scholarly journals The risk assessment on the security of industrial internet infrastructure under intelligent convergence with the case of G.E.'s intellectual transformation

2022 ◽  
Vol 19 (3) ◽  
pp. 2896-2912
Author(s):  
Jiang Zhao ◽  
◽  
Dan Wu ◽  
◽  

<abstract> <p>The industrial internet depends on the development of cloud computing, artificial intelligence, and big data analysis. Intelligent fusion is dependent on the architecture and security features of the industrial internet. Firstly, the paper studies the infrastructure mode that needs to be solved urgently in the industrial internet and provides a possible infrastructure mode and related security evaluation system. Secondly, it analyses the digital transformation process with the case of G.E.os industrial nternet development practice. It clarifies that G.E. is forming a new value closed-loop through digital and strategy mixed channels. Thirdly, industrial internet security research is described within multiple viewpoints based on industrial internet applications, the security service and security assurance defense systemos architecture, and the non-user entrance probability model. Finally, the paper illustrates the changes in knowledge workflow and social collaboration caused by the industrial internet under intelligent manufacture.</p> </abstract>

2014 ◽  
Vol 989-994 ◽  
pp. 5300-5303
Author(s):  
Hai Lin Guo ◽  
Zhi Ning Wang ◽  
Li Xin Zhang ◽  
Liu Xiao

Chinese expressway construction security situation is grim at present. Based on the index system, determining the importance of every factor on each level by the experts scoring method and 1-9 scale law. A expressway construction security evaluation system is designed and developed using Analytic Hierarchy Process (AHP) and the modern computer-aided technology, and finally validated. The results show that this system accurately indicated the safety situation of expressway construction, and realize systematism, standardization and automatization of safety evaluation.


Sensors ◽  
2020 ◽  
Vol 20 (2) ◽  
pp. 501 ◽  
Author(s):  
Evangelina Lara ◽  
Leocundo Aguilar ◽  
Mauricio A. Sanchez ◽  
Jesús A. García

The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other’s identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows–Abadi–Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes.


2020 ◽  
Vol 16 (6) ◽  
pp. 4219-4220
Author(s):  
Q. Yang ◽  
R. Malekian ◽  
C. Wang ◽  
D. Rawat

2014 ◽  
Vol 686 ◽  
pp. 458-462
Author(s):  
Zi Yan Shi ◽  
Guo Lin Zhao ◽  
Qiao Lin Hu

The security evaluation for an information network system is an important management tool to insure its normal operation. We must realize the significance of the comprehensive network security risks. A network evaluation model and the algorithm are presented and adapt the hierarchical method to characterize the security risk situation. The evaluation method is used to evaluate the key nodes and the mathematics is used to analyze the whole network security situation. Compared with others, the method can automatically create a rule-based security evaluation model to evaluate the security threat from the individual security elements and the combination of security elements, and then evaluation the network situation. It is shown that this system provides a valuable model and algorithms to help to find the security rules, adjust the security measure, improve the security performance and design the appropriate security risk evaluation and management tools.


2014 ◽  
Vol 1073-1076 ◽  
pp. 1023-1026
Author(s):  
Jiao Wang ◽  
Xin Zhang

Fuzzy mathematical evaluation method, is mainly rely on experience to determine the membership function for data processing. The water supply network security evaluation system is established based on network historical statistical data. A reasonable evaluation of urban water supply network in shanxi has been carried in the application of AHP to determine the factor weight of fuzzy mathematics.


2012 ◽  
Vol 482-484 ◽  
pp. 2390-2395
Author(s):  
De Qiang Li

In the paper, we establish an evaluation system in the study of four aspects such as people, regulation, equipment and technology management, field management and engineering construction. We present an entropy weight multi-level fuzzy comprehensive evaluation model in power plant security on the basis of reliability identification. Firstly, it identifies the reliability of power plant security evaluation system. Secondly, it can meet the condition that the system is reliable. Then it obtains the indicator weight of all levels in the evaluation system by the entropy weight method. Finally, it carries out a comprehensive evaluation in power plant security by the multi-level fuzzy evaluation method.


Sign in / Sign up

Export Citation Format

Share Document