2017
DOI: 10.1007/s11036-017-0882-1
|View full text |Cite
|
Sign up to set email alerts
|

Smart Behavioural Filter for Industrial Internet of Things

Abstract: We are currently experiencing the fourth industrial revolution. This is what the German government initiative, first, has identified with 'Industry 4.0'. The manufacturing future will be marked and will go through the new automation technologies that are being introduced with Industrial Internet of Things (I2oT). Industrial Control Systems (ICSs) are exploiting I2oT for reducing costs and improving efficiency. However, ICSs are already jeopardized by an increasingly large set of threat vectors. Those threats a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 12 publications
(15 reference statements)
0
4
0
Order By: Relevance
“…The system aims to track the tasks being performed by the machines, enabling automatic detection of the completion time of a job and based on that, dynamic rescheduling. Meanwhile, Corbò et al [41] applied IoT to develop a Smart Behavioral Filter (SBF) for the Programmable Logic Controllers with the aim to secure the PLC itself against logic attacks. Always in the manufacturing context, Um et al [42] proposed an IoT standard to monitor an injection moding machine.…”
Section: Application Papersmentioning
confidence: 99%
“…The system aims to track the tasks being performed by the machines, enabling automatic detection of the completion time of a job and based on that, dynamic rescheduling. Meanwhile, Corbò et al [41] applied IoT to develop a Smart Behavioral Filter (SBF) for the Programmable Logic Controllers with the aim to secure the PLC itself against logic attacks. Always in the manufacturing context, Um et al [42] proposed an IoT standard to monitor an injection moding machine.…”
Section: Application Papersmentioning
confidence: 99%
“…The second group of competing works uses intrusion detection systems (IDS) operating to monitor the system nodes, identify the incidents and respond to security impacts. IDS functionality can be supplemented with additional operation to complete adaptability (e.g., [45][46][47][48][49][50][51]. IDS may be extended with an intelligent a posteriori security management subsystem, e.g., Ref.…”
Section: Discussionmentioning
confidence: 99%
“…(He et al [39] observed that the most prevalent vulnerabilities are located at each interface between multiple components where information is exchanged. For example, the vulnerability in a SCADA system includes Network Protocols and Communication Networks, Human-Machine Interfaces, Database Servers, Application Servers, Remote Terminals, and Logic Controllers [38,40].…”
Section: National Modelsmentioning
confidence: 99%