2018
DOI: 10.15863/tas.2018.09.65.40
|View full text |Cite
|
Sign up to set email alerts
|

Security Intelligence for Industry 4.0: Design and Implementation

Abstract: ISRA (India) = 1.344 ISI (Dubai, UAE) = 0.829 GIF (Australia) = 0.564 JIF = 1.500 SIS (USA) = 0.912 РИНЦ (Russia) = 0.156 ESJI (KZ) = 4.102 SJIF (Morocco) = 5.667 ICV (Poland) = 6.630 PIF (India) = 1.940 IBI (India) = 4.260

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 3 publications
0
2
0
1
Order By: Relevance
“…Destaca-se ao fato de que o fornecedor é vulnerável a um ataque do tipo phishing e suas credenciais de privilégio são furtadas, resultando em exposição de dados em massa; novos dispositivos apresentam vulnerabilidades, mesmo os desenvolvidos para a Segurança Inteligente (Yutanto, 2018) e para a Fábrica Inteligente (Pereira et al, 2017).…”
Section: A Indústria 40unclassified
“…Destaca-se ao fato de que o fornecedor é vulnerável a um ataque do tipo phishing e suas credenciais de privilégio são furtadas, resultando em exposição de dados em massa; novos dispositivos apresentam vulnerabilidades, mesmo os desenvolvidos para a Segurança Inteligente (Yutanto, 2018) e para a Fábrica Inteligente (Pereira et al, 2017).…”
Section: A Indústria 40unclassified
“…According to another paper on security intelligence for the Industry 4.0 revolution [22], the demand for more direct connectivity with the Internet will also open doors for major security management issues. The authors have discussed possible mitigation techniques for raspberry-pi-based IoT devices using port knocking with two-factor authentication as part of their solution.…”
Section: Related Workmentioning
confidence: 99%
“…With the service port closed, the target port cannot be confirmed during scanning, and therefore, an attacker cannot target it [25]. This stealthy feature of port knocking also helps in putting up deterrence against zero-day attacks [22]. Based on the research work in papers [8] and [15], we selected two approaches for our port knocking test on the IoT device because they are lightweight, can be used in the IoT environment, and can generate completely random numbers using two sets of completely different algorithms as follows:…”
Section: Port Knockingmentioning
confidence: 99%