{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:42:57Z","timestamp":1772044977038,"version":"3.50.1"},"reference-count":31,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T00:00:00Z","timestamp":1746576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2024YFB4709000"],"award-info":[{"award-number":["2024YFB4709000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["62173101"],"award-info":[{"award-number":["62173101"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2024ZD018"],"award-info":[{"award-number":["2024ZD018"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Industrial Internet Innovation and Development Program Project \u201cDevelopment of Endogenous Security Industrial Switch Equipment\u201d","award":["2024YFB4709000"],"award-info":[{"award-number":["2024YFB4709000"]}]},{"name":"National Industrial Internet Innovation and Development Program Project \u201cDevelopment of Endogenous Security Industrial Switch Equipment\u201d","award":["62173101"],"award-info":[{"award-number":["62173101"]}]},{"name":"National Industrial Internet Innovation and Development Program Project \u201cDevelopment of Endogenous Security Industrial Switch Equipment\u201d","award":["2024ZD018"],"award-info":[{"award-number":["2024ZD018"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2024YFB4709000"],"award-info":[{"award-number":["2024YFB4709000"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62173101"],"award-info":[{"award-number":["62173101"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2024ZD018"],"award-info":[{"award-number":["2024ZD018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education","award":["2024YFB4709000"],"award-info":[{"award-number":["2024YFB4709000"]}]},{"name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education","award":["62173101"],"award-info":[{"award-number":["62173101"]}]},{"name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education","award":["2024ZD018"],"award-info":[{"award-number":["2024ZD018"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>This paper proposes a feature-driven topology reconfiguration framework to enhance the resilience of Industrial Internet of Things (IIoT) systems against heterogeneous attacks. By dynamically partitioning IIoT into subnetworks based on localized attack features and reconstructing each subnetwork with tailored topologies, our framework significantly improves connectivity and communication efficiency. Evaluations on a real-world dataset (Tech-Routers-RF) characterizing IIoT topologies with 2113 nodes show that under diverse attack scenarios, connectivity and communication efficiency improve by more than 70% and 50%, respectively. Leveraging information entropy to quantify the trade-off between structural diversity and connection predictability, our work bridges adaptive network design with real-world attack dynamics, offering a scalable solution for securing large-scale IIoT deployments.<\/jats:p>","DOI":"10.3390\/e27050503","type":"journal-article","created":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T08:20:53Z","timestamp":1746606053000},"page":"503","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Resilient Topology Reconfiguration for Industrial Internet of Things: A Feature-Driven Approach Against Heterogeneous Attacks"],"prefix":"10.3390","volume":"27","author":[{"given":"Tianyu","family":"Wang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Robotics, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China"},{"name":"Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang 110016, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4152-6370","authenticated-orcid":false,"given":"Dong","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Robotics, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China"},{"name":"Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang 110016, China"}]},{"given":"Bowen","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang 110016, China"}]},{"given":"Xianda","family":"Liu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang 110016, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6022-5381","authenticated-orcid":false,"given":"Wenli","family":"Shang","sequence":"additional","affiliation":[{"name":"School of Electronic and Communication Engineering, Guangzhou University, Guangzhou 510006, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,5,7]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"3567","DOI":"10.1109\/TII.2018.2841049","article-title":"Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities","volume":"14","author":"Choo","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Jeong, Y.S. (2022). Secure IIoT Information Reinforcement Model Based on IIoT Information Platform Using Blockchain. Sensors, 22.","DOI":"10.3390\/s22124645"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"101869","DOI":"10.1016\/j.adhoc.2019.101869","article-title":"Towards socially enabled internet of industrial things: Architecture, semantic model and relationship management","volume":"91","author":"Gulati","year":"2019","journal-title":"Hoc Netw."},{"key":"ref_4","first-page":"257","article-title":"Review of Machine Learning-based 5G for Industrial Internet of Things","volume":"52","author":"Chai","year":"2023","journal-title":"Inf. Control"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.aej.2023.07.062","article-title":"GENIND: An industrial network topology generator","volume":"79","author":"Alrumaih","year":"2023","journal-title":"Alex. Eng. J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"41137","DOI":"10.1109\/JIOT.2024.3457883","article-title":"The Carrier-Based Sensor Deployment Problem in Industrial Internet of Things With Mesh Topologies","volume":"11","author":"Cheng","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"5406","DOI":"10.1109\/TII.2023.3333012","article-title":"Robust Topology Generation of Internet of Things Based on PPO Algorithm Using Discrete Action Space","volume":"20","author":"An","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1016\/j.future.2017.07.008","article-title":"Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities","volume":"78","author":"Ge","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1124","DOI":"10.1109\/TNET.2019.2911272","article-title":"An