scholarly journals A Design Approach to IoT Endpoint Security for Production Machinery Monitoring

Sensors ◽  
2019 ◽  
Vol 19 (10) ◽  
pp. 2355 ◽  
Author(s):  
Stefano Tedeschi ◽  
Christos Emmanouilidis ◽  
Jörn Mehnen ◽  
Rajkumar Roy

The Internet of Things (IoT) has significant potential in upgrading legacy production machinery with monitoring capabilities to unlock new capabilities and bring economic benefits. However, the introduction of IoT at the shop floor layer exposes it to additional security risks with potentially significant adverse operational impact. This article addresses such fundamental new risks at their root by introducing a novel endpoint security-by-design approach. The approach is implemented on a widely applicable production-machinery-monitoring application by introducing real-time adaptation features for IoT device security through subsystem isolation and a dedicated lightweight authentication protocol. This paper establishes a novel viewpoint for the understanding of IoT endpoint security risks and relevant mitigation strategies and opens a new space of risk-averse designs that enable IoT benefits, while shielding operational integrity in industrial environments.

2021 ◽  
Vol 3 (2) ◽  
pp. 46-53
Author(s):  
Young B. Choi ◽  
Matthew E. Bunn

With the introduction of the 5th generation of wireless systems and communications (5G) comes new risks and challenges. This paper explores the potential security challenges of 5G communication compared with legacy cellular networks and prior generations of communication standards. This paper defines what 5G is and how it affects our lives on a daily basis. It further discusses the new security features involving different technologies applied to 5G, such as heterogeneous networks, device-to-device communications, massive multiple-input multiple-output, software-defined networks, and the internet of things, including autonomous cars, healthcare, automated manufacturing, and more.


Sensors ◽  
2020 ◽  
Vol 20 (17) ◽  
pp. 4806
Author(s):  
Naor Kalbo ◽  
Yisroel Mirsky ◽  
Asaf Shabtai ◽  
Yuval Elovici

Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one’s own home. Unfortunately, like other IoT systems, there are inherent security risks which can lead to significant violations of a user’s privacy. In this review, we explore the attack surface of modern surveillance systems and enumerate the various ways they can be compromised with real examples. We also identify the threat agents, their attack goals, attack vectors, and the resulting consequences of successful attacks. Finally, we present current countermeasures and best practices and discuss the threat horizon. The purpose of this review is to provide researchers and engineers with a better understanding of a modern surveillance systems’ security, to harden existing systems and develop improved security solutions.


2018 ◽  
Vol 38 (4) ◽  
pp. 450-464 ◽  
Author(s):  
Cem Savas Aydin ◽  
Senim Ozgurler ◽  
Mehmet Bulent Durmusoglu ◽  
Mesut Ozgurler

Purpose This paper aims to present a multi-response robust design (RD) optimization approach for U-shaped assembly cells (ACs) with multi-functional walking-workers by using operational design (OD) factors in a simulation setting. The proposed methodology incorporated the design factors related to the operation of ACs into an RD framework. Utilization of OD factors provided a practical design approach for ACs addressing system robustness without modifying the cell structure. Design/methodology/approach Taguchi’s design philosophy and response surface meta-models have been combined for robust simulation optimization (SO). Multiple performance measures have been considered for the study and concurrently optimized by using a multi-response optimization (MRO) approach. Simulation setting provided flexibility in experimental design selection and facilitated experiments by avoiding cost and time constraints in real-world experiments. Findings The present approach is illustrated through RD of an AC for performance measures: average throughput time, average WIP inventory and cycle time. Findings are in line with expectations that a significant reduction in performance variability is attainable by trading-off optimality for robustness. Reductions in expected performance (optimality) values are negligible in comparison to reductions in performance variability (robustness). Practical implications ACs designed for robustness are more likely to meet design objectives once they are implemented, preventing changes or roll-backs. Successful implementations serve as examples to shop-floor personnel alleviating issues such as operator/supervisor resistance and scepticism, encouraging participation and facilitating teamwork. Originality/value ACs include many activities related to cell operation which can be used for performance optimization. The proposed framework is a realistic design approach using OD factors and considering system stochasticity in terms of noise factors for RD optimization through simulation. To the best of the authors’ knowledge, it is the first time a multi-response RD optimization approach for U-shaped manual ACs with multi-functional walking-workers using factors related to AC operation is proposed.


Author(s):  
Norma Diana ◽  
Farah Margaretha Leon

The background of this research is related to a phenomenon of millennials who prefer to change their financial behavior into cashless transactions from cash-based transactions. Factors of benefits (economic benefits, seamless transactions, and convenience) and risks (financial risks, legal risks, security risks, and operational risks) experienced by millennials are examined to observe their effects on the continuance intention of financial technology (FinTech) payment. FinTech users are classified into two types, namely early adopters and late adopters. This study examines the variables of continuance intention of FinTech payment, economic benefits, seamless transactions, convenience, financial risks, legal risks, security risks, operational risks, perceived benefits, and perceived risks simultaneously and is the first to be conducted on millennials in Jakarta. The methodology used was the Structural Equation Modeling-Partial Least Square. The data were collected through questionnaires distributed to 313 respondents. The results of this research show that convenience is the most influential benefit factor towards the continuance intention of FinTech payment. Operational risks are the only factor that do not significantly affect the continuance intention of FinTech payment. The differences between the effects of benefits and risks are found in both of the user types. The implication of this research is to further understand influential factors in millennials’ decisions to use FinTech payment services.


The Internet of Things (IoT) is characterized as an approach where objects are outfitted with sensors, processors, and actuators which include design of hardware board and development, protocols, web APIs, and software systems, which combined to make an associated architecture of embedded systems. This connected environment enables technologies to get associated with different networks, platforms, and devices, making a web of communication which is reforming the manner in which we communicate with the world digitally. These connected embedded systems are changing behaviour and interactions with our environment, networks, and homes, and also with our own bodies in terms of smart devices. Security and privacy are the most significant consideration in the field of real-world communication and mainly on IoTs. With the evolution of IoT the network layer security in the IoT has drawn greater focus. The security vulnerabilities in the IoT system could make security risks based on any application. Therefore there is an essential requirement for IDS for the IoT based systems for avoiding security attacks based on security vulnerabilities. This paper proposed a fuzzy c-means clustering with brain storm optimization algorithm (FBSO) for IDS based on IoT system. The NSL-KDD dataset is utilized to evaluate and simulate the proposed algorithm. The results demonstrate that the proposed technique efficiently recognize intrusion attacks and decrease the network difficulties


2020 ◽  
Vol 13 (1) ◽  
pp. 103-128 ◽  
Author(s):  
Shipra Pandey ◽  
Rajesh Kumar Singh ◽  
Angappa Gunasekaran ◽  
Anjali Kaushik

Purpose The purpose of this study is to examine cyber security risks in globalized supply chains (SCs). It has been seen to have a greater impact on the performance of SCs. The information and communication technology of a firm, which enhances the efficiency and effectiveness in the SC, could simultaneously be the cause of vulnerabilities and exposure to security threats. Researchers have primarily focussed on the cyber-physical system (CPS) vulnerabilities impacting SC. This paper tries to categorize the cyber security risks occurring because of the SCs operating in CPS. Design/methodology/approach Based on the flow of information along the upstream and downstream SC, this paper tries to identify cyber security risks in the global SCs. It has further tried to categorize these cyber security risks from a strategic point of view. Findings This paper tries to identify the various cyber security risk and cyber-attacks in globalized SC for improving the performance. The 16 cyber security risks have been categorized into three categories, namely, supply risk, operational risk and demand risk. The paper proposes a framework consisting of different cyber-attacks across the information that flows in global SCs along-with suitable mitigation strategies. Research limitations/implications The paper presents the conceptual model of cyber security risks and cyber-attacks in globalized SCs based on literature review and industry experts. Further validation and scale development of these risks can be done through empirical study. Practical implications This paper provides significant managerial insights by developing a framework for understanding the cyber security risks in terms of the drivers of these risks and how to deal with them. From a managerial perspective, this framework can be used as a decision-making process while considering different cyber security risks across the stages of globalized SCs. Originality/value The major contribution of this study is the identification and categorization of cyber security risks across the global SCs in the digital age. Thus, this paper introduces a new phenomenon to the field of management that has the potential to investigate new areas of future research. Based on the categorization, the paper provides insights on how cyber security risks impact the continuity of SC operations.


2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Shu Liu ◽  
Yuting Wu

There has been a consensus on the development of ecological agriculture to promote the leap from traditional agriculture to ecological agriculture, but the unavoidable fact is that the development of ecological agriculture is still relatively slow at the present stage and has not formed a major climate and great influence. The rise of the Internet is a technology that has promoted the transformation and upgrading of modern agriculture, changed the traditional agricultural production mode, and accelerated the scientific and technological integration of information. In view of the characteristics and difficulties of agriculture, this paper builds an Agricultural Internet of Things (IoT) management system to realize the integrated management of Internet equipment and realize the management of environmental data, video data, and agricultural expert knowledge. Then from perception technology, transmission technology, and the perspective of three intelligent information processing technologies, this paper introduces the present state of agricultural IoT, analyzes the Internet of Things to the economic benefits of agricultural production, to research the problems of China’s agricultural development of the Internet of Things, and puts forward China’s agricultural Internet of the future research emphasis and direction of development.


Sign in / Sign up

Export Citation Format

Share Document