Securing Manufacturing Intelligence for the Industrial Internet of Things

被引:8
|
作者
Al-Aqrabi, Hussain [1 ]
Hill, Richard [1 ]
Lane, Phil [1 ]
Aagela, Hamza [1 ]
机构
[1] Univ Huddersfield, Dept Comp Sci, Huddersfield, W Yorkshire, England
关键词
Business Intelligence; Security; Industrial Internet of Things;
D O I
10.1007/978-981-32-9343-4_21
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Widespread interest in the emerging area of predictive analytics is driving the manufacturing industry to explore new approaches to the collection and management of data through Industrial Internet of Things (IIoT) devices. Analytics processing for Business Intelligence (BI) is an intensive task, presenting both a competitive advantage as well as a security vulnerability in terms of the potential for losing Intellectual property (IP). This article explores two approaches to securing BI in the manufacturing domain. Simulation results indicate that a Unified Threat Management (UTM) model is simpler to maintain and has less potential vulnerabilities than a distributed security model. Conversely, a distributed model of security out-performs the UTM model and offers more scope for the use of existing hardware resources. In conclusion, a hybrid security model is proposed where security controls are segregated into a multi-cloud architecture.
引用
收藏
页码:267 / 282
页数:16
相关论文
共 50 条
  • [31] Securing the Internet of things using Blockchain
    Showkat, Sadia
    Qureshi, Shaima
    PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 540 - 545
  • [32] Securing the Internet of Things: A Standardization Perspective
    Keoh, Sye Loong
    Kumar, Sandeep S.
    Tschofenig, Hannes
    IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (03): : 265 - 275
  • [33] Securing the Internet of Things: An Ongoing Challenge
    Smith, Sean W.
    COMPUTER, 2020, 53 (06) : 62 - 66
  • [34] Authentication Protocol for Securing Internet of Things
    Maarof, Ahmed
    Senhadji, Mohamed
    Labbi, Zouheir
    Belkasmi, Mostafa
    ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [35] Securing all devices in the internet of things
    Reiter, Gil
    ECN Electronic Component News, 2015, 59 (06): : 20 - 22
  • [36] Securing the Internet of Things A Military Perspective
    Wrona, Konrad
    2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 502 - 507
  • [37] Securing the Internet of Things: A Proposed Framework
    Jaswal, Komal
    Choudhury, Tanupriya
    Chhokar, Roshan Lal
    Singh, Sooraj Randhir
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 1277 - 1281
  • [38] Securing networks in the internet of things era
    Liu, Cricket
    Computer Fraud and Security, 2015, 2015 (04): : 13 - 16
  • [39] Artificial Intelligence and Internet of Things Integration in Pharmaceutical Manufacturing: A Smart Synergy
    Kodumuru, Reshma
    Sarkar, Soumavo
    Parepally, Varun
    Chandarana, Jignesh
    PHARMACEUTICS, 2025, 17 (03)
  • [40] The HiTar-23 Dataset Construction and Validation For Securing Industrial Internet of Things Environment
    Dhaouadi, Tarak
    Mrabet, Hichem
    Jemai, Abderrazek
    2024 IEEE 27TH INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING, ISORC 2024, 2024,