2021
DOI: 10.17270/j.log.2021555
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security in supply chain management: A systematic review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…In addition, it is worth mentioning the sparse computational resources and power available to the diverse sensors that result in insufficient traditional security measures [9,45]. The aforementioned issues increase the chances of cyber-attacks on IoT systems, namely plants, transport, and household appliances [9], demanding substantial improvement in terms of authentication from remote systems, encryption from new sensors, and web interface and computer software for intrusion detection [46]. Additionally, the more IoT innovation, the more developed wireless technologies are, as in the case of 5G, which is optimized well beyond voice and data, offering a vast array of opportunities [15,47].…”
Section: The Industrial Internet Of Things (Iiot)mentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, it is worth mentioning the sparse computational resources and power available to the diverse sensors that result in insufficient traditional security measures [9,45]. The aforementioned issues increase the chances of cyber-attacks on IoT systems, namely plants, transport, and household appliances [9], demanding substantial improvement in terms of authentication from remote systems, encryption from new sensors, and web interface and computer software for intrusion detection [46]. Additionally, the more IoT innovation, the more developed wireless technologies are, as in the case of 5G, which is optimized well beyond voice and data, offering a vast array of opportunities [15,47].…”
Section: The Industrial Internet Of Things (Iiot)mentioning
confidence: 99%
“…The discussion on cloud computing covers subthemes of cybersecurity of supply chains based on software and networks, to minimize risks of purchasing and disconnection of key machines from networks [46]. To summarize, 5G and 6G networks can provide novel communication networks infrastructure, although IoT systems will still have the same energy capacity for hackers to take advantage of these weaknesses.…”
Section: Blockchain and Cloud Computingmentioning
confidence: 99%
“…Also, it is noteworthy to mention the sparse computational resources and power available to the diverse sensors that result in insufficient traditional security measures [9,45]. Those aforementioned issues augment the chances of cyber attacks to IoT systems, namely plants, transportation and household appliances [9], demanding substantial improvement in terms of authentication from remote systems, encryption from new sensors, and web interface and computer software for intrusion detection [46]. Additionally, the more IoT innovation, the more development in wireless tech-nologies, as well, such as the 5G, optimized well beyond voice and data, offering thus a vast array of opportunities [15,47].…”
Section: The Industrial Internet Of Things (Iiot)mentioning
confidence: 99%
“…The discussion on cloud computing covers subthemes of cyber security of supply chain based on software and networks, to minimize risks of purchasing and disconnection of key machines from networks [46]. To summarize, 5G and 6G networks can provide novel communication networks infrastructure, although IoT will remain with the same energy capacity for hackers take advantage of this weaknesses.…”
Section: Blockchain and Cloud Computingmentioning
confidence: 99%
“…Moreover, if all of the existing system modules of tea PSC rely on one blockchain, the cost will be quite high [26], [27]. We also observe that most processes of existing systems require plenty of human participation and lack automation [28], [29]. These human-participated processes make the malicious participants easily manipulate data and conduct tea counterfeiting [2].…”
mentioning
confidence: 92%