Proceedings of the 52nd Annual Design Automation Conference 2015
DOI: 10.1145/2744769.2747942
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy challenges in industrial internet of things

Abstract: Today, embedded, mobile, and cyberphysical systems are ubiquitous and used in many applications, from industrial control systems, modern vehicles, to critical infrastructure. Current trends and initiatives, such as Industrie 4.0 and Internet of Things (IoT), promise innovative business models and novel user experiences through strong connectivity and effective use of next generation of embedded devices. These systems generate, process, and exchange vast amounts of security-critical and privacy-sensitive data, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
330
1
6

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 666 publications
(339 citation statements)
references
References 56 publications
2
330
1
6
Order By: Relevance
“…Critical concerns about the security in manufacturing processes have been addressed in the literature [3,5]. Physical context information from industrial processes environment can improve products identification and authentication.…”
Section: Manufacturing Industrymentioning
confidence: 99%
See 2 more Smart Citations
“…Critical concerns about the security in manufacturing processes have been addressed in the literature [3,5]. Physical context information from industrial processes environment can improve products identification and authentication.…”
Section: Manufacturing Industrymentioning
confidence: 99%
“…Although it is a widely discussed and studied topic, authentication remains a crucial security issue [1][2][3][4]. Nowadays, technologies such as sensor networks, smart systems, cyberphysical systems (CPS), and Internet of Things (IoT) depend on small building blocks like sensors, actuators, measuring instruments, and smart devices.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Any malfunctioning of these systems, e.g. as a result of denial-of-service attacks, will directly incur loss of productivity and loss of revenue (Sadeghi et al 2015). A maximum level of security is therefore preferred, often by physically isolating security-critical systems and "core processes" from the rest of the enterprise.…”
Section: Don't Mess With My Core Processmentioning
confidence: 99%
“…This is especially critical in scenarios where devices are expected to be inexpensive, as it usually happens with many IoT deployments. Furthermore, there are settings where the hardware is already given "at it is", such us in industrial environments [21], vehicular systems, and home automation projects [26], to name a few.…”
Section: Introductionmentioning
confidence: 99%