scholarly journals Development Trend and Path of Industrial Internet Security Industry in China

2021 ◽  
Vol 23 (2) ◽  
pp. 46
Author(s):  
Qiuhua Wang ◽  
Guohua Wu ◽  
Dongxiao Wei ◽  
Gongxun Miao ◽  
Yanfei Xu ◽  
...  
2021 ◽  
Vol 23 (2) ◽  
pp. 112
Author(s):  
Yangchun Li ◽  
Hailong Wang ◽  
Yuxiao Li ◽  
Lei Chen ◽  
Youping Li

Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 501 ◽  
Author(s):  
Evangelina Lara ◽  
Leocundo Aguilar ◽  
Mauricio A. Sanchez ◽  
Jesús A. García

The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other’s identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows–Abadi–Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes.


2020 ◽  
Vol 179 ◽  
pp. 02042
Author(s):  
Hai-chao ZHANG ◽  
Li WANG

This article analyzes the characteristics of industrial product design in the 5G era, and describes the application of 5G technology in industrial product design. It is mainly reflected in changing product interaction methods, industrial Internet development, and application scenario changes. Finally, in the context of the 5G era the development trend of industrial product design is expected, and product design will achieve greater development in the direction of intelligence, IoT, and cloudification.


2020 ◽  
Vol 16 (6) ◽  
pp. 4219-4220
Author(s):  
Q. Yang ◽  
R. Malekian ◽  
C. Wang ◽  
D. Rawat

2018 ◽  
Vol 20 (4) ◽  
pp. 79 ◽  
Author(s):  
Xiaohui Yu ◽  
Hengsheng Zhang ◽  
Yan Peng ◽  
Dong Li

Author(s):  
Haibo Huang ◽  
Yuxi Gao ◽  
Min Yan ◽  
Xiaofan Zhang

AbstractBuilding a national unified ISEMS (industrial internet security emergency management system) plays an important role in industrial cybersecurity defense. However, due to technical and management constraints, the current ISEMS has problems such as scattered security organizations, poor sharing channels, and fails to form an overall security guarantee capability for threat reporting, analyzing, warning, and disposing. The blockchain technology has the characters of decentralized trust construction, inter-organizational data sharing, data integrity assurance, data traceability, which just meets the requirements of the emergency management process. This paper analyzes the situation and challenges of ISEMS, describes the system architecture and organizational structure based on the blockchain, and describes the key implementation processes of blockchain-based ISEMS, including threat report, risk analysis, warning release and emergency response.


2021 ◽  
Author(s):  
Yan Song ◽  
Wenjing Luo ◽  
Jian Li ◽  
Panfeng Xu ◽  
Jianwei Wei

Sign in / Sign up

Export Citation Format

Share Document