Introduction
In recent years, the Internet of Things (IoT) has shown great potential in many aspects of life. Among the IoT extensions, the Industrial Internet of Things (IIoT) can be widely used in manufacturing, intelligent transportation, energy, and smart city [1]. However, the IIoT has some shortcomings in the actual application process. First, due to the development of 5G, the number of smart devices will increase rapidly. It is estimated that there will be 20 billion IIoT devices at the end of 2020. These devices will generate large amounts of data at an extremely fast rate [1], so the scalability of IIoT needs to be improved. Second, in terms of security, the IIoT relies on a central server, which increases the risk of being attacked or paralysis. If the data is hijacked during transmission, it will also threaten the security of the entire IIoT system.