iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems

被引:5
作者
Azad, Saiful [1 ]
Mahmud, Mufti [2 ,3 ,4 ,8 ]
Zamli, Kamal Z. [5 ]
Kaiser, M. Shamim [6 ]
Jahan, Sobhana [1 ]
Razzaque, Md. Abdur [7 ]
机构
[1] Green Univ Bangladesh, Dept Comp Sci & Engn, Dhaka, Bangladesh
[2] Nottingham Trent Univ, Dept Comp Sci, Nottingham NG11 8NS, England
[3] Nottingham Trent Univ, Comp & Informat Res Ctr, Nottingham NG11 8NS, England
[4] Nottingham Trent Univ, Med Technol Innovat Facil, Nottingham NG11 8NS, England
[5] Univ Malaysia Pahang, Fac Comp, Gambang 26300, Kuantan, Malaysia
[6] Jahangirnagar Univ, Inst Informat Technol, Dhaka 1342, Bangladesh
[7] Univ Dhaka, Dept Comp Sci & Engn, Dhaka 1000, Bangladesh
[8] Nottingham Trent Univ, Dept Comp Sci, Clifton Campus,Clifton Lane, Nottingham NG11 8NS, England
关键词
Cyber security; Industry; 4.0; Smart factory; FP-growth algorithm; Naive Bayes; INTERNET; NEGOTIATION; PREDICTION; MANAGEMENT; THREATS;
D O I
10.1016/j.eswa.2023.121676
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To meet the demand of the world's largest population, smart manufacturing has accelerated the adoption of smart factories-where autonomous and cooperative instruments across all levels of production and logistics networks are integrated through a Cyber-Physical Production System (CPPS). However, these networks are comprised of various heterogeneous devices with varying computational power and memory capabilities. As a result, many secure communication protocols - that demand considerably high computational power and memory - can not be verbatim employed on these networks, and thereby, leaving them more vulnerable to security threats and attacks over conventional networks. These threats can largely be tackled by employing a Trust Management Model (TMM) by exploiting the behavioural patterns of nodes to identify their trust class. In this context, ML-based models are best suited due to their ability to capture hidden patterns in data, learning and improving the pattern detection accuracy over time to counteract and tackle threats of a dynamic nature, which is absent in most of the conventional models. However, among the existing ML-based solutions in detecting attack patterns, many of them are computationally expensive, require a long training time, and a considerably large amount of training data-which are seldom available. An aid to this is the association rule learning (ARL) paradigm, whose models are computationally inexpensive and do not require a long training time. Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. In addition, a new optimisation model for finding optimum parameter values in the MEDF and an algorithm for transmuting a 1D quantitative feature into a respective categorical feature are developed to facilitate the model. Afterwards, the trust class of an object is identified employing the Naive Bayes classifier. This proposed model is evaluated on a trust evolution-supported experimental environment along with other compared models taking a benchmark dataset into consideration, where it outperforms its counterparts.
引用
收藏
页数:16
相关论文
共 90 条
  • [41] Lee Jay, 2015, Manufacturing Letters, V3, P18, DOI 10.1016/j.mfglet.2014.12.001
  • [42] Clarifying Trust in Social Internet of Things
    Lin, Zhiting
    Dong, Liang
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2018, 30 (02) : 234 - 248
  • [43] Lord N, 2017, Digital guardian's blog
  • [44] Mahmud M., 2021, COVID-19: Prediction, Decision-Making, and its Impacts, P77, DOI DOI 10.1007/978-981-15-9682-79
  • [45] Towards Explainable and Privacy-Preserving Artificial Intelligence for Personalisation in Autism Spectrum Disorder
    Mahmud, Mufti
    Kaiser, M. Shamim
    Rahman, Muhammad Arifur
    Wadhera, Tanu
    Brown, David J.
    Shopland, Nicholas
    Burton, Andrew
    Hughes-Roberts, Thomas
    Al Mamun, Shamim
    Ieracitano, Cosimo
    Tania, Marzia Hoque
    Moni, Mohammad Ali
    Islam, Mohammed Shariful
    Ray, Kanad
    Hossain, M. Shahadat
    [J]. UNIVERSAL ACCESS IN HUMAN-COMPUTER INTERACTION: USER AND CONTEXT DIVERSITY, UAHCI 2022, PT II, 2022, 13309 : 356 - 370
  • [46] Deep Learning in Mining Biological Data
    Mahmud, Mufti
    Kaiser, M. Shamim
    McGinnity, T. Martin
    Hussain, Amir
    [J]. COGNITIVE COMPUTATION, 2021, 13 (01) : 1 - 33
  • [47] A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications
    Mahmud, Mufti
    Kaiser, M. Shamim
    Rahman, M. Mostafizur
    Rahman, M. Arifur
    Shabut, Antesar
    Al-Mamun, Shamim
    Hussain, Amir
    [J]. COGNITIVE COMPUTATION, 2018, 10 (05) : 864 - 873
  • [48] Applications of Deep Learning and Reinforcement Learning to Biological Data
    Mahmud, Mufti
    Kaiser, Mohammed Shamim
    Hussain, Amir
    Vassanelli, Stefano
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2018, 29 (06) : 2063 - 2079
  • [49] SCA: A Sine Cosine Algorithm for solving optimization problems
    Mirjalili, Seyedali
    [J]. KNOWLEDGE-BASED SYSTEMS, 2016, 96 : 120 - 133
  • [50] Cyber-physical systems in manufacturing
    Monostori, L.
    Kadar, B.
    Bauernhansl, T.
    Kondoh, S.
    Kumara, S.
    Reinhart, G.
    Sauer, O.
    Schuh, G.
    Sihn, W.
    Ueda, K.
    [J]. CIRP ANNALS-MANUFACTURING TECHNOLOGY, 2016, 65 (02) : 621 - 641