scholarly journals Security challenges of the Industry 4.0

2020 ◽  
Vol 1515 ◽  
pp. 032074
Author(s):  
Adam U Mentsiev ◽  
Elina R Guzueva ◽  
Tamirlan R Magomaev
2017 ◽  
Vol 13 ◽  
pp. 1253-1260 ◽  
Author(s):  
T. Pereira ◽  
L. Barreto ◽  
A. Amaral

2017 ◽  
Vol 117 (10) ◽  
pp. 2305-2324 ◽  
Author(s):  
Davy Preuveneers ◽  
Wouter Joosen ◽  
Elisabeth Ilie-Zudor

Purpose Industry 4.0 envisions a future of networked production where interconnected machines and business processes running in the cloud will communicate with one another to optimize production and enable more efficient and sustainable individualized/mass manufacturing. However, the openness and process transparency of networked production in hyperconnected manufacturing enterprises pose severe cyber-security threats and information security challenges that need to be dealt with. The paper aims to discuss these issues. Design/methodology/approach This paper presents a distributed trust model and middleware for collaborative and decentralized access control to guarantee data transparency, integrity, authenticity and authorization of dataflow-oriented Industry 4.0 processes. Findings The results of a performance study indicate that private blockchains are capable of securing IoT-enabled dataflow-oriented networked production processes across the trust boundaries of the Industry 4.0 manufacturing enterprise. Originality/value This paper contributes a decentralized identity and relationship management for users, sensors, actuators, gateways and cloud services to support processes that cross the trust boundaries of the manufacturing enterprise, while offering protection against malicious adversaries gaining unauthorized access to systems, services and information.


Author(s):  
Isaac Moses Kisembo ◽  
Gilbert Gilibrays Ocen ◽  
Ocident Bongomin ◽  
Andrew Egwar Alunyu ◽  
Ildephonse Nibikora ◽  
...  

The world is attesting a tremendous change today which is remarkably coined as industry 4.0. Several terminologies have developed as a result of the emergency of industry 4.0, notably is cybersecurity which entails the security of communication and network operations activities either on or offline and the measures taken to achieve such security. The most common form of communication by organizations and Business today is the electronic mails (Email), although email is a valuable tool, it also creates security challenges when not properly managed. There is a growing adoption of email as official form of communication in many organizations with majority of users on mobile android devices due to the popularity of the android operating systems and the proliferation of mobile devices. Banks, health care, educational institutions and many other service providers are communicating to their clients through email where sensitive and confidential information are shared. One major threat to email communication is lack of confidentiality for emails accessed via android mobile devices due to weaknesses of android operating system (OS) platform that presents possibilities to penetrate by hackers and android email client since it accepts a onetime login and password authentication which is only required again if the email account is deleted from the android mobile device. In this study, an algorithm was designed and implemented on an android application that allows an email sender to compose an email and set the time the email will stay in the receiver inbox before it automatically wipes off. Primary data was collected from email users using tightly structured questionnaires and respondents comprised of those with email technical background and those that are typical email users inorder to get their opinion on the lack of confidentiality on the android mobile email client, while secondary data from scholarly journals and articles informed the study design. The designed algorithm was tested and evaluated through expert opinion. The result of the study indicates that the designed algorithm addresses the confidentiality issues and threats on android email clients.


Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 2001
Author(s):  
Vasiliki Liagkou ◽  
Chrysostomos Stylios ◽  
Lamprini Pappa ◽  
Alexander Petunin

Industry 4.0 has risen as an integrated digital manufacturing environment, and it has created a novel research perspective that has thrust research to interdisciplinarity and exploitation of ICT advances. This work presents and discusses the main aspects of Industry 4.0 and how intelligence can be embedded in manufacturing to create the smart factory. It briefly describes the main components of Industry 4.0, and it focuses on the security challenges that the fully interconnected ecosystem of Industry 4.0 has to meet and the threats for each component. Preserving security has a crucial role in Industry 4.0, and it is vital for its existence, so the main research directions on how to ensure the confidentiality and integrity of the information shared among the Industry 4.0 components are presented. Another view is in light of the security issues that come as a result of enabling new technologies.


Author(s):  
Gordana Gardašević ◽  
Lazar Berbakov ◽  
Aleksandar Mastilović

The Internet of Things (IoT) is an emerging and even revolutionary technology with an immense impact on our everyday life. The Industrial Internet of Things (IIoT) is a fast-growing technology that increases productivity and efficiency by combining the IoT platform with an existing industrial environment. IIoT networks are one of the main pillars for the success of the future Industry 4.0 and Cyber-Physical System (CPS) paradigm. The IIoT ecosystem represents a network of connected industrial devices that exchange and analyze collected data to enable new insights into industrial processes. Recently, intensive research activities have focused on cybersecurity issues for the IIoT. This chapter addresses the critical components of the IIoT security framework by analyzing the relevant aspects and providing an overview of state-of-the-art activities in this field. This chapter also discusses the IIoT architectural structure, applications, and underlying networking technologies, with a particular focus on security challenges and standardization activities.


Sign in / Sign up

Export Citation Format

Share Document