传统工业巨擘西门子作为德国工业4.0的先驱者与践行者,其所构建的Mi ndSphe r e平台在工业物联网行业有着不可动摇的地位。本文基于平台战略理论,构建了“核心—标准—边缘”的技术平台模型,分析了西门子为实现数字化转型升级所采取的...传统工业巨擘西门子作为德国工业4.0的先驱者与践行者,其所构建的Mi ndSphe r e平台在工业物联网行业有着不可动摇的地位。本文基于平台战略理论,构建了“核心—标准—边缘”的技术平台模型,分析了西门子为实现数字化转型升级所采取的平台战略。研究发现:(1)通过实施扩张性归核化战略打造的工业物联网平台MindSphere,是西门子重塑竞争优势的关键之举;(2)西门子在工业物联网的核心技术领域——工业物联和工业控制方面积极推广其标准,促进了国际工业物联网平台标准的统一;(3)西门子通过拓宽技术边界资源和社会边界资源,吸引更多的合作伙伴加入平台生态系统,打破了原有的产业边界,使平台更具有生命力与竞争力;(4)随着标准的全球推广,西门子工业物联网平台的网络效应已经显现:由开发者、运营者、用户和MindSphere应用商店共同构成Mi ndSpher e价值流,数字化服务已成为西门子的主要商业模式;(5)西门子突破了组织惯性。采取工业物联网平台战略的改变了竞争方式、组织形态、产品架构及商业模式,使其成为最大限度地利用网络效应的平台企业。展开更多
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi...With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of IIoT.Blockchain technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the IIoT.In the traditional blockchain,data is stored in a Merkle tree.As data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based IIoT.Accordingly,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of data.To solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC structure.Secondly,this paper uses PVC instead of the Merkle tree to store big data generated by IIoT.PVC can improve the efficiency of traditional VC in the process of commitment and opening.Finally,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of experiments.This mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT.展开更多
5G移动通信时代下工业4.0正从万物互联向万物智能演进,工业物联网(Industrial Internet of Things, IIoT)是5G通信系统重要应用场景之一。为促进5G时代下工业4.0的发展,针对IIoT场景提出了一种新的基于几何的随机模型(Geometry-Based St...5G移动通信时代下工业4.0正从万物互联向万物智能演进,工业物联网(Industrial Internet of Things, IIoT)是5G通信系统重要应用场景之一。为促进5G时代下工业4.0的发展,针对IIoT场景提出了一种新的基于几何的随机模型(Geometry-Based Stochastic Model, GBSM)。鉴于5G IIoT具有富散射、多移动性和毫米波等信道特性,所提模型基于正弦和(Sum of Sinusoids, SOS)理论探索毫米波IIoT信道的频率一致性。此外,该模型还基于簇的生灭过程描述了5G IIoT信道的时间-空间非平稳特性。仿真表明角度和时延等小尺度参数在频域上是平滑变化的,且均方根(Root Mean Square, RMS)延迟扩展(Delay Spread, DS)的模拟数据和射线追踪(Ray Tracing, RT)仿真数据的拟合结果较好。以上结果验证了所提模型的准确性和有效性,为5G IIoT信道特性分析、系统设计和优化提供了重要理论支撑。展开更多
为更好地补充和扩展典型工业物联网(Industrial Internet of Things,IIoT)场景中毫米波频段电波传播特性的研究,并满足IIoT在连接性、可靠性、安全性、智能化和覆盖性等方面的更高需求,在26 GHz频段下,对典型IIoT场景进行了信道测量与...为更好地补充和扩展典型工业物联网(Industrial Internet of Things,IIoT)场景中毫米波频段电波传播特性的研究,并满足IIoT在连接性、可靠性、安全性、智能化和覆盖性等方面的更高需求,在26 GHz频段下,对典型IIoT场景进行了信道测量与特性分析。研究涉及的典型工业场景包括不同设备布置密度的工业密集场景和工业稀疏场景。基于实测数据,对上述两种工业环境下的信道特征参数进行了萃取,并在此基础上分析和比较了两种典型工业场景的毫米波信道特性。研究发现,由于工业密集场景存在大量金属设备会对信号产生强反射,导致其路径损耗指数小于工业稀疏场景,且莱斯K因子更小、时延扩展更大。当接收端使用相控阵天线时,通过波束跟踪可以实时调整波束方向,从而提高信号的传输效果,减小信号传播时延。对IIoT场景信道特性的准确分析将有助于理解信号在工业环境中的传播规律,预测和评估通信系统的传输可靠性,进而优化系统设计和网络规划,确保IIoT应用的高效稳定运行。展开更多
The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the e...The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the edge convergence layer and the end sensing layer,with the former using intelligent fusion terminals for real-time data collection and processing.However,the influx of multiple low-voltage in the smart grid raises higher demands for the performance,energy efficiency,and response speed of the substation fusion terminals.Simultaneously,it brings significant security risks to the entire distribution substation,posing a major challenge to the smart grid.In response to these challenges,a proposed dynamic and energy-efficient trust measurement scheme for smart grids aims to address these issues.The scheme begins by establishing a hierarchical trust measurement model,elucidating the trust relationships among smart IoT terminals.It then incorporates multidimensional measurement factors,encompassing static environmental factors,dynamic behaviors,and energy states.This comprehensive approach reduces the impact of subjective factors on trust measurements.Additionally,the scheme incorporates a detection process designed for identifying malicious low-voltage end sensing units,ensuring the prompt identification and elimination of any malicious terminals.This,in turn,enhances the security and reliability of the smart grid environment.The effectiveness of the proposed scheme in pinpointing malicious nodes has been demonstrated through simulation experiments.Notably,the scheme outperforms established trust metric models in terms of energy efficiency,showcasing its significant contribution to the field.展开更多
The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during informati...The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange.To address the above challenges,a viable solution that combines Certificateless Public Key Cryptography(CL-PKC)with blockchain technology can be utilized.However,as many existing schemes rely on a single Key Generation Center(KGC),they are prone to problems such as single points of failure and high computational overhead.In this case,this paper proposes a novel blockchain-based certificateless cross-domain authentication scheme,that integrates the threshold secret sharing mechanism without a trusted center,meanwhile,adopts blockchain technology to enable cross-domain entities to authenticate with each other and to negotiate session keys securely.This scheme also supports the dynamic joining and removing of multiple KGCs,ensuring secure and efficient cross-domain authentication and key negotiation.Comparative analysiswith other protocols demonstrates that the proposed cross-domain authentication protocol can achieve high security with relatively lowcomputational overhead.Moreover,this paper evaluates the scheme based on Hyperledger Fabric blockchain environment and simulates the performance of the certificateless scheme under different threshold parameters,and the simulation results show that the scheme has high performance.展开更多
基金supported by China’s National Natural Science Foundation(Nos.62072249,62072056)This work is also funded by the National Science Foundation of Hunan Province(2020JJ2029).
