The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.1007/978-3-030-00024-0_11
|View full text |Cite
|
Sign up to set email alerts
|

Secure Interconnection of IT-OT Networks in Industry 4.0

Abstract: Increasingly, the society is witnessing how today's industry is adapting the new technologies and communication protocols to offer more optimal and reliable services to end-users, with support for inter-domain communication belonging to diverse critical infrastructures. As a consequence of this technological revolution, interconnection mechanisms are required to offer transparency in the connections and protection in the different application domains, without this implying a significant degradation of the cont… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 54 publications
(85 reference statements)
0
5
0
Order By: Relevance
“…As pointed out above, one important trend in the Industrial IoT is the convergence of OT & IT. Fog computing has been named as an architectural means to achieve this convergence [3,86]. More concretely, Müller et al [38,62] present a reference model for a seamless runtime environment for industrial software, which can thus be deployed in both the fog and the cloud.…”
Section: Fog Computing In Industrial Settingsmentioning
confidence: 99%
“…As pointed out above, one important trend in the Industrial IoT is the convergence of OT & IT. Fog computing has been named as an architectural means to achieve this convergence [3,86]. More concretely, Müller et al [38,62] present a reference model for a seamless runtime environment for industrial software, which can thus be deployed in both the fog and the cloud.…”
Section: Fog Computing In Industrial Settingsmentioning
confidence: 99%
“…• Authorization, which is the verification that an entity is permitted to carry out certain operations or access certain data [36]; • Non-repudiation, which means that the sender of a transmission should not be able to credibly deny having sent it; • The protection of data in storage from unauthorized access or modification; • Availability, which is the guarantee that the services and resources of a system are always accessible, including protection against denial-of-service attacks; • Intrusion detection, which is the ability to detect ongoing attacks [9]; • Post-incident management, which is the ability to recover from an attack and to mitigate the damage done [9]; • Accountability, which is the ability to pinpoint the source of unauthorized behaviour.…”
Section: Cryptography For It/ot Links In Iiot a Security Challenges For Iiot Interconnectionmentioning
confidence: 99%
“…Such issues have already been highlighted and addressed in several works in literature, e.g. [13,14,15], all of which can provide relevant inputs to OAuth-based systems to control access according to the type of context the system operates within. Some of these works use formal approaches in defining and verifying such interoperability, e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Dependability properties (including reliability and robustness), for which formal specification and analysis techniques allow their establishment, have been highlighted as one of the control and automation requirements for such gateway-based systems. Furthermore, in [15], a reference architecture for Industry 4.0 systems was proposed that establishes interoperability in a secure manner using Policy Decision Points (PDPs), which allow various access control measures, e.g. RBAC [17,18] to be deployed when components in a critical system need to coordinate and constrain access to their resources.…”
Section: Related Workmentioning
confidence: 99%