturing; BLOCKCHAIN;
D O I
10.1016/j.rineng.2023.101589
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Smart manufacturing using the Internet of Things (IoT) ensures uninterrupted and human intervention-less automation in industries for precision outcomes. As the smart manufacturing encloses chaotic systems the point of security is always demandable due to external threats. For mitigating the authorization issues in chaotic systems, a Smart Reviving Authorization Model using Advanced Encryption Standard (SRAM-AES) is designed in this article. This model is selective for chaotic systems for reviving their conventional operation cycles and preventing failures. A machine/controller's performance is monitored for its point of instability through differential access. The malicious access and its cause for controller unstableness are verified using IoT elements (remotely) and deep recurrent learning algorithms. Such identified instances are recovered by providing alternate controller recommendations from the IoT platform. In the recurrent learning process, the unstable to stable point possibilities are verified; the passing controllers are equipped with AES mitigating the previous authorizations. For a stable-functioning controller, the AES deficiency in authorization is verified in its completion cycles for consecutive production instances. Thus this model stands reliable for preventing unauthorized access, controller downtime reduction, and production failures.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Research on Data Encryption Standard Based on AES Algorithm in Internet of Things Environment
    Su, Na
    Zhang, Yi
    Li, Mingyue
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 2071 - 2075
  • [2] Digital Image Encryption Based On Advanced Encryption Standard(AES) Algorithm
    Zhang, Qi
    Qun, Ding
    2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1218 - 1221
  • [3] A Multi-Chaotic Key Expansion for Advanced Encryption Standard (AES) Algorithm
    Assa-Agyei, Kwame
    Owa, Kayode
    Olajide, Funminyi
    Al-Hadhrami, Tawfik
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 711 - 717
  • [4] Image compression and encryption algorithm based on advanced encryption standard and hyper-chaotic system
    Nie, Zhe
    Liu, Zheng-Xin
    He, Xiang-Tao
    Gong, Li-Hua
    OPTICA APPLICATA, 2019, 49 (04) : 545 - 558
  • [5] Advanced AES Algorithm Using Dynamic Key in the Internet of Things System
    Thanh Nha Dang
    Huan Minh Vo
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 682 - 686
  • [6] Advanced Encryption Standard (AES)
    Network Box
    Netw. Secur., 2009, 12 (8-12):
  • [7] Hardware Implementation and Optimization of Advanced Encryption Standard (AES) algorithm based on CCSDS
    Taufik, M.
    Amin, D. E.
    Saifuddin, M. A.
    7TH INTERNATIONAL SEMINAR ON AEROSPACE SCIENCE AND TECHNOLOGY (ISAST 2019), 2020, 2226
  • [8] A secure image encryption based on spatial surface chaotic system and AES algorithm
    Sun, Fuyan
    Lv, Zongwang
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (03) : 3959 - 3979
  • [9] A secure image encryption based on spatial surface chaotic system and AES algorithm
    Fuyan Sun
    Zongwang Lv
    Multimedia Tools and Applications, 2022, 81 : 3959 - 3979
  • [10] IT security project: Implementation of the advanced encryption standard (AES) on a smart card
    Schramm, K
    Paar, C
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 176 - 180