2020
DOI: 10.1016/j.jmsy.2020.10.011
|View full text |Cite
|
Sign up to set email alerts
|

Securing IIoT using Defence-in-Depth: Towards an End-to-End secure Industry 4.0

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 45 publications
(19 citation statements)
references
References 54 publications
0
19
0
Order By: Relevance
“…By using this technology, supply chains become more dynamic, adaptable, interconnected and performance-demanding with the introduction of intelligent manufacturing. Because supply chains are interconnected, current and emerging security threats might have a broader impact (Lam and Wong, 2018; Mosteiro-Sanchez et al , 2020; Javaid et al , 2021).…”
Section: Need Of Cybersecurity For Industry 40mentioning
confidence: 99%
“…By using this technology, supply chains become more dynamic, adaptable, interconnected and performance-demanding with the introduction of intelligent manufacturing. Because supply chains are interconnected, current and emerging security threats might have a broader impact (Lam and Wong, 2018; Mosteiro-Sanchez et al , 2020; Javaid et al , 2021).…”
Section: Need Of Cybersecurity For Industry 40mentioning
confidence: 99%
“…Moreover, the framework of this section is shown in Figure 3. Explored the optimum location for the TCNs and found secured routes Mosteiro-Sanchez et al [27] Securing IIoT using defence-in-depth: towards an end-toend secure industry 4.0…”
Section: The Security Of Iovmentioning
confidence: 99%
“…However, this solution reduces the control retained by data producers by allowing customers to retrieve data without the data producers knowing what has been transferred. Overall, there is a need for encryption schemes adaptable to Industrial IoT (IIoT) devices and capable of providing E2E security [18]. This requirement is magnified in value chains dealing with industrial limitations and risks introduced by third-party services.…”
Section: State Of the Artmentioning
confidence: 99%