2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT) 2019
DOI: 10.1109/metroi4.2019.8792884
|View full text |Cite
|
Sign up to set email alerts
|

Securing connection between IT and OT: the Fog Intrusion Detection System prospective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Because MQTT is a lightweight small-message protocol, it saves bandwidth and extends the battery life of the device. And since the MQTT client does not require a request update, the Publish / Subscribe architecture is more suited to the edge layer than the Request / Response architecture utilized in other protocols [18]. As a result, different threats such as DoS, brute force attacks, and others are launched against these types of packets, which may be detected by If the packet is normal, it will be directed to the MQTT broker.…”
Section: Securing Connection Between Edge Device and Iiot Machinesmentioning
confidence: 99%
“…Because MQTT is a lightweight small-message protocol, it saves bandwidth and extends the battery life of the device. And since the MQTT client does not require a request update, the Publish / Subscribe architecture is more suited to the edge layer than the Request / Response architecture utilized in other protocols [18]. As a result, different threats such as DoS, brute force attacks, and others are launched against these types of packets, which may be detected by If the packet is normal, it will be directed to the MQTT broker.…”
Section: Securing Connection Between Edge Device and Iiot Machinesmentioning
confidence: 99%
“…An example of this is the IDS proposed by Kim and Kang [189], which specifically targets the Modbus protocol, a widely used industrial control protocol, and a good example of an existing protocol severely lacking in security mechanisms. Similarly, the MQTT protocol has been covered like this [178]. A second reason can be found in providing protection against Denial of Service (DoS) attacks [115] and improving congestion control in general [187].…”
Section: G Security Monitoringmentioning
confidence: 99%
“…Aazam et al [50] especially discuss the specific requirements of CPPS, and how fog computing architectures can help to overcome their challenges, with a focus on communication, CPS control, (big) data analysis, and sensing. Colelli et al [51] show how fog resources can be used to improve security in OT and IT networks. Li et al [52] present an approach to make use of machine learning in the fog in order to improve machine maintenance.…”
Section: Fog Computing In Industrial Settingsmentioning
confidence: 99%