Safety and Security beyond Industry 4.0

2022 ◽  
Vol 12 (1) ◽  
pp. 0-0

As open standards like OPC UA were introduced to facilitate the interoperability of devices, safety and security standards were only gradually incorporated into Industry 4.0 designs. Hence, safety and security issues have eventually emerged with the growing complexity of such systems, and they need to expand outside of their premises to be integrated into larger set-ups. Typical examples thereof are power grids, whose dependability was guarded for long times by strict rules and restrictive communication protocols. Once they were exposed on the Internet, however, their vulnerability has increased to a point where their safety could be compromised. Hence, there is an urgent need to implement effective safety and security mechanisms into OPC UA to provide systems with appropriate levels of functional safety as well as data security. With increasing levels of integration, e.g. with Industry 5.0, these standards need to evolve to provide for sustainability in a globally interconnected world.

2019 ◽  
Vol 8 (2) ◽  
pp. 40-43
Author(s):  
Sheik Saidhbi

Internet working security has become one of the biggest uprising points of concern now days. People are getting attached more and more to the internet in order to fulfill their demands. Not only customers but also the IT based companies are also getting themselves relying on up growing technology called as cloud computing. Cloud is a branch of computer science that provides the services on lease. In this paper we will make a comparative analysis of various technical security issues towards cloud computing, cloud deployment based security and model based security issues. A comparative analysis has been made at the end of the paper.


Cloud computing (CC) is the expertise over which every person is capable of sharing the reserves, amenities, and evidence amongst the individuals as a result of harnessing the internet in link. Subsequently, protection is a key concern on the facts pooled by means of the internet. In CC a numerous security issues prone to occur that includes confidentiality, integrity, authentication and/or thin well-honed edit control (TWHEC). In this research an innovative security replica has been aforethought. The design stipulates an approach across which secure communication besides data hiding from unauthorized punters can be got hold of. The security resolved with all categories of CC aspects similar to Platform as a Service (aaS), and Process aaS (PaaS), Software aaS, Storage aaS and Security aaS (SaaS), Network aaS (NaaS), Functions aaS (FaaS), Infrastructure aaS, Information aaS, and Integration aaS (IaaS), Database aaS (DBaaS), Application as a Service aaS and API aaS (AaaS), Management aaS (MaaS), Testing aaS (TaaS), etc., This anticipated system yield thin well-honed, mutable and ascendable statistics editing control by means of the manipulation of complex traits of Hierarchical (Ranked/Ordered) attribute-set-based encryption (HASBE). This multifarious qualities of blend of HASBE and Rivest–Shamir–Adleman (RSA) algorithm too. For instance, cyber individual healthiness record (IHR) aids sick persons to deal with his/her personal medicinal archives into a unified means that is to a great extent vital in storing, editing and partaking of the individual healthiness data. Further down encryption, it is impeding in accomplishing the TWHEC to CIHR data in an ascendable and effectual technique by using HASBE. Prevailing RSA encryption does not endow the data with high security in health. To fulfill ascendable, elastic, and thin well-honed edit control of subcontracted statistics in cloud. In this archetypal instigated a mish-mash RSA encryption with HASBE. Cyber IHR dispenses with patients to get along medical archives in a secure way, in which very significant concerns are the storing, access and distribution of individual wellness information. This composite process is responsible for three mode precautions, i.e. data precautions, certification and corroboration. In this report, the HASBE encryption algorithm has been put forward in realizing TWHEC to IHR data in an ascendable and effectual way


Author(s):  
William C. Schmidt

This article introduces some of the rudimentary underlying concepts of how the Internet works and points out a number of caveats that can influence the quality of collected data. Topics covered include Internet basics, technical problems, programming for the lowest common technology, client configuration issues, server side and data security issues, and the limits of precision. It is hoped that after becoming familiar with the information herein, researchers will be capable of determining whether the research application they are interested in pursuing is fit for the Internet medium, or whether technical issues will pose problems which threaten the validity of the work.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

The rise of the Internet of Things (IoT) has driven mobile applications development. As a result, in the consumer IoT (CIoT) space, any product usually comes with a smartphone application to either control, programme, or just view what is happening with the product. The IoT brings with it opportunities and challenges to consumers. For example, IoT technology makes it possible to connect all of a person’s devices to create a smart eco-system or assemblage. However, the biggest threat in CIoT is personal data security. This study utilized a qualitative narrative inquiry and Delphi technique to explore data security issues that come with CIoT assemblages and associated mobile applications in South Africa. The study established that consumers enjoy the convenience and benefits that IoT technology brings. It is concluded that for CIoT to thrive, safety is crucial, and all the stakeholders in the IoT assemblage need to ensure the protection of consumers.


