1,680 research outputs found

    Differential Privacy for Industrial Internet of Things: Opportunities, Applications and Challenges

    Get PDF
    The development of Internet of Things (IoT) brings new changes to various fields. Particularly, industrial Internet of Things (IIoT) is promoting a new round of industrial revolution. With more applications of IIoT, privacy protection issues are emerging. Specially, some common algorithms in IIoT technology such as deep models strongly rely on data collection, which leads to the risk of privacy disclosure. Recently, differential privacy has been used to protect user-terminal privacy in IIoT, so it is necessary to make in-depth research on this topic. In this paper, we conduct a comprehensive survey on the opportunities, applications and challenges of differential privacy in IIoT. We firstly review related papers on IIoT and privacy protection, respectively. Then we focus on the metrics of industrial data privacy, and analyze the contradiction between data utilization for deep models and individual privacy protection. Several valuable problems are summarized and new research ideas are put forward. In conclusion, this survey is dedicated to complete comprehensive summary and lay foundation for the follow-up researches on industrial differential privacy

    Honeypot-based Security Enhancements for Information Systems

    Get PDF
    The purpose of this thesis is to explore honeypot-based security enhancements for information systems. First, we provide a comprehensive survey of the research that has been carried out on honeypots and honeynets for Internet of Things (IoT), Industrial Internet of Things (IIoT), and Cyber-physical Systems (CPS). We provide a taxonomy and extensive analysis of the existing honeypots and honeynets, state key design factors for the state-of-the-art honeypot/honeynet research and outline open issues. Second, we propose S-Pot, a smart honeypot framework based on open-source resources. S-Pot uses enterprise and IoT honeypots to attract attackers, learns from attacks via ML classifiers, and dynamically configures the rules of SDN. Our performance evaluation of S-Pot in detecting attacks using various ML classifiers shows that it can detect attacks with 97% accuracy using J48 algorithm. Third, for securing host-based Docker containers from cryptojacking, using honeypots, we perform a forensic analysis to identify indicators for the detection of unauthorized cryptomining, present measures for securing them, and propose an approach for monitoring host-based Docker containers for cryptojacking detection. Our results reveal that host temperature, combined with container resource usage, Stratum protocol, keywords in DNS requests, and the use of the container’s ephemeral ports are notable indicators of possible unauthorized cryptomining

    Smart Factories, Dumb Policy? Managing Cybersecurity and Data Privacy Risks in the Industrial Internet of Things

    Get PDF
    Interest is booming in the so-called Internet of Things (IoT). The Industrial Internet of Things (IIoT) is one application of this trend and involves the use of smart technologies in a manufac- turing context. Even though these applications hold the promise to revolutionize manufacturing, there are a number of outstand- ing cybersecurity and data privacy issues impacting the realiza- tion of the myriad benefits promised by IIoT proponents. This ar- ticle analyzes some of these pressing issues, focusing on: (1) critical infrastructure protection and cybersecurity due diligence, (2) trends in transatlantic data privacy protections, and (3) the regulation of new technologies like artificial intelligence (AI) and blockchain. The aticle concludes with a list of recommendations for state and federal policymakers to consider in an effort to harden the IIoT along with the supply chains critical to the con- tinued development of smart factories

    Towards trustworthy end-to-end communication in industry 4.0

    Get PDF
    Industry 4.0 considers integration of IT and control systems with physical objects, software, sensors and connectivity in order to optimize manufacturing processes. It provides advanced functionalities in control and communication for an infrastructure that handles multiple tasks in various locations automatically. Automatic actions require information from trustworthy sources. Thus, this work is focused on how to ensure trustworthy communication from the edge devices to the backend infrastructure. We derive a meta-model based on RAMI 4.0, which is used to describe an end-to-end communication use case for an Industry 4.0 application scenario and to identify dependabilities in case of security challenges. Furthermore, we evaluate secure messaging protocols and the integration of Trusted Platform Module (TPM) as a root of trust for dataexchange. We define a set of representative measurable indicator points based on existing standards and use them for automated dependability detection within the whole system

    Digital Transformation in the Ornamental Stone Industry: Case Studies on Industry 4.0 and Digital Twins

    Get PDF
    Funding program "LISBOA-01-0247-FEDER-046083" for this R&D scholarship.The rapid evolution of Industry 4.0 technologies has ushered in a new era in manufacturing systems, with Digital Twins leading the way. These virtual replicas offer invaluable opportunities for simulating and optimizing new manufacturing processes, and their most transformative impact may lie in the creation of these digital models. This research unifies the main key concepts of four separate studies, all of which explore the application of Digital Twins in the ornamental stone industry. Industry 4.0 systems and their technologies have directly influenced the ornamental stone industry, addressing both the effects on mineral resources and energy consumption in daily operations. In addition, research and development initiatives seek to make this industry more efficient and sustainable, addressing crucial issues such as economic growth, environmental impact, and social welfare. The increasing digitization of manufacturing systems and their integration with digital models has played a key role in this process, enabling the replication of shop floor operations and the optimization of material use. The application of Digital Twins, which are virtual replicas of physical systems, has been explored in an ornamental stone manufacturing company. These digital models have demonstrated the ability to save time and resources during prototype design, as well as offering continuous diagnostics and optimization throughout production. It is important to note that the implementation of Digital Twins requires care due to technical challenges, but their adoption promises to significantly impact business value, despite the initial complexities. Managing stone cutting devices with Digital Twins presents real challenges in the ornamental stone industry, but it also paves the way for greater precision, efficiency, and cost savings. These digital models enable real-time monitoring, predictive maintenance, and virtual simulations. This study explores different approaches to connecting physical cutting machines to their respective Digital Twins, evaluating criteria such as communication speed, security, scalability, and cost. The results of this analysis provide valuable information for implementing Digital Twins in the stone cutting industry

    Technology-Enabled Medical IoT System for Drug Management

    Get PDF
    This study introduces an innovative framework for the storage and administration of pharmaceuticals, which effectively tackles the pressing requirements of maintaining optimal temperature and humidity conditions, monitoring medicine inventory, and processing real-time data in healthcare establishments. By utilizing a comprehensive network of Internet of Things (IoT) sensors strategically positioned within pharmaceutical storage facilities, our technology effectively guarantees the preservation and security of stored drugs. The study conducted in our research demonstrates that low temperature fluctuation effectively protects medicinal substances, hence reducing potential dangers to patients. The real-time inventory management system effectively optimizes medicine control by following expiry criteria and minimizing wasted spending. Furthermore, our study emphasizes the importance of cloud response latency, as the average data transfer time is a rapid 100 milliseconds. The expeditious integration of crucial data enables prompt notifications and alerts, hence augmenting the quality and safety of pharmaceutical products

    Unlocking value from machines: business models and the industrial internet of things

    Get PDF
    In this article we argue that the Industrial Internet of Things (IIoT) offers new opportunities and harbors threats that companies are not able to address with existing business models. Entrepreneurship and Transaction Cost Theories are used to explore the conditions for designing nonownership business models for the emerging IIoT with its implications for sharing uncertain opportunities and downsides, and for transforming these uncertainties into business opportunities. Nonownership contracts are introduced as the basis for business model design and are proposed as an architecture for the productive sharing of uncertainties in IIoT manufacturing networks. The following three main types of IIoT-enabled business models were identified: (1) Provision of manufacturing assets, maintenance and repair, and their operation, (2) innovative information and analytical services that help manufacturing (e.g., based on artificial intelligence, big data, and analytics), and (3) new services targeted at end-users (e.g., offering efficient customization by integrating end-users into the manufacturing and supply chain ecosystem)
    corecore