๐ค AI Summary
This work addresses the multifaceted security challenges faced by resource-constrained devices in Industrial Internet of Things (IIoT) environments, where existing solutions often suffer from single-layer protection, reliance on costly hardware, and a lack of real-world validation. To overcome these limitations, the authors propose a lightweight, machine learningโbased multilayer security framework that integrates the Tm-IIoT trust model with the H-IIoT hybrid architecture and introduces a Trust Convergence Acceleration mechanism to mitigate the adverse effects of network degradation on trust convergence. Implemented and validated on an open-source hardware platform under real-world conditions, the proposed approach significantly enhances system robustness against both physical-layer threats and adversarial machine learning attacks, while reducing trust convergence time by up to 28.6%, thereby advancing the practical deployment of IIoT security from simulation to real-world application.
๐ Abstract
The Industrial Internet of Things (IIoT) introduces significant security challenges as resource-constrained devices become increasingly integrated into critical industrial processes. Existing security approaches typically address threats at a single network layer, often relying on expensive hardware and remaining confined to simulation environments. In this paper, we present the research framework and contributions of our doctoral thesis, which aims to develop a lightweight, Machine Learning (ML)-based security framework for IIoT environments. We first describe our adoption of the Tm-IIoT trust model and the Hybrid IIoT (H-IIoT) architecture as foundational baselines, then introduce the Trust Convergence Acceleration (TCA) approach, our primary contribution that integrates ML to predict and mitigate the impact of degraded network conditions on trust convergence, achieving up to a 28.6% reduction in convergence time while maintaining robustness against adversarial behaviors. We then propose a real-world deployment architecture based on affordable, open-source hardware, designed to implement and extend the security framework. Finally, we outline our ongoing research toward multi-layer attack detection, including physical-layer threat identification and considerations for robustness against adversarial ML attacks.