2022
DOI: 10.1016/j.neucom.2021.07.101
|View full text |Cite
|
Sign up to set email alerts
|

Secure data exchange in Industrial Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…The widespread use of Industrial Internet of Things(IIoT) has enabled large-scale, reliable, and secure industrial environments, but existing deployments often fall short in meeting security standards and have limited resources leading to security breaches and potential critical outcomes. To address the concerns, a secure architecture is proposed [19] that combines blockchain-based solutions with IIoT environments, utilizing a structured asynchronous blockchain Directed Acyclic Graph(DAG) for improved security and transaction efficiency. The proposed solution incorporates detailed use cases, sequence diagrams, and a treat model created using the STRIDE approach for comprehensive security testing.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…The widespread use of Industrial Internet of Things(IIoT) has enabled large-scale, reliable, and secure industrial environments, but existing deployments often fall short in meeting security standards and have limited resources leading to security breaches and potential critical outcomes. To address the concerns, a secure architecture is proposed [19] that combines blockchain-based solutions with IIoT environments, utilizing a structured asynchronous blockchain Directed Acyclic Graph(DAG) for improved security and transaction efficiency. The proposed solution incorporates detailed use cases, sequence diagrams, and a treat model created using the STRIDE approach for comprehensive security testing.…”
Section: Literature Surveymentioning
confidence: 99%
“…The input of softmax classifier of neural network is defined as follows, 𝐼 = {(𝑢 (1) , 𝑣 (1) ), … . , (𝑢 (𝑛) , 𝑣 (𝑛) ), 𝑣 (𝑛) ∈ {1,2, … , 𝑘} (19) For every input 𝑢 we used classifier for estimating the probability of posterior 𝑝(𝑣 = 𝑖/𝑢), it is the probability that 𝑢 is the sample input of 𝑖. The hidden layer activation function is defined as follows,…”
Section: (Ii) Global Model Generationmentioning
confidence: 99%
“…The American pharmaceutical giant PharMerica disclosed that unknown actors accessed its system in March and extracted the personal data of 5.8 million individuals [10]. A ransomware hacker group named BlackCat threatened to leak 80 GB of confidential data they claimed to have stolen from Reddit servers in February [11]. According to a 2022 report by Waterfall Security Solutions, there were 57 cyber-attack incidents related to operational technology, impacting over 150 industrial operations [12].…”
Section: Introductionmentioning
confidence: 99%
“…The primary research method employed entails a rigorous exploration of peer-reviewed scholarly articles. Of particular significance is the seminal work [14], which serves as a pivotal reference point for comprehending the intricacies of secure data management within DAGs. This foundational source is instrumental in unraveling the complex web of data security considerations in the context of DAGs.…”
Section: Introductionmentioning
confidence: 99%