2021
DOI: 10.1109/access.2021.3056650
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Cybersecurity Guidelines for Manufacturing Factories in Industry 4.0

Abstract: Industry 4.0 is a revolution in manufacturing by introducing disruptive technologies such as Internet of Things (IoT) and cloud-computing into the heart of the factory. The resulting increased automation and the improved production synergy between stocks, supply chains and customer demands, come along with the threats and attacks from the Internet. Despite extensive literature on the cybersecurity topic, many actors in manufacturing factories are just realizing the impact of cybersecurity in the preservation o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
48
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 85 publications
(67 citation statements)
references
References 42 publications
0
48
0
Order By: Relevance
“…Another branch of cybersecurity research deals with industrial control systems (ICS) and thus puts a stronger emphasis on physical hardware in addition to the cyberspace. A number of review studies covers this space [38][39][40].…”
Section: Cybersecuritymentioning
confidence: 99%
“…Another branch of cybersecurity research deals with industrial control systems (ICS) and thus puts a stronger emphasis on physical hardware in addition to the cyberspace. A number of review studies covers this space [38][39][40].…”
Section: Cybersecuritymentioning
confidence: 99%
“…[ 108 ], the authors propose a defense framework based on sdn that consists of a model for traffic management and anomaly detection. Based on this framework, the authors studied the use of this methodology for iot networks and for scada systems [ 84 ], in which it allowed the extraction of traffic patterns to detect and prevent various network attacks such as arp spoofing, replay attacks and detect malicious command forwarding behaviors.…”
Section: Review Of Selected Studiesmentioning
confidence: 99%
“…[108], the authors propose a defense framework based on Software Defined Network (SDN) that consists of a model for traffic management and anomaly detection. Based on this framework, the authors studied the use of this methodology for IoT networks and for SCADA systems [84], in which it allowed the extraction of traffic patterns to detect and prevent various network attacks such as Address Resolution Protocol (ARP) spoofing, replay attacks and detect malicious command forwarding behaviors. • Social Engineering-Defense strategies for social engineering can include collaborators training to recognize sensitive information requests (phone numbers, emails, etc.)…”
Section: Policymentioning
confidence: 99%
“…Specifically, the jamming attacks are being studied in diverse scenarios to generate countermeasures [7]. In Industrial IoT systems (IIoT), the DoS attacks against cyber-physical production systems (CPPS) are particularly detrimental to the production and to the safety of the workers [8]. Therefore, the attention of these types of attacks are being increased owing to the notorious impact on the business and factories.…”
Section: Related Workmentioning
confidence: 99%