{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T07:23:36Z","timestamp":1767165816278,"version":"build-2238731810"},"reference-count":56,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T00:00:00Z","timestamp":1628553600000},"content-version":"vor","delay-in-days":221,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The emerging Industrial Internet of Things (IIoT) provides industries with an opportunity to collect, aggregate, and analyze data from sensors, including motion control, machine\u2010to\u2010machine communication, predictive maintenance, smart energy grid, big data analysis, and other smart connected medical systems. The physical systems and the cyber systems are organically integrated, forming an interdependent IIoT. This system provides us with enormous advantages, but at the same time, it also introduces the main safety challenges in the design and operation phase. To exploit the security threats of IIoT systems, in this paper, we propose a novel security\u2010by\u2010design approach for interdependent IIoT environments across two different levels, namely, theory modeling and runtime simulation. Our method theoretically analyzes the cascading failure dynamics of the intentional attack network. Simultaneously, we verified the theoretical results through simulations and gave the risk factors that affect the system\u2019s security to mitigate potential security attack threats. Besides, we prove its applicability through comparative simulation experiments to study application environments that rely on IIoT, which shows that our method helps identify risk factors and mitigate IIoT attacks\u2019 mechanism.<\/jats:p>","DOI":"10.1155\/2021\/7181431","type":"journal-article","created":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T19:20:06Z","timestamp":1628623206000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["[Retracted] Cascading Failure Dynamics against Intentional Attack for Interdependent Industrial Internet of Things"],"prefix":"10.1155","volume":"2021","author":[{"given":"Hao","family":"Peng","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Kan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9375-2997","authenticated-orcid":false,"given":"Dandan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jianmin","family":"Han","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,8,10]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2698457"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2016.0115"},{"key":"e_1_2_10_3_2","doi-asserted-by":"crossref","unstructured":"ShroufF. OrdieresJ. andMiragliottaG. Smart factories in industry 4.0: a review of the concept and of energy management approached in production based on the Internet of things paradigm Proceedings of the IEEE International Conference on Industrial Engineering & Engineering Management December 2015 Selangor Malaysia https:\/\/doi.org\/10.1109\/IEEM.2014.7058728 2-s2.0-84988221092.","DOI":"10.1109\/IEEM.2014.7058728"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3007206"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.2971057"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2908780"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2911979"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2787988"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/jas.2015.7152667"},{"key":"e_1_2_10_10_2","doi-asserted-by":"crossref","unstructured":"RawatD. B. BajracharyaC. andYanG. Towards intelligent transportation cyber-physical systems: real-time computing and communications perspectives Proceedings of the SoutheastCon 2015 April 2015 Fort Lauderdale FL USA 1\u20136.","DOI":"10.1109\/SECON.2015.7132923"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75632-5_5"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2016.02.005"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1142\/s2424862217500142"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcs.2003.1188769"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/mie.2017.2649104"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2503399"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym7031176"},{"key":"e_1_2_10_18_2","doi-asserted-by":"crossref","unstructured":"AL-SalmanH. I.andSalihM. H. A review cyber of industry 4.0 (cyber-physical systems (CPS) the internet of things (IoT) and the internet of services (IoS)): components and security challenges 1424 Proceedings of the 2nd International Conference on Advance & Scientific Innovation July 2019 Medan Indonesia https:\/\/doi.org\/10.1088\/1742-6596\/1424\/1\/012029.","DOI":"10.1088\/1742-6596\/1424\/1\/012029"},{"key":"e_1_2_10_19_2","doi-asserted-by":"crossref","unstructured":"HerwanJ. KanoS. OlegR. SawadaH. andKasashimaN. Cyber-physical system architecture for machining production line Proceedings of the 2018 IEEE Industrial Cyber-Physical Systems (ICPS) May 2018 St. Petersburg Russia https:\/\/doi.org\/10.1109\/ICPHYS.2018.8387689 2-s2.0-85050096643.","DOI":"10.1109\/ICPHYS.2018.8387689"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2387381"},{"key":"e_1_2_10_21_2","doi-asserted-by":"crossref","unstructured":"PavlenkoE.andZegzhdaD. Sustainability of cyber-physical systems in the context of targeted destructive influences Proceedings of the 2018 IEEE Industrial Cyber-Physical Systems (ICPS) May 2018 