2018
DOI: 10.1016/j.promfg.2018.07.148
|View full text |Cite
|
Sign up to set email alerts
|

A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 28 publications
(12 citation statements)
references
References 27 publications
0
12
0
Order By: Relevance
“…Horak et al (2021), Huraj et al (2021) and Wu et al (2020), respectively, a practical investigation of attacks on real production lines with an emphasis on the Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices to prove their weaknesses; creating a communication map and preventing communication degradation from infected IoT devices at the switch level towards the production line; use of machine learning to detect and prevent intrusions; and a testbed to investigate cyber intrusions, validating countermeasures. Already Bracho et al (2018), Leander et al (2020), Kosmowski et al (2019), Kühnle et al (2017), Lopez et al (2017) and Zarreh et al (2019), designed a more conceptual analysis of security issues through statistical testing; formulating a list of access control requirements for an intelligent manufacturing system; use of risk charts to determine and verify the level of performance and integrity of security functions; categorization of anomalies and detection mechanisms; and unification into a common framework to help identify potential solutions.…”
Section: Cyber Security Threats To Iot Applications and Service Domains 2020mentioning
confidence: 99%
“…Horak et al (2021), Huraj et al (2021) and Wu et al (2020), respectively, a practical investigation of attacks on real production lines with an emphasis on the Internet of Things (IoT) and Industrial Internet of Things (IIoT) devices to prove their weaknesses; creating a communication map and preventing communication degradation from infected IoT devices at the switch level towards the production line; use of machine learning to detect and prevent intrusions; and a testbed to investigate cyber intrusions, validating countermeasures. Already Bracho et al (2018), Leander et al (2020), Kosmowski et al (2019), Kühnle et al (2017), Lopez et al (2017) and Zarreh et al (2019), designed a more conceptual analysis of security issues through statistical testing; formulating a list of access control requirements for an intelligent manufacturing system; use of risk charts to determine and verify the level of performance and integrity of security functions; categorization of anomalies and detection mechanisms; and unification into a common framework to help identify potential solutions.…”
Section: Cyber Security Threats To Iot Applications and Service Domains 2020mentioning
confidence: 99%
“…Moreover, Zarreh et al [17,18] assume the interaction of attacker and manufacturing enterprise as a game and proposed a framework to assess the repercussions of a cyber-physical thereat and choose a proper method to defend. Utilizing the same mindset, Bracho et al [19,20] introduces a simulation-based model to assess the consequences of manufacturing systems' performance under the presence of cybersecurity risks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Grey wolves tend to encircle prey before the hunt. This behaviour can be mathematically simulated through equations (5)(6)(7)(8).…”
Section: Encircling Preymentioning
confidence: 99%
“…Cloud manufacturing (CMfg) has been proposed as the panacea to implement this groundbreaking idea in recent years. Nonetheless, to fully achieve this goal, there remains significant issues with regard to enabling technologies [3][4][5][6][7], trust evaluation [8], task and resource description [9,10], scheduling [11][12][13] and service composition, among which the last one, is the key to offering composite services through the above-mentioned collaboration among partners. This has to be done by selecting the optimal resource for each sub-task out of the existing candidates at the resources pool and composing them to achieve the highest quality of service (QoS).…”
Section: Introductionmentioning
confidence: 99%