Secure Real-time Communication and Computing Infrastructure for Industry 4.0 — Challenges and Opportunities (original) (raw)

SECURITY CONCERNS IN IOT BASED SMART MANUFACTURING FOR INDUSTRY 4.0

To realize the need and significance of security perspectives in manufacturing automation lets discusses Internet of Things (IoT) in smart manufacturing where the initial step is to recognize the sensors prerequisite into the machine parts from where real time analytics will get the data, for example, continuous temperature change from thermostat sensors or to quantify the speed of any moving item in a machine, connected sensors will be utilized , which will create the data for speed measurements, similarly assortment of sensors are accessible which can be utilized according to the necessities , second steps is to catch these data for the investigation use for that we require IoT gateway, then the third step is get the continuous data through a few popular software tools like Flume or Kafka then the fourth step is do the real time investigation to give real time visualization remotely which will be usually done on cloud thus, getting the software as a service on cloud is a great challenge for IT security suppliers , we really require a high security angles to spare our private data from the programmers separated from that in this paper necessities of security , security configuration in smart manufacturing and end to end protection of data has been talked about.

Secure Communication and Data Processing Challenges in the Industrial Internet

Baltic Journal of Modern Computing, 2016

The next industrial revolution is foreseen to happen with upcoming Industrial Internet that combines massive data collected by industrial sensors with data analysis for improving the efficiency of operations. Collecting, pre-processing, storing and analyzing such real-time data is a complex task with stringent demands on communication intelligence, QoS and security. In this paper we outline some challenges facing the Industrial Internet, namely integration with 5G wireless networks, Software Defined Machines, ownership and smart processing of digital sensor data. We propose a secure communication architecture for the Industrial Internet based on Smart Spaces and Virtual Private LAN Services. It is a position paper, describing state-of-the-art and a roadmap for future research on the Industrial Internet. Madhusanka Liyanage is a project manager at the Centre for Wireless Communications, University of Oulu, Finland. His research interests are SDN, 5G, NFV, mobile networks, VPNs and network security. He received the B.Sc. (2009) degree in electronics and telecommunication engineering from the University of Moratuwa, Sri Lanka, the M.Eng. (2011) degree from the Technology) of PetrSU and as Leading Research Scientist. Dmitry Korzun serves on technical program committees and editorial boards of a number of international conferences and journals. His research interests include analysis and evaluation of distributed systems, discrete modeling, ubiquitous computing and smart spaces, Internet of Things, software engineering, algorithm design and complexity, linear Diophantine analysis and its applications, theory of formal languages and parsing. More than 150 research and educational works have been published since 1997.

Study of the Security Challenges for Industry 4.0

2021

This thesis was written as a part of the M.Sc. in ICT Systems at the International Hellenic University. The current thesis throughout the study of related published literature discusses the key factors and characteristics of Industry 4.0 focusing on the challenges related to security aspects. The thesis initially provides an overview of Internet of Things (IoT) and Industry 4.0 by particularly focusing on the applications and use cases of Industry 4.0. A detailed overview of security issues, attacks and measures in Industry 4.0 is given next, highlighting some of the security challenges that remain to be tackled. Finally, the thesis presents the conclusions of the study and discusses further work be considered for the future. Finally, my deepest and most sincere thanks go to Professor Periklis Chatzimisios that with his leadership and waterfall of knowledge helped steer the path I took on this journey called a dissertation. His mentorship and help will forever be values I cherish because they helped me achieve attributes I certainly will be using in my professional life as well.

Security Challenges in Data Collection and Processing in Industry 4.0 Implementation

Journal of Data Mining and Management

IoT is crucial to the implementation of Industry 4.0. Security is an important factor to consider while managing data. At the same time, the Internet of Things (IoT) is a rapidly evolving technological paradigm that promises to revolutionize the way people interact with the world around us. It involves the integration of various devices and sensors into everyday objects, enabling them to collect, exchange, and analyze data to enhance convenience and efficiency. The applications of IoT are vast and diverse, encompassing smartwatches, smartphones, industrial processes, and even educational settings. Central to the functioning of IoT is the seamless exchange of information among interconnected devices. However, this exchange often includes personal and sensitive data, making security a paramount concern. Protecting this data is essential to prevent potential security threats and breaches. This paper delves into the multifaceted world of IoT, exploring its applications across various do...

