scholarly journals Editorial: Industrial Internet: Security, Architectures, and Technologies

2020 ◽  
Vol 16 (6) ◽  
pp. 4219-4220
Author(s):  
Q. Yang ◽  
R. Malekian ◽  
C. Wang ◽  
D. Rawat
Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 501 ◽  
Author(s):  
Evangelina Lara ◽  
Leocundo Aguilar ◽  
Mauricio A. Sanchez ◽  
Jesús A. García

The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other’s identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows–Abadi–Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes.


Author(s):  
Haibo Huang ◽  
Yuxi Gao ◽  
Min Yan ◽  
Xiaofan Zhang

AbstractBuilding a national unified ISEMS (industrial internet security emergency management system) plays an important role in industrial cybersecurity defense. However, due to technical and management constraints, the current ISEMS has problems such as scattered security organizations, poor sharing channels, and fails to form an overall security guarantee capability for threat reporting, analyzing, warning, and disposing. The blockchain technology has the characters of decentralized trust construction, inter-organizational data sharing, data integrity assurance, data traceability, which just meets the requirements of the emergency management process. This paper analyzes the situation and challenges of ISEMS, describes the system architecture and organizational structure based on the blockchain, and describes the key implementation processes of blockchain-based ISEMS, including threat report, risk analysis, warning release and emergency response.


2021 ◽  
Author(s):  
Yan Song ◽  
Wenjing Luo ◽  
Jian Li ◽  
Panfeng Xu ◽  
Jianwei Wei

2021 ◽  
Vol 23 (2) ◽  
pp. 46
Author(s):  
Qiuhua Wang ◽  
Guohua Wu ◽  
Dongxiao Wei ◽  
Gongxun Miao ◽  
Yanfei Xu ◽  
...  

2021 ◽  
Vol 23 (2) ◽  
pp. 112
Author(s):  
Yangchun Li ◽  
Hailong Wang ◽  
Yuxiao Li ◽  
Lei Chen ◽  
Youping Li

2022 ◽  
Vol 19 (3) ◽  
pp. 2896-2912
Author(s):  
Jiang Zhao ◽  
◽  
Dan Wu ◽  
◽  

<abstract> <p>The industrial internet depends on the development of cloud computing, artificial intelligence, and big data analysis. Intelligent fusion is dependent on the architecture and security features of the industrial internet. Firstly, the paper studies the infrastructure mode that needs to be solved urgently in the industrial internet and provides a possible infrastructure mode and related security evaluation system. Secondly, it analyses the digital transformation process with the case of G.E.os industrial nternet development practice. It clarifies that G.E. is forming a new value closed-loop through digital and strategy mixed channels. Thirdly, industrial internet security research is described within multiple viewpoints based on industrial internet applications, the security service and security assurance defense systemos architecture, and the non-user entrance probability model. Finally, the paper illustrates the changes in knowledge workflow and social collaboration caused by the industrial internet under intelligent manufacture.</p> </abstract>


2021 ◽  
Vol 23 (2) ◽  
pp. 74
Author(s):  
Hao Zhou ◽  
Jun Li ◽  
Chonghua Wang ◽  
Libo Yin ◽  
Qian Zhao

Sign in / Sign up

Export Citation Format

Share Document