scholarly journals Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures

Information ◽  
2021 ◽  
Vol 12 (11) ◽  
pp. 460
Author(s):  
Noritaka Matsumoto ◽  
Junya Fujita ◽  
Hiromichi Endoh ◽  
Tsutomu Yamada ◽  
Kenji Sawada ◽  
...  

Cyber-security countermeasures are important for IIoT (industrial Internet of things) systems in which IT (information technology) and OT (operational technology) are integrated. The appropriate asset management is the key to creating strong security systems to protect from various cyber threats. However, the timely and coherent asset management methods used for conventional IT systems are difficult to be implemented for IIoT systems. This is because these systems are composed of various network protocols, various devices, and open technologies. Besides, it is necessary to guarantee reliable and real-time control and save CPU and memory usage for legacy OT devices. In this study, therefore, (1) we model various asset configurations for IIoT systems and design a data structure based on SCAP (Security Content Automation Protocol). (2) We design the functions to automatically acquire the detailed information from edge devices by “asset configuration management agent”, which ensures a low processing load. (3) We implement the proposed asset management system to real edge devices and evaluate the functions. Our contribution is to automate the asset management method that is valid for the cyber security countermeasures in the IIoT systems.

Author(s):  
Bashar Alohali ◽  
Kashif Kifayat ◽  
Qi Shi ◽  
William Hurst

Over the last decade, Internet of Things (IoTs) have brought radical changes to the means and forms of communication for monitoring and control of a large number of applications including Smart Grid (SG). Traditional energy networks have been modernized to SGs to boost the energy industry in the context of efficient and effective power management, performance, real-time control and information flow using two-way communication between utility provides and end-users. However, integrating two-way communication in SG comes at the cost of cyber security vulnerabilities and challenges. In the context of SG, node compromise is a severe security threat due to the fact that a compromised node can significantly impact the operations and security of the SG network. Therefore, in this chapter, Key Management Scheme for Communication Layer in the Smart Grid (KMS-CL-SG) has proposed. In order to achieve a secure end-to-end communication we assign a unique key to each node in the group.


Author(s):  
Bashar Alohali ◽  
Kashif Kifayat ◽  
Qi Shi ◽  
William Hurst

Over the last decade, Internet of Things (IoTs) have brought radical changes to the means and forms of communication for monitoring and control of a large number of applications including Smart Grid (SG). Traditional energy networks have been modernized to SGs to boost the energy industry in the context of efficient and effective power management, performance, real-time control and information flow using two-way communication between utility provides and end-users. However, integrating two-way communication in SG comes at the cost of cyber security vulnerabilities and challenges. In the context of SG, node compromise is a severe security threat due to the fact that a compromised node can significantly impact the operations and security of the SG network. Therefore, in this chapter, Key Management Scheme for Communication Layer in the Smart Grid (KMS-CL-SG) has proposed. In order to achieve a secure end-to-end communication we assign a unique key to each node in the group.


2022 ◽  
pp. 488-505
Author(s):  
Valentina V. Timčenko

Introduction of the Dynamic Line Rating (DLR) concept has an important role in implementing smart grids in the power utility's transmission network. DLR assumes real-time control of the overhead transmission line, based on the continuous evaluation of the actual thermal and other operating conditions, and further estimation of the maximum transmission line's load and other relevant parameters that determine operational limitations. This chapter presents cloud-based DLR systems in terms of architecture, cloud services, and cyber security issues. DLR systems are explored with regards to cloud computing in industry, applicable cloud services and infrastructures, and communication system's performance. Security and privacy of cloud-based DLR systems have been addressed in terms of public and private services. A secure hybrid cloud-based architecture to support DLR is proposed.


2013 ◽  
Vol 723 ◽  
pp. 893-900
Author(s):  
Po Hsun Sung ◽  
Jyh Dong Lin ◽  
Shun Hsing Chen ◽  
Yung Lin Chen ◽  
Andrew Yang

Asset management is a method that transferred the assets into cost to management. The main object is that to calculate the value of assets and assess the benefit of investment. When utilized the asset management method on freeway pavement management, it must been founded on assets inventory and historic maintenance. To calculate all the cost of assets could list the value of all the assets. The most important work of asset management was assessing the assets. All the assets were analyzed the survival life of all the assets and find out period of the depreciation in the study. It is 8.9 years that the period between newly construction and first maintenance. It is 4.5 years that the period between maintenances. The assess model was set by the two periods. The results cross by the assess model was that the assets service level was great.


