Ao meu orientador, Sergio Takeo Kofuji, por toda paciência e dedicação, também a toda a equipe do Grupo de Sistemas Pervasivos e de Alto Desempenho (PAD), pela ajuda direta e indireta na conclusão desta pesquisa. Agradeço à Huawei e à USP, por permitirem a minha participação nos projetos de pesquisa do Centro de Treinamento de Internet do Futuro e no Projeto SafeCity, sendo possível colocar em prática todo o referencial teórico estudado. Agradeço também à minha família e amigos, por todo apoio confiado a mim e também por entender os meus momentos de recolhimento e ausência. Em especial, agradeço aos amigos Marco Quirino da Veiga, pela ajuda na aplicação do questionário e incentivo ao longo da pesquisa, e Alaíde Barbosa Martins, pela parceria e confiança, companheiros de grupo e incentivadores nos momentos de dificuldades. Agradeço, enfim, à minha amada esposa, Giovana Benelli e a meus queridos filhos, Carlos Alberto e Maria Helena, por fazerem a minha vida mais divertida e acolhedora. Palavras-chave: Transformação Digital. Tecnologias Habilitadoras. IoT. CPS. Indústria 4.0.
Currently, information security is a constant concern of the several institutions and countries that use computing resources for communication and service offering purposes. Protection methods and countermeasures for traditional networks such as firewalls and intrusion detectors are known and ordinarily used. The same goes for control systems and data acquisition (Supervisory Control and Data Acquisition -SCADA). In the beginning, such systems were based on mainframes and closed architecture, i.e., dependent on manufacturers and consequently isolated from other systems. Nowadays, the SCADA systems converge more and more to platforms based on open systems, with its architecture strongly relied on connectivity; thus, it is usual the interconnection of such systems with the corporate network and, in some cases, with Internet itself. From this issue, and with the current technology development in the information security area, a methodology is proposed to implement automation systems in water treatment plants with an emphasis on security, and focused on industrial systems, using automation safety rules ISA 99. The purpose of this essay is, in brief, to study safety rules, methods and methodologies for industrial systems with a focus on water treatment, and to propose a methodology directed to the minimization of safety hazards. For that purpose, it is proposed the evaluation of three water treatment real scenarios so that it is possible to simulate criticality parameters identified in the flow chart and stages of the water treatment. Therefore, a scenario connected to PLC was developed, allowing the simulation of the behavior and the impacts, in addition to an event detector for the result analysis.
Considerando que a água apresenta importancia sanitária e econômica, verifica-se que os sistemas hídricos automatizados e as diversas plantas de serviços críticos estão cada vez mais se modernizando e integrando as infraestruturas existentes, em nuvens de gerenciamento de dados. Em função do ganho de produtividade e investimento mais baixos, a aplicação de tecnologias de Internet das Coisas (IoT) em diversas áreas torna-se uma realidade. Com o aumento da complexidade dos sistemas hídricos, os riscos de segurança tendem a aumentar, porém os ganhos em gerenciamento e qualidade do tratamento da água podem trazer uma maior confiabilidade ao sistema. Partindo-se desta problemática e com o atual desenvolvimento tecnológico em que se encontra a área de IoT, é aqui proposto um estudo de aplicação desta tecnologia em plantas de saneamento.
Industrial Control Systems (ICS) networks offer a high level of automation combined with high levels of control, quality,and process improvement. Since network corporate users have to access the ICS environment, these networks have to be interconnected. However, this interconnection can introduce risks to the systems and manufacturing processes, which leads to the need to ensure the interconnection is done safely. The objective of this paper is to perform modeling and validation of a proposed secure interconnection between ICS and corporate networks using Colored Petri Networks (CPN). In addition to the best practices published in related works, this paper recommends some integrated features like the use of terminal server service, secure manual uplinks, and unidirectional security gatewayto enhance environmental security. However, our main contribution is the validation process performed in a CPN, which made it possible to execute queries in the state space resulting from the simulation -that works as a proof of concept. As a result, thepaper presents a secure and validated model of interconnection between ICS and corporate networks, capable of being applied to any interconnection environment
The Internet of Things (IoT) enables the development of innovative applications in various domains such as healthcare, transportation, and Industry 4.0. The integration of the cloud platform's large processing and storage capacity with the ubiquitous sensing and actuation provided by the devices creates an IoT architecture that provides vast raw data. The IoT devices send the data to the cloud platform with the developed IoT applications, which can use publish-subscribe systems. However, messages with sensitive content require endto-end security. Besides that, IoT devices may present processing, memory, payload, and energy restrictions. In this sense, messages in an IoT architecture need to achieve both energy-efficiency and secure message delivery. Thus, this article's main contribution refers to a system that standardizes the publish-subscribe topic and payload used by the cloud platform and the IoT devices.Our system also provides end-to-end security while surpassing the energy-efficiency to send data than the main related works in the literature regarding the use of publish-subscribe systems in IoT.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.