A Secure Fog Based Architecture for Industrial Internet of Things and Industry 4.0

IEEE Transactions on Industrial Informatics, 2020

The advent of Industrial IoT (IIoT) along with Cloud computing has brought a huge paradigm shift in manufacturing industries resulting in yet another industrial revolution, Industry 4.0. Huge amounts of delay-sensitive data of diverse nature are being generated which needs to be locally processed and secured due to its sensitivity. But, the low-end IoT devices are unable to handle huge computational overheads. Also, the semi-trusted nature of Cloud introduces several security concerns. To address these issues, this work proposes a secure Fog-based IIoT architecture by suitably plugging a number of security features into it and by offloading some of the tasks judiciously to fog nodes. These features secure the system alongside reducing the trust and burden on the cloud and resource-constrained devices respectively. We validate our proposed architecture through both theoretical overhead analysis and practical experimentation including simulation study and testbed implementation.

Integration of an IoT Communication Infrastructure in Distributed Production Systems in Industry 4.0

Springer eBooks, 2023

The term Internet of Things (IoT) denotes a communication network, where various Things are interconnected using novel scenario-specific Internet technologies and predefined customizable semantics. Industry 4.0 aims at enabling a globally networked production, with the use of IoT as a crucial concept. Since production systems tend to be technically and organizationally heterogeneous, distributed at different locations, and associated with large amounts of data, communication and information processing platforms that provide confidentiality, integrity, availability (CIA rules), access control, and privacy are needed. In this contribution, we introduce a concept for designing and operating heterogeneous and spatially distributed industrial systems with Digital Twins, connected via an IoT communication infrastructure, the Smart Systems Service Infrastructure (S3I). By demonstrating an industrial use case with our concept, it is proven that the S3I can be used as a cross-domain solution for the interconnection of devices in a distributed production scenario.

International Journal of INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING A General View of Industry 4.0 Revolution from Cybersecurity Perspective

A General View of Industry 4.0 Revolution from Cybersecurity Perspective, 2020

The broad network and high-level data sharing that comes with Industry 4.0 will rapidly increase the companies' cyber security demands due to its vulnerabilities and new emerging threats. Therefore, large corporations need a risk management system and security strategy tailored to its safety needs and is committed to improving operational security and protection so that their operations and earnings are not adversely affected. In order to protect products, data and intellectual property against unauthorized and unauthorized persons, companies must absolutely take cyber security measures and continuously improve existing security systems to comply with Industry 4.0 requirements. This paper aims to address which type of problems enterprises should handle against cyber-attacks and illustrate how governments take precaution and refer this issue at their policy documents in the era of industry 4.0. The digitalization of production has paved the way for an ever-increasing existence of concepts such as Big Data, Cloud Computing, 3-D Printing, Augmented Reality, and Internet of Things in production. With the emergence of these concepts, the need for cyber security is also becoming crucial. This paper underlines many issues from the literature survey and comprehensive risk analysis by comparing modern history of ICT (Information and Communication Technology) and future smart factories. Some problems are also addressed with different case studies for possible solutions.

Secure Interconnection of IT-OT Networks in Industry 4.0

Advanced Sciences and Technologies for Security Applications, 2019

Increasingly, the society is witnessing how today's industry is adapting the new technologies and communication protocols to offer more optimal and reliable services to end-users, with support for inter-domain communication belonging to diverse critical infrastructures. As a consequence of this technological revolution, interconnection mechanisms are required to offer transparency in the connections and protection in the different application domains, without this implying a significant degradation of the control requirements. Therefore, this book chapter presents a reference architecture for the new Industry 4.0 where the interconnection core is mainly concentrated in the Policy Decision Points (PDP), which can be deployed in high volume data processing and storage technologies such as cloud and fog servers. Each PDP authorizes actions in the field/plant according to a set of factors (entities, context and risks) computed through the existing access control measures, such as RBAC+ABAC+Risk-BAC (Role/Attribute/Risk-Based Access Control, respectively), to establish coordinated and constrained accesses in extreme situations. Part of these actions also includes proactive risk assessment measures to respond to anomalies or intrusive threats in time.