2017
DOI: 10.1007/s41635-017-0031-0
|View full text |Cite
|
Sign up to set email alerts
|

Manufacturing Supply Chain and Product Lifecycle Security in the Era of Industry 4.0

Abstract: The next generation of smart manufacturing systems will incorporate various recent enabling technologies. These technologies will aid in ushering the era of the fourth industrial revolution. They will make the supply chain and the product lifecycle of the manufacturing system efficient, decentralized, and well-connected. However, these technologies have various security issues and, when integrated in the supply chain and the product lifecycle of manufacturing systems, can pose various challenges for maintainin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(22 citation statements)
references
References 88 publications
0
22
0
Order By: Relevance
“…Various challenges arise for maintaining the security requirements for integrity, confidentiality, and availability by protecting each subsystem from unauthorized access, use, disclosure, disruption, improper modification or destruction of data [78]. More specifically, integrity is related with consistency, accuracy, and reliability of both the information data and the physical components of the entire supply chain and the product lifecycle.…”
Section: Security and Threat Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Various challenges arise for maintaining the security requirements for integrity, confidentiality, and availability by protecting each subsystem from unauthorized access, use, disclosure, disruption, improper modification or destruction of data [78]. More specifically, integrity is related with consistency, accuracy, and reliability of both the information data and the physical components of the entire supply chain and the product lifecycle.…”
Section: Security and Threat Detectionmentioning
confidence: 99%
“…Heretofore, the aforementioned issues have been highlighted in the literature [78], while several solutions, including cyber and physical detection methods, as well as standards (e.g., Reference Architecture Model Industry 4.0 (RAMI 4.0) [79], Industrial Internet Reference Architecture (IIRA) [80]) to safeguard manufacturing have been provided to realize an Industry 4.0 environment secure from known risks, vigilant against new threats, and resilient against zero-day attacks. Nevertheless, security issues in specific domains can drastically influence the operation of the entire system in a non-trivial and non-evident manner.…”
Section: Security and Threat Detectionmentioning
confidence: 99%
“…This type of attack profoundly impacts data availability, as the information becomes inaccessible when needed for legitimate purposes. Various manufacturing and production facilities have been victims of ransomware attacks in recent years [37]. According to BlackFog, a cybersecurity consultancycorporation, the manufacturing business and public sector have been the most targeted industries hit by the ransomware attacks in the first and second quarter of 2020 [38].…”
Section: Information Security Challengesmentioning
confidence: 99%
“…Distributed Denial of Service (DDoS) attack is a type of malicious activity impacting the availability of internetfacing systems [37]. DDoS has become more prevalent with Industry 4.0 and smart manufacturing harnessing IIoT and cloud computing infrastructures.…”
Section: Information Security Challengesmentioning
confidence: 99%
“…Adversaries can launch single attacks to disrupt industrial activities in a closed-loop supply chain, or can implement large-scale attacks to cause disturbances across many critical services. For example, adversaries can attack inventory management stations and report false inventory information (e.g., low inventory) via spoofing [116], [139], [140]. The result will be inventory management falsely placing orders based on autonomous inventory management schemes.…”
Section: ) Attacks On Servicementioning
confidence: 99%