St. Petersburg Russia 830\u2013834 https:\/\/doi.org\/10.1109\/ICPHYS.2018.8390814 2-s2.0-85050150365.","DOI":"10.1109\/ICPHYS.2018.8390814"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2771139"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2015.2497161"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.3011821"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.02.003"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.11.12.1088-1094"},{"key":"e_1_2_10_27_2","doi-asserted-by":"crossref","unstructured":"ImbaultF. SwiatekM. BeaufortR. D. andPlanaR. The green blockchain: managing decentralized energy production and consumption Proceedings of the IEEE International Conference on Environment & Electrical Engineering & IEEE Industrial & Commercial Power Systems Europe June 2017 Milan Italy https:\/\/doi.org\/10.1109\/eeeic.2017.7977613 2-s2.0-85026776776.","DOI":"10.1109\/EEEIC.2017.7977613"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2013.6423187"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/tac.2015.2492438"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.85.016112"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.83.065101"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2012.2229398"},{"key":"e_1_2_10_33_2","doi-asserted-by":"crossref","unstructured":"HuangZ. WangC. RujS. StojmenovicM. andNayakA. Modeling cascading failures in smart power grid using interdependent complex networks and percolation theory Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA) June 2013 Melbourne VIC Australia https:\/\/doi.org\/10.1109\/ICIEA.2013.6566517 2-s2.0-84881441794.","DOI":"10.1109\/ICIEA.2013.6566517"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1038\/nphys2180"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2012.62"},{"key":"e_1_2_10_36_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.188701"},{"key":"e_1_2_10_37_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.80.036105"},{"key":"e_1_2_10_38_2","doi-asserted-by":"publisher","DOI":"10.1038\/nature08932"},{"key":"e_1_2_10_39_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.105.048701"},{"key":"e_1_2_10_40_2","doi-asserted-by":"crossref","unstructured":"ChattopadhyayS.andDaiH. Estimation of robustness of interdependent networks against failure of nodes Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM) December 2016 Washington DC USA https:\/\/doi.org\/10.1109\/glocom.2016.7841822 2-s2.0-85015378038.","DOI":"10.1109\/GLOCOM.2016.7841822"},{"key":"e_1_2_10_41_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.89.032812"},{"key":"e_1_2_10_42_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.90.012803"},{"key":"e_1_2_10_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcns.2018.2843168"},{"key":"e_1_2_10_44_2","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/97\/16006"},{"key":"e_1_2_10_45_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.85.5468"},{"key":"e_1_2_10_46_2","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.85.4626"},{"key":"e_1_2_10_47_2","doi-asserted-by":"publisher","DOI":"10.1080\/00018737100101261"},{"key":"e_1_2_10_48_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.87.052812"},{"key":"e_1_2_10_49_2","doi-asserted-by":"publisher","DOI":"10.1063\/1.4905202"},{"key":"e_1_2_10_50_2","doi-asserted-by":"publisher","DOI":"10.1038\/nphys3374"},{"key":"e_1_2_10_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2014.09.006"},{"key":"e_1_2_10_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2576898"},{"key":"e_1_2_10_53_2","doi-asserted-by":"crossref","unstructured":"ParandehgheibiM. ModianoE. H. andHayD. Mitigating cascading failures in interdependent power grids and communication networks Proceedings of the IEEE International Conference on Smart Grid Communications November 2014 Venice Italy https:\/\/doi.org\/10.1109\/smartgridcomm.2014.7007653 2-s2.0-84922457795.","DOI":"10.1109\/SmartGridComm.2014.7007653"},{"key":"e_1_2_10_54_2","unstructured":"MartinsL. Girao-SilvaR. JorgeL. GomesA. MusumeciF. andRakJ. Interdependence between power grids and communication networks: a resilience perspective Proceedings of the DRCN 2017-Design of Reliable Communication Networks; 13th International Conference March 2017 Munich Germany."},{"key":"e_1_2_10_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2015.2506503"},{"key":"e_1_2_10_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2893132"}],"updated-by":[{"DOI":"10.1155\/2023\/9790451","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:00:00Z","timestamp":1703030400000},"record-id":"58571"},{"DOI":"10.1155\/2023\/9790451","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T00:00:00Z","timestamp":1703030400000}}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/7181431.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/7181431.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/7181431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T19:26:12Z","timestamp":1723231572000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/7181431"}},"subtitle":[],"editor":[{"given":"Chenquan","family":"Gan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/7181431"],"URL":"https:\/\/doi.org\/10.1155\/2021\/7181431","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-05-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7181431"}}