Author(s):  
Valentina V. Timčenko

Introduction of the Dynamic Line Rating (DLR) concept has an important role in implementing smart grids in the power utility's transmission network. DLR assumes real-time control of the overhead transmission line, based on the continuous evaluation of the actual thermal and other operating conditions, and further estimation of the maximum transmission line's load and other relevant parameters that determine operational limitations. This chapter presents cloud-based DLR systems in terms of architecture, cloud services, and cyber security issues. DLR systems are explored with regards to cloud computing in industry, applicable cloud services and infrastructures, and communication system's performance. Security and privacy of cloud-based DLR systems have been addressed in terms of public and private services. A secure hybrid cloud-based architecture to support DLR is proposed.


Author(s):  
Carlos Biscaia de Oliveira

<p>In 2016, Brisa decided to challenge the way decisions over physical assets planning and maintenance operations were being made. The main goal was to develop a new model for Brisa’s Asset Management System, aligned with IAM culture, PAS 55 mindset and ISO 55 000:2014 framework, enabling to maximize the asset’s performance, without losing sight of risk reduction and cost optimization.</p><p>An assessment of Brisa’s current maturity status, regarding its asset management culture and practices, was made, identifying hints to draw the main long-term goals. Drivers to the transformation plan were identified and the roadmap of implementation outlined, approaching both strategical and operational perspectives.</p><p>This document focus on the transformational journey endeavored from AM Processes re-design to IT systems architecture strategy, identifying gaps and exploring opportunities to improve Brisa’s Asset Management processes and related support systems.</p>


1995 ◽  
Vol 34 (05) ◽  
pp. 475-488
Author(s):  
B. Seroussi ◽  
J. F. Boisvieux ◽  
V. Morice

Abstract:The monitoring and treatment of patients in a care unit is a complex task in which even the most experienced clinicians can make errors. A hemato-oncology department in which patients undergo chemotherapy asked for a computerized system able to provide intelligent and continuous support in this task. One issue in building such a system is the definition of a control architecture able to manage, in real time, a treatment plan containing prescriptions and protocols in which temporal constraints are expressed in various ways, that is, which supervises the treatment, including controlling the timely execution of prescriptions and suggesting modifications to the plan according to the patient’s evolving condition. The system to solve these issues, called SEPIA, has to manage the dynamic, processes involved in patient care. Its role is to generate, in real time, commands for the patient’s care (execution of tests, administration of drugs) from a plan, and to monitor the patient’s state so that it may propose actions updating the plan. The necessity of an explicit time representation is shown. We propose using a linear time structure towards the past, with precise and absolute dates, open towards the future, and with imprecise and relative dates. Temporal relative scales are introduced to facilitate knowledge representation and access.


2020 ◽  
Vol 78 (12) ◽  
pp. 1276-1285
Author(s):  
Shibu John A

Enterprise asset management (EAM) systems are used by asset owners and/or operators to manage the maintenance of their physical assets. These assets, including equipment, facilities, vehicles, and infrastructure, need maintenance to sustain their operations. An EAM system provides the means to have less unplanned downtime and extended asset longevity, which offers clear business benefits that improve the profit and loss statement and balance sheet. Particularly for capital-intensive industries, like drilling and exploration, the failure of on-time delivery of critical equipment or processes is disruptive and costs nonproductive time and customer satisfaction. Organizations understand these issues and employ an appropriate asset management system to engineer their asset maintenance and management. An EAM system is needed to manage the people, assets/equipment, and processes. EAMs are used to plan, optimize, execute, and track the needed maintenance activities with associated priorities, skills, materials, tools, and information. Similarly, nondestructive testing (NDT) is used as a tool for integrity assessment of assets in drilling and exploration. The main advantage of using NDT is that the item’s intended use or serviceability is not affected. The selection of a specific technique should be based on knowledge and skills that include design, material processing, and material evaluation. Validating the purpose of this paper, we emphasize the importance of optimizing the asset utilization and serviceability to enhance overall efficiency by integrating EAM software that manages assets, the operation management system (OMS) controlling the processes, and asset inspection management systems (AIMSs).


Sign in / Sign up

Export Citation Format

Share Document