文摘With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of IIoT.Blockchain technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the IIoT.In the traditional blockchain,data is stored in a Merkle tree.As data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based IIoT.Accordingly,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of data.To solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC structure.Secondly,this paper uses PVC instead of the Merkle tree to store big data generated by IIoT.PVC can improve the efficiency of traditional VC in the process of commitment and opening.Finally,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of experiments.This mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT.
文摘为更好地补充和扩展典型工业物联网(Industrial Internet of Things,IIoT)场景中毫米波频段电波传播特性的研究,并满足IIoT在连接性、可靠性、安全性、智能化和覆盖性等方面的更高需求,在26 GHz频段下,对典型IIoT场景进行了信道测量与特性分析。研究涉及的典型工业场景包括不同设备布置密度的工业密集场景和工业稀疏场景。基于实测数据,对上述两种工业环境下的信道特征参数进行了萃取,并在此基础上分析和比较了两种典型工业场景的毫米波信道特性。研究发现,由于工业密集场景存在大量金属设备会对信号产生强反射,导致其路径损耗指数小于工业稀疏场景,且莱斯K因子更小、时延扩展更大。当接收端使用相控阵天线时,通过波束跟踪可以实时调整波束方向,从而提高信号的传输效果,减小信号传播时延。对IIoT场景信道特性的准确分析将有助于理解信号在工业环境中的传播规律,预测和评估通信系统的传输可靠性,进而优化系统设计和网络规划,确保IIoT应用的高效稳定运行。
基金This project is partly funded by Science and Technology Project of State Grid Zhejiang Electric Power Co.,Ltd.“Research on active Security Defense Strategies for Distribution Internet of Things Based on Trustworthy,under Grant No.5211DS22000G”.
文摘The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent integration.The sensing layer of IIoT comprises the edge convergence layer and the end sensing layer,with the former using intelligent fusion terminals for real-time data collection and processing.However,the influx of multiple low-voltage in the smart grid raises higher demands for the performance,energy efficiency,and response speed of the substation fusion terminals.Simultaneously,it brings significant security risks to the entire distribution substation,posing a major challenge to the smart grid.In response to these challenges,a proposed dynamic and energy-efficient trust measurement scheme for smart grids aims to address these issues.The scheme begins by establishing a hierarchical trust measurement model,elucidating the trust relationships among smart IoT terminals.It then incorporates multidimensional measurement factors,encompassing static environmental factors,dynamic behaviors,and energy states.This comprehensive approach reduces the impact of subjective factors on trust measurements.Additionally,the scheme incorporates a detection process designed for identifying malicious low-voltage end sensing units,ensuring the prompt identification and elimination of any malicious terminals.This,in turn,enhances the security and reliability of the smart grid environment.The effectiveness of the proposed scheme in pinpointing malicious nodes has been demonstrated through simulation experiments.Notably,the scheme outperforms established trust metric models in terms of energy efficiency,showcasing its significant contribution to the field.
基金supported in part by the Fundamental Research Funds for the Central Universities(Nos.3282024052,3282024058)the“Advanced and Sophisticated”Discipline Construction Project of Universities in Beijing(No.20210013Z0401).
文摘The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange.To address the above challenges,a viable solution that combines Certificateless Public Key Cryptography(CL-PKC)with blockchain technology can be utilized.However,as many existing schemes rely on a single Key Generation Center(KGC),they are prone to problems such as single points of failure and high computational overhead.In this case,this paper proposes a novel blockchain-based certificateless cross-domain authentication scheme,that integrates the threshold secret sharing mechanism without a trusted center,meanwhile,adopts blockchain technology to enable cross-domain entities to authenticate with each other and to negotiate session keys securely.This scheme also supports the dynamic joining and removing of multiple KGCs,ensuring secure and efficient cross-domain authentication and key negotiation.Comparative analysiswith other protocols demonstrates that the proposed cross-domain authentication protocol can achieve high security with relatively lowcomputational overhead.Moreover,this paper evaluates the scheme based on Hyperledger Fabric blockchain environment and simulates the performance of the certificateless scheme under different threshold parameters,and the simulation results show that the scheme has high performance.