Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Chen, Zhitao* | Yang, Xiaodong | Jin, Bo | Guo, Mingya | Li, Miaomiao
Affiliations: School of Intelligent Manufacturing, Shunde Polytechnic, Foshan, Guangdong, China
Correspondence: [*] Corresponding author: Zhitao Chen, School of Intelligent Manufacturing, Shunde Polytechnic, Foshan, Guangdong 528300, China. E-mail: jsjtchang@163.com.
Abstract: In the process of industrial Internet security situation analysis, affected by the perception model, the average approximation error of security assessment results is high. Therefore, an industrial Internet security evaluation technology based on digital twin is proposed. Design the industrial Internet assessment mode, design the industrial Internet technical framework according to the digital twin, and clarify the elements of security situation assessment. According to the sliding time window, the fuzzy knowledge base is established. The security situation awareness model is designed based on digital twin, combined with the calculation results of fuzzy closeness to improve the accuracy of automatic perception results. Establish a multi port access protocol and realize the industrial Internet security evaluation technology under the digital twin with the help of the backed up coded key file. The experimental results show that the accuracy of the evaluation results of the design method is always above 95%, the tamper-proof success rate is always above 95%, and the physical value difference between the final values is 0.10. Therefore, this method effectively improves the evaluation accuracy. and tamper-proof success rate, reducing the difference value, it effectively controls the deviation of Internet operation data, provides security, is feasible and effective.
Keywords: Digital twins, industrial internet, safety assessment technology, security situational awareness model, fuzzy knowledge base, access protocol, encryption key
DOI: 10.3233/JCM-226375
Journal: Journal of Computational Methods in Sciences and Engineering, vol. 22, no. 6, pp. 1981-1994, 2022
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl