Guest Editorial: Security and Privacy Issues in Industry 4.0 Applications

被引:7
作者
Alazab, Mamoun [1 ]
Gadekallu, Thippa Reddy [2 ]
Su, Chunhua [3 ]
机构
[1] Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT 0810, Australia
[2] Vellore Inst Technol, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
[3] Univ Aizu, Div Comp Sci, Aizu Wakamatsu, Fukushima 9658580, Japan
关键词
D O I
10.1109/TII.2022.3164741
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The papers in this special section focus on security and privacy issues associated with Industry 4.0. In 2011, a group of delegates from business and academia, and politics in German initially proposed the conception of the Fourth Industrial Revolution (or Industry 4.0), which aims to improve the competitive ability in the manufacturing industry of their country. Along with the emergence of the Industry 4.0 term, people started introspecting the existing shortcomings in contemporary industrial society. Especially, the technologies of the past generations cannot maintain data explosive requirements in the Internet and telecommunication industry and fuse real-time data, which would increase waste and reduce productivity and overall equipment effectiveness. Industry 4.0 recognizes the importance of this issue and makes full use of large-scale machine-to-machine communication and the Internet of things (IoT) to increase automation, improve communication, and self-monitoring and diagnose issues without human intervention, finally transforming traditional manufacturing and industrial practices into a modern smart organization. However, with the rapid growth of devices, security and privacy issues rise to the surface. A mass amount of data frequently exchanged in the public channel will draw the attention of some people with evil intentions. Moreover, the resource-limited devices without strong cryptographic assurance would be compromised and hacked by adversaries. Hence, assuring the authenticity, integrity, and nonrepudiation of these industrial IoT data is a hot issue for industry 4.0 at present. © 2005-2012 IEEE.
引用
收藏
页码:6326 / 6329
页数:4
相关论文
共 19 条
[1]  
Anajemba J. H., IEEE T IND INFORM, DOI [10.1109/TII.2021, DOI 10.1109/TII.2021]
[2]   Certificateless Aggregated Signcryption Scheme (CLASS) for Cloud-Fog Centric Industry 4.0 [J].
Dohare, Indu ;
Singh, Karan ;
Ahmadian, Ali ;
Mohan, Senthilkumar ;
Reddy, Praveen Kumar M. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) :6349-6357
[3]   SAKE*: A Symmetric Authenticated Key Exchange Protocol With Perfect Forward Secrecy for Industrial Internet of Things [J].
Fan, Qing ;
Chen, Jianhua ;
Shojafar, Mohammad ;
Kumari, Saru ;
He, Debiao .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) :6424-6434
[4]   Secure Partial Aggregation: Making Federated Learning More Robust for Industry 4.0 Applications [J].
Gao, Jiqiang ;
Zhang, Baolei ;
Guo, Xiaojie ;
Baker, Thar ;
Li, Min ;
Liu, Zheli .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) :6340-6348
[5]   Efficient Web APIs Recommendation With Privacy-Preservation for Mobile App Development in Industry 4.0 [J].
Gong, Wenwen ;
Zhang, Wei ;
Bilal, Muhammad ;
Chen, Yifei ;
Xu, Xiaolong ;
Wang, Weizheng .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) :6379-6387
[6]   SPTM-EC: A Security and Privacy-Preserving Task Management in Edge Computing for IIoT [J].
Hosen, A. S. M. Sanwar ;
Sharma, Pradip Kumar ;
Ra, In-Ho ;
Cho, Gi Hwan .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) :6330-6339
[7]   SDMTA: Attack Detection and Mitigation Mechanism for DDoS Vulnerabilities in Hybrid Cloud Environment [J].
Kautish, Sandeep ;
Reyana, A. ;
Vidyarthi, Ankit .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) :6455-6463
[8]   P2TIF: A Blockchain and Deep Learning Framework for Privacy-Preserved Threat Intelligence in Industrial IoT [J].
Kumar, Prabhat ;
Kumar, Randhir ;
Gupta, Govind P. ;
Tripathi, Rakesh ;
Srivastava, Gautam .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) :6358-6367
[9]   Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network [J].
Latif, Shahid ;
Huma, Zil e ;
Jamal, Sajjad Shaukat ;
Ahmed, Fawad ;
Ahmad, Jawad ;
Zahid, Adnan ;
Dashtipour, Kia ;
Aftab, Muhammad Umar ;
Ahmad, Muhammad ;
Abbasi, Qammer Hussain .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) :6435-6444
[10]   A VMD and LSTM Based Hybrid Model of Load Forecasting for Power Grid Security [J].
Lv, Lingling ;
Wu, Zongyu ;
Zhang, Jinhua ;
Zhang, Lei ;
Tan, Zhiyuan ;
Tian, Zhihong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) :6474-6482