2021
DOI: 10.3390/s21155189
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead

Abstract: The concepts brought by Industry 4.0 have been explored and gradually applied.The cybersecurity impacts on the progress of Industry 4.0 implementations and their interactions with other technologies require constant surveillance, and it is important to forecast cybersecurity-related challenges and trends to prevent and mitigate these impacts. The contributions of this paper are as follows: (1) it presents the results of a systematic review of industry 4.0 regarding attacks, vulnerabilities and defense strategi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 112 publications
0
9
0
Order By: Relevance
“…The Internet's openness, boundarylessness, and virtual nature challenge the closed and exclusive concept of sovereignty. In this context, the concept of network sovereignty is created and has an essential impact on the theory of data sovereignty [ 17 ]. Therefore, the theory of data sovereignty mainly includes two connotations of network sovereignty and technological sovereignty.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The Internet's openness, boundarylessness, and virtual nature challenge the closed and exclusive concept of sovereignty. In this context, the concept of network sovereignty is created and has an essential impact on the theory of data sovereignty [ 17 ]. Therefore, the theory of data sovereignty mainly includes two connotations of network sovereignty and technological sovereignty.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Equation (1). The responses of every unit in the intermediate layer is sent to the final layer as output, which consists of 2 units, and the response for the appropriate output class is triggered by the activation function specified for the output layer.…”
Section: Neural Network Classifier Experimentsmentioning
confidence: 99%
“…According to an analysis of attacks the majority of security breaches occur at the network layer. 1 In most cases, malware, denial of service (DoS), and device hacking impair the security aspects of smart devices. As a result, protecting the smart system connected via networks is critical.…”
mentioning
confidence: 99%
“…(vii) Cross-site scripting (XSS): injecting JavaScript code in a web application to modify the display of a web application and force the victim to execute it in his browser; there are many types of it, such as Reflected XSS and DOM XSS [16]. (viii) Insecure deserialization: manipulating the inputs of a web application by deserializing it, modifying it, and serializing it again to compromise the web application [17]. (ix) Using components with known vulnerabilities: stop updating the used component in a web application allows attackers to exploit its known vulnerabilities; this type of vulnerability is found in abundance, especially in CMS web applications [18].…”
Section: Related Workmentioning
confidence: 99%