Enhanced Reconfiguration for Deterministic Transmission in Time-Triggered Networks","volume":"27","author":"Li","year":"2019","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Sekiyama, K., Tkada, I., and Araki, H. (2006, January 18\u201321). Robustness Enhancement with Network Topology Reconfiguration Against Targeted and Random Attack. Proceedings of the 2006 SICE-ICASE International Joint Conference, Busan, Republic of Korea.","DOI":"10.1109\/SICE.2006.315201"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell Syst. Tech. J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"3838","DOI":"10.1073\/pnas.1009440108","article-title":"Mitigation of malicious attacks on networks","volume":"108","author":"Schneider","year":"2011","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1088\/1367-2630\/9\/6\/188","article-title":"A measure of centrality based on network efficiency","volume":"9","author":"Latora","year":"2007","journal-title":"New J. Phys."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"6191","DOI":"10.1109\/JIOT.2019.2963499","article-title":"Deep Actor-Critic Learning-Based Robustness Enhancement of Internet of Things","volume":"7","author":"Chen","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Dobnikar, A., Lotri\u010d, U., and \u0160ter, B. (2011, January 14\u201316). Optimizing the Robustness of Scale-Free Networks with Simulated Annealing. Proceedings of the Adaptive and Natural Computing Algorithms, Ljubljana, Slovenia.","DOI":"10.1007\/978-3-642-20267-4"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MNET.2004.1316760","article-title":"Movement control algorithms for realization of fault-tolerant ad hoc robot networks","volume":"18","author":"Basu","year":"2004","journal-title":"IEEE Netw."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Tan, G., Jarvis, S.A., and Kermarrec, A.M. (2008, January 17\u201320). Connectivity-Guaranteed and Obstacle-Adaptive Deployment Schemes for Mobile Sensor Networks. Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems, Beijing, China.","DOI":"10.1109\/ICDCS.2008.49"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4035","DOI":"10.1109\/JSAC.2016.2621618","article-title":"Toward Energy-Efficient and Robust Large-Scale WSNs: A Scale-Free Network Approach","volume":"34","author":"Peng","year":"2016","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_19","first-page":"6752048","article-title":"Small-World and Scale-Free Network Models for IoT Systems","volume":"2017","author":"Sohn","year":"2017","journal-title":"Mob. Inf. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1109\/JSYST.2017.2741483","article-title":"A Prediction Algorithm to Enhance Grid Resilience Toward Cyber Attacks in WAMCS Applications","volume":"13","author":"Musleh","year":"2019","journal-title":"IEEE Syst. J."},{"key":"ref_21","unstructured":"Fu, X., Li, W., and Fortino, G. (2013, January 13\u201316). Empowering the Invulnerability of Wireless Sensor Networks through Super Wires and Super Nodes. Proceedings of the 2013 13th IEEE\/ACM International Symposium on Cluster, Cloud, and Grid Computing, Delft, The Netherlands."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.adhoc.2014.07.003","article-title":"A fault-tolerant relay placement algorithm for ensuring k vertex-disjoint shortest paths in wireless sensor networks","volume":"23","author":"Sitanayah","year":"2014","journal-title":"Hoc Netw."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"101542","DOI":"10.1016\/j.swevo.2024.101542","article-title":"Finding robust and influential nodes on directed networks using a memetic algorithm","volume":"87","author":"Ou","year":"2024","journal-title":"Swarm Evol. Comput."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"110134","DOI":"10.1016\/j.asoc.2023.110134","article-title":"Finding robust influential seeds from networked systems against structural failures using a niching memetic algorithm","volume":"136","author":"Wang","year":"2023","journal-title":"Appl. Soft Comput."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Wang, T., Zeng, P., Zhao, J., Liu, X., and Zhang, B. (2022). Identification of Influential Nodes in Industrial Networks Based on Structure Analysis. Symmetry, 14.","DOI":"10.3390\/sym14020211"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Andria, J., di Tollo, G., and Kalda, J. (2022). Propagation of Bankruptcy Risk over Scale-Free Economic Networks. Entropy, 24.","DOI":"10.3390\/e24121713"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Roveri, N., Carcaterra, A., Molinari, L., and Pepe, G. (2020). Safe and Secure Control of Swarms of Vehicles by Small-World Theory. Energies, 13.","DOI":"10.3390\/en13051043"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"6596","DOI":"10.1016\/j.physa.2013.08.047","article-title":"Opinion evolution on a BA scaling network","volume":"392","author":"Zhu","year":"2013","journal-title":"Phys. A Stat. Mech. Its Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"198701","DOI":"10.1103\/PhysRevLett.87.198701","article-title":"Efficient Behavior of Small-World Networks","volume":"87","author":"Latora","year":"2001","journal-title":"Phys. Rev. Lett."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","article-title":"Fast unfolding of communities in large networks","volume":"2008","author":"Blondel","year":"2008","journal-title":"J. Stat. Mech. Theory Exp."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Rossi, R.A., and Ahmed, N.K. (2015, January 25\u201330). The Network Data Repository with Interactive Graph Analytics and Visualization. Proceedings of the AAAI Conference on Artificial Intelligence, Austin, TX, USA.","DOI":"10.1609\/aaai.v29i1.9277"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/27\/5\/503\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:28:41Z","timestamp":1760030921000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/27\/5\/503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,7]]},"references-count":31,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,5]]}},"alternative-id":["e27050503"],"URL":"https:\/\/doi.org\/10.3390\/e27050503","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,7]]}}}