scholarly journals Development of Industrial Internet Security Technology in China

2021 ◽  
Vol 23 (2) ◽  
pp. 65
Author(s):  
Yue Dong ◽  
Zhiqin Wang ◽  
Huirong Tian ◽  
Shan Li ◽  
Guoying Qin ◽  
...  
Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 501 ◽  
Author(s):  
Evangelina Lara ◽  
Leocundo Aguilar ◽  
Mauricio A. Sanchez ◽  
Jesús A. García

The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other’s identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows–Abadi–Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes.


2020 ◽  
Vol 16 (6) ◽  
pp. 4219-4220
Author(s):  
Q. Yang ◽  
R. Malekian ◽  
C. Wang ◽  
D. Rawat

2014 ◽  
Vol 602-605 ◽  
pp. 3351-3354
Author(s):  
Li Hui Wang

This paper analyses the security risks of the internal and external enterprise computer network, points out that the internal internet security of enterprise should focus on prevention which includes a variety of network security technology and the establishment of logging and review system. This paper also discusses the main technology of external internet security prevention such as firewall technology and encryption technology and so on and provides some suggestions about risk management and network security for some small and medium enterprises.


Author(s):  
Ghaith Alomari, Anas Aljarah

The businesses generate an “intranet” to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security and  to preserve that integrity we tends to develop as to provides the better encryption processes for security. In this work  we will make a  encryption harder with enhanced public key encryption protocol for the  security and we will talk about the applications for proposed work. We will enhance the hardness in security by humanizing the Diffie-Hellman encryption algorithm by making changes or adding some more security codes in up to date algorithm. Network security has become more important to not public computer users, organizations,  and the military.With the start of the internet, security became a major disquiet and the history of security allows a better understanding of the emergence of security technology. The  internet structure itself allowed for many security threats  to  occur.When the architecture of the internet is modified it can decrease the possible attacks that can be sent across the network. Knowing the attack methods, allows  for  the suitable security to  appear. By means of the firewalls and encryption   mechanisms  many businesses protected themselves from the internet.The firms crank out an “internet" to hold around connected into this world wide web but procured from potential dangers. Data ethics is a significant dilemma in protection and also to conserve integrity we all are inclined to grow concerning furnishes exactly the encryption procedures such as the security. Inside this job we'll earn a encryption tougher using improved general security protocol to your own stability and we're going to discuss the software for projected work. We'll improve the hardness of stability by humanizing that the Diffie Hellman encryption algorithm by generating alterations or including a few far more stability codes up to date algorithm. Network safety has gotten more very important to perhaps not people users, associations, and also the army. With all the beginning of internet, stability turned into a significant vexation along with the foundation of safety makes it possible for a superior comprehension of the development of technology. Even the online arrangement itself enabled for most security dangers that occurs. After the structure of this world wide web is altered it could diminish the probable strikes which may be transmitted from the other side of the community. Recognizing the assault procedures, permits the acceptable stability to arise. With this firewalls and security mechanics many companies shielded themselves out of the world wide web.


Author(s):  
Ana-Maria CERNOV

Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.


Author(s):  
Haibo Huang ◽  
Yuxi Gao ◽  
Min Yan ◽  
Xiaofan Zhang

AbstractBuilding a national unified ISEMS (industrial internet security emergency management system) plays an important role in industrial cybersecurity defense. However, due to technical and management constraints, the current ISEMS has problems such as scattered security organizations, poor sharing channels, and fails to form an overall security guarantee capability for threat reporting, analyzing, warning, and disposing. The blockchain technology has the characters of decentralized trust construction, inter-organizational data sharing, data integrity assurance, data traceability, which just meets the requirements of the emergency management process. This paper analyzes the situation and challenges of ISEMS, describes the system architecture and organizational structure based on the blockchain, and describes the key implementation processes of blockchain-based ISEMS, including threat report, risk analysis, warning release and emergency response.


Sign in / Sign up

Export Citation Format

Share Document