Standards ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 1-13
Author(s):  
Yoshiaki Fukami

The concept of the Internet of Things (IoT), which is an architecture in which devices supplied by various firms and services operated by distributed organizations exchange data, has been adopted in an increasing number of situations. While there are cases in which a small number of limited organizations collaborate on certain ecosystems based on proprietary specifications, the development of open standards is increasingly important for building scalable ecosystems because of the introduction of the concepts of Industry 4.0 and Society 5.0. Under these circumstances, there are two types of barriers to standardization. One barrier is the lack of shared frames for architectural design. The other barrier is the lack of awareness of the need for scalability. In this paper, we analyze the factors underlying these two barriers and discuss the path towards breakthroughs.


2020 ◽  
Vol 16 (6) ◽  
pp. 998-1012
Author(s):  
G.V. Fedotova ◽  
D.D. Tkachenko

Subject. The article discusses the modeling of preventive protection of IT systems and evaluates their cyber resilience. Objectives. The study evaluates the existing threats and determines how informatization processes may unfold in the credit segment. Methods. Research is based on methods of regulatory and legislative analysis. We evaluate today’s public administration of cybersecurity in the financial and credit sector. To give a view of the existing situation and sum up the sector’s performance for the recent years, we performed the content analysis of statistics on data hacking and leakages. Results. The article highlights new trends in the financial and credit sector and the growing complexity of data security systems. As proposed by the Bank of Russia, the integration of smart technologies is showed to reinforce the cybersecurity of banking systems. Conclusions and Relevance. The informatization of all banking operation systems, growing complexity of procedures and work logs require new robust resources to be integrated into financial technologies. Stronger cybersecurity should lay a trend in the financial and credit sector in the nearest future. The findings can be used to flag strategic milestones of the banking development in the information-driven society.


2016 ◽  
Vol 7 (2) ◽  
pp. 111-124
Author(s):  
Alexander Pschera

"Neben der Industrie hat die Digitalisierung auch die Natur ergriffen. Die Tatsache, dass Tausende von Tieren mit GPS-Sendern aus- gerüstet und überwacht werden, erlaubt, analog zur Industrie 4.0 auch von einer Natur 4.0 zu sprechen. Dieses Internet der Tiere verändert den Begriff, den der Mensch von der Natur hat. Er transformiert die Wahrnehmung vor allem der Natur als etwas fundamental An- deren. Neben den vielen kulturellen Problematisierungen, die das Internet der Tiere mit sich bringt, lassen sich aber auch die Umrisse einer neuen, ganz und gar nicht esoterischen planetarisch-post-digitalen Kultur aufzeigen, die die conditio humana verändert. In addition to industry, digitalization has also taken hold of nature. The fact that thousands of animals are provided and monitored with GPS transmitters allows to speak of nature 4.0 by way of analogy to industry 4.0. This internet of animals changes our idea of nature. Most of all, it transforms the perception of nature as something fundamentally other. Beside the many cultural problems that the internet of animals implies, it can also outline a new, not at all esoteric planetary post-digital culture that is about to change the human condition. "


Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 487 ◽  
Author(s):  
Mahmoud Elsisi ◽  
Karar Mahmoud ◽  
Matti Lehtonen ◽  
Mohamed M. F. Darwish

The modern control infrastructure that manages and monitors the communication between the smart machines represents the most effective way to increase the efficiency of the industrial environment, such as smart grids. The cyber-physical systems utilize the embedded software and internet to connect and control the smart machines that are addressed by the internet of things (IoT). These cyber-physical systems are the basis of the fourth industrial revolution which is indexed by industry 4.0. In particular, industry 4.0 relies heavily on the IoT and smart sensors such as smart energy meters. The reliability and security represent the main challenges that face the industry 4.0 implementation. This paper introduces a new infrastructure based on machine learning to analyze and monitor the output data of the smart meters to investigate if this data is real data or fake. The fake data are due to the hacking and the inefficient meters. The industrial environment affects the efficiency of the meters by temperature, humidity, and noise signals. Furthermore, the proposed infrastructure validates the amount of data loss via communication channels and the internet connection. The decision tree is utilized as an effective machine learning algorithm to carry out both regression and classification for the meters’ data. The data monitoring is carried based on the industrial digital twins’ platform. The proposed infrastructure results provide a reliable and effective industrial decision that enhances the investments in industry 4.0.


Sign in / Sign up

Export Citation Format

Share Document