{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T09:00:08Z","timestamp":1767085208010,"version":"3.40.5"},"reference-count":55,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,9,13]]},"abstract":"<jats:p>Industry 4.0 focuses on continuous interconnection services, allowing for the continuous and uninterrupted exchange of signals or information between related parties. The application of messaging protocols for transferring data to remote locations must meet specific specifications such as asynchronous communication, compact messaging, operating in conditions of unstable connection of the transmission line of data, limited network bandwidth operation, support multilevel Quality of Service (QoS), and easy integration of new devices. The Message Queue Telemetry Transport (MQTT) protocol is used in software applications that require asynchronous communication. It is a light and simplified protocol based on publish-subscribe messaging and is placed functionally over the TCP\/IP protocol. It is designed to minimize the required communication bandwidth and system requirements increasing reliability and probability of successful message transmission, making it ideal for use in Machine-to-Machine (M2M) communication or networks where bandwidth is limited, delays are long, coverage is not reliable, and energy consumption should be as low as possible. Despite the fact that the advantage that MQTT offers its way of operating does not provide a serious level of security in how to achieve its interconnection, as it does not require protocol dependence on one intermediate third entity, the interface is dependent on each application. This paper presents an innovative real-time anomaly detection system to detect MQTT-based attacks in cyber-physical systems. This is an online-semisupervised learning neural system based on a small number of sampled patterns that identify crowd anomalies in the MQTT protocol related to specialized attacks to undermine cyber-physical systems.<\/jats:p>","DOI":"10.1155\/2021\/4587862","type":"journal-article","created":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T22:35:54Z","timestamp":1631572554000},"page":"1-11","source":"Crossref","is-referenced-by-count":7,"title":["Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5375-0724","authenticated-orcid":true,"given":"Zhenyu","family":"Gao","sequence":"first","affiliation":[{"name":"Nari Group Corporation, State Grid Electric Power Research Institute, Nanjing 211106, China"},{"name":"China Realtime Database Co. Ltd., Nanjing 210012, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8903-2903","authenticated-orcid":true,"given":"Jian","family":"Cao","sequence":"additional","affiliation":[{"name":"Nari Group Corporation, State Grid Electric Power Research Institute, Nanjing 211106, China"},{"name":"China Realtime Database Co. Ltd., Nanjing 210012, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1074-9149","authenticated-orcid":true,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Nari Group Corporation, State Grid Electric Power Research Institute, Nanjing 211106, China"},{"name":"China Realtime Database Co. Ltd., Nanjing 210012, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6241-8563","authenticated-orcid":true,"given":"Huayun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nari Group Corporation, State Grid Electric Power Research Institute, Nanjing 211106, China"},{"name":"China Realtime Database Co. Ltd., Nanjing 210012, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9984-9869","authenticated-orcid":true,"given":"Zengrong","family":"Xu","sequence":"additional","affiliation":[{"name":"Nari Group Corporation, State Grid Electric Power Research Institute, Nanjing 211106, China"},{"name":"China Realtime Database Co. Ltd., Nanjing 210012, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8387636"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1186\/s42400-020-00052-8","article-title":"Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains","author":"P. Radanliev","year":"2020"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/EDIS.2017.8284020"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"5","first-page":"7","article-title":"2 the industrial internet of things (IIoT): challenges, requirements and benefits","volume-title":"Secure and Smart Internet of Things (IoT): Using Blockchain and AI","author":"A. Banafa","year":"2018"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2953364"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICVRIS.2019.00095"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920763"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CISPSSE49931.2020.9212227"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEM52022.2021.9480384"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1402-8"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2015.16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/EECSI.2017.8239179"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2822842"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100059"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/3357223.3362707"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3094024"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.3390\/s20226578"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS47363.2019.00053"},{"article-title":"Federated learning for internet of things: a federated learning framework for On-device anomaly data detection","year":"2021","author":"T. Zhang","key":"20"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/SEGE49949.2020.9181961"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51473-0_12"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/IIKI.2016.83"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICAEE.2015.7506822"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6562953"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2005.12.126"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2011.2168604"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296491"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00042"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2016.7495907"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2002.1183887"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/8501683"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2019.8763842"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS.2019.8900073"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4218973"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0178663"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-015-0678-6"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.3233\/ica-2010-0345"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2014.0012"},{"first-page":"8","volume-title":"Semi-Supervised Learning Using Gaussian Fields and Harmonic Functions","author":"X. Zhu","key":"40"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2015.7266501"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2019.00052"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/CMCSN.2016.23"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2004.843247"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI49370.2019.00068"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2017.8093539"},{"first-page":"2744","article-title":"Consistent binary classification with generalized performance metrics","author":"O. O. Koyejo","key":"47"},{"key":"48","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.1900-102","volume-title":"Summary Report on NIST Smart Grid Testbeds and Collaborations Workshops","author":"A. Gopstein","year":"2021"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10080944"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMU49871.2020.9243607"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/DSA.2019.00067"},{"article-title":"Do we really need to access the source data? source hypothesis transfer for unsupervised domain adaptation","year":"2021","author":"J. Liang","key":"52"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05154-6"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00051"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054087"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/4587862.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/4587862.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/4587862.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T03:31:09Z","timestamp":1673235069000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/4587862\/"}},"subtitle":[],"editor":[{"given":"Konstantinos","family":"Demertzis","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,9,13]]},"references-count":55,"alternative-id":["4587862","4587862"],"URL":"https:\/\/doi.org\/10.1155\/2021\/4587862","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,9,13]]}}}