2017
DOI: 10.9781/ijimai.2017.437
|View full text |Cite
|
Sign up to set email alerts
|

Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems

Abstract: -The Internet of Things (IoT) has transformed many aspects of modern manufacturing, from design to production to quality inspection. In particular, IoT and digital manufacturing technol-ogies have substantially accelerated product developmentcycles and manufacturers can now create products of a complexity and precision not heretofore possible. However, new threats to supply chain security have arisen from connecting machines to the In-ternet and introducing complex IoT-based systems controlling manufacturing p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(29 citation statements)
references
References 19 publications
0
28
0
1
Order By: Relevance
“…Sonar and Upadhyay [12] discuss different Distributed Deny of Service attack and its effect on IoT. Pan et al [13] identify and classify possible cyberphysical attacks and connect such attacks with variations in manufacturing processes and quality inspection measures.…”
Section: Related Workmentioning
confidence: 99%
“…Sonar and Upadhyay [12] discuss different Distributed Deny of Service attack and its effect on IoT. Pan et al [13] identify and classify possible cyberphysical attacks and connect such attacks with variations in manufacturing processes and quality inspection measures.…”
Section: Related Workmentioning
confidence: 99%
“…Sonar and Upadhyay [14] discuss different Distributed Denial of Service attack and its effect on IoT. Pan et al [15] identify andclassify possible cyberphysical attacks and connect such attacks with variations in manufacturing processes and quality inspection measures. Their taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality inspectionmeasures.…”
Section: T Mmentioning
confidence: 99%
“…Tables I to IV present the set of good practices and actions for each category under manufacturer/developer perspective. [6,9] Medium [10,14] High [15,18]…”
Section: A Manufacturer/developer Perspectivementioning
confidence: 99%
See 1 more Smart Citation
“…This type of attack is implemented [11] on the hardware parts of the IoT network and the adversary needs to be close to the IoT systems. Table 1 analyzes briefly on physical layer attacks.…”
Section: A Physical Layermentioning
confidence: 99%