2020
DOI: 10.1007/978-3-030-44685-7_9
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Resilient Communications in the Industrial Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 50 publications
0
11
0
Order By: Relevance
“…As the software subsystems of the proposed Cyber-Physical Production System (CPPS) continuously exchange data with each other and with the cloud, an important question is how secure communication can be achieved. This non-functional feature can be obtained with an implementation that considers aspects of different kinds such as: the mapping of functional subsystems of Figure 2 on architectures specialized in secure communication such as the one described in [ 46 ] which is based on two enabling technologies for IIoT: Smart Spaces for intelligent data processing and Virtual Private LAN Services; ensure that the implemented software pursues security practices as goals of IIoT [ 47 ]. For example, the software tool implemented for the pattern described in Section 5.4 uses a reliable Application Programming Interface and access control in IIoT networks.…”
Section: Modeling a Cyber-physical System To Support Vm In Industry 40mentioning
confidence: 99%
See 2 more Smart Citations
“…As the software subsystems of the proposed Cyber-Physical Production System (CPPS) continuously exchange data with each other and with the cloud, an important question is how secure communication can be achieved. This non-functional feature can be obtained with an implementation that considers aspects of different kinds such as: the mapping of functional subsystems of Figure 2 on architectures specialized in secure communication such as the one described in [ 46 ] which is based on two enabling technologies for IIoT: Smart Spaces for intelligent data processing and Virtual Private LAN Services; ensure that the implemented software pursues security practices as goals of IIoT [ 47 ]. For example, the software tool implemented for the pattern described in Section 5.4 uses a reliable Application Programming Interface and access control in IIoT networks.…”
Section: Modeling a Cyber-physical System To Support Vm In Industry 40mentioning
confidence: 99%
“…ensure that the implemented software pursues security practices as goals of IIoT [ 47 ]. For example, the software tool implemented for the pattern described in Section 5.4 uses a reliable Application Programming Interface and access control in IIoT networks.…”
Section: Modeling a Cyber-physical System To Support Vm In Industry 40mentioning
confidence: 99%
See 1 more Smart Citation
“…In the field of Industrial IoT security, researchers have done a lot of work. Borhani et al summarized the security problems faced by the Industrial Internet of Things and possible solutions [ 5 ]. Gurtov and others analyzed the challenges faced by the Industrial Internet in the process of communication and data processing and proposed a secure communication architecture [ 6 ].…”
Section: Related Workmentioning
confidence: 99%
“…The industrial Internet of things (IIoT), known as Industry 4.0, revolutionizes the manufacturing by enabling the addition and accessibility of far greater amounts of data, at higher speeds, and a lot more efficiently than before [16]. IIoT networks of smart devices allow industrial organizations to open big data containers and connect people, data, and processes from the factory floors to the offices of their executive leaders.…”
Section: Introductionmentioning
confidence: 99%