Author:
Jin Chunhua,Li Chenhao,Qin Wenyu,Chen Xiaobing,Chen Guanhua
Publisher
Springer Nature Singapore
Reference35 articles.
1. Xiong, H., Wu, Y., Jin, C., Kumari, S.: Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT. IEEE Internet Things J. 7(12), 11713–11724 (2020)
2. Wu, Y., Dai, H.N., Wang, H.: Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0. IEEE Internet Things J. 8(4), 2300–2317 (2020)
3. Jayaram, A.: Lean six sigma approach for global supply chain management using industry 4.0 and IIoT. In: 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), pp. 89–94. IEEE (2016)
4. Chen, B., Wan, J., Lan, Y., Imran, M., Li, D., Guizani, N.: Improving cognitive ability of edge intelligent IIoT through machine learning. IEEE Netw. 33(5), 61–67 (2019)
5. Ho, T.M., et al.: Next-generation wireless solutions for the smart factory, smart vehicles, the smart grid and smart cities. arXiv preprint arXiv:1907.10102 (2019)