2019
DOI: 10.1016/j.future.2018.11.008
|View full text |Cite
|
Sign up to set email alerts
|

Securing future decentralised industrial IoT infrastructures: Challenges and free open source solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 20 publications
0
14
0
Order By: Relevance
“…The security issues of ICS have been extensively studied. In [12], the authors presented some threats and secure methods for these infrastructures. In [13,14], the authors surveyed some researches on ICS and also presented some challenges that need to be addressed.…”
Section: Related Workmentioning
confidence: 99%
“…The security issues of ICS have been extensively studied. In [12], the authors presented some threats and secure methods for these infrastructures. In [13,14], the authors surveyed some researches on ICS and also presented some challenges that need to be addressed.…”
Section: Related Workmentioning
confidence: 99%
“…• Elevation of privilege (EoP) attacks: In EoP attacks, malicious users elevate their privileges or right in order to access resources without permission. Examples of EoP are User-To-Root (U2R) and Remote-to-Local (R2L) [11], [22].…”
Section: B Security Threats In Iotmentioning
confidence: 99%
“…There are several examples in the scientific literature of attempts to solve this problem. For instance, some important studies dealt with assembly line sequencing and the optimization of production scheduling in manufacturing processes by requiring set-ups (Kendrick et al 2017;Lou and Van Ryzin 1989;Minguillon and Lanza 2019;Plaga et al 2019;Rolf et al 2020;Sharifnia et al 1991;Fragapane et al 2020;Walker and Bright 2013). Other studies, however, have instead used heuristic methods for the scheduling of flexible flow-shop systems, aiming to find the overall optimum system through better utilization of resources (Paternina-Arboleda et al 2008).…”
Section: Introductionmentioning
confidence: 99%