2019 Global IoT Summit (GIoTS) 2019
DOI: 10.1109/giots.2019.8766399
|View full text |Cite
|
Sign up to set email alerts
|

SEMIoTICS Architectural Framework: End-to-end Security, Connectivity and Interoperability for Industrial IoT

Abstract: Next generation networks, as the Internet of Things (IoT), aim to create open and global networks for connecting smart objects, network elements, applications, web services and end-users. Research and industry attempt to integrate this evolving technology and the exponential growth of IoT by overcoming significant hurdles such as dynamicity, scalability, heterogeneity and end-to-end security and privacy. Motivated by the above, SEMIoTICS proposes the development of a pattern-driven framework, built upon existi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…The architecture is implemented with three layers: field layer, orchestration layer, and application layer. The model is tested for the wind energy industry and e-Health supporting system for detecting local and global anomalies and reduced unnecessary traffic with quick and effective detection of abnormalities [68]. Arshad J et.al has proposed a framework for energy-constrained IoT devices with Signature-based Intrusion Detection (SID) techniques on the Contiki operating system.…”
Section: Other Solutionsmentioning
confidence: 99%
“…The architecture is implemented with three layers: field layer, orchestration layer, and application layer. The model is tested for the wind energy industry and e-Health supporting system for detecting local and global anomalies and reduced unnecessary traffic with quick and effective detection of abnormalities [68]. Arshad J et.al has proposed a framework for energy-constrained IoT devices with Signature-based Intrusion Detection (SID) techniques on the Contiki operating system.…”
Section: Other Solutionsmentioning
confidence: 99%
“…Although a number of IoT security solutions and a few lightweight security frameworks attempt to address many problems in the area of IoT security and privacy, such as Endto-End (E2E) security [22], [23], privacy preservation [24], [25], and blockchain-based security solutions 1 [26], [27], these questions remain unresolved. Consequently, the framework proposed in this paper seeks to provide answers to these important questions.…”
Section: Introductionmentioning
confidence: 99%
“…For instance: i) Authorization, Authentication, Data Privacy are quality aspects related to security. These quality aspects are described as solutions to access control and authentication to the system (Kolluru et al, 2018; XU; XU; LI, 2018; Delsing, 2017), end-to-end communication describing security protocols for communication (Polonia;Melgarejo;de Queiroz, 2015), meta-data for security semantic interoperability (Petroulakis et al, 2019), security IoT gateways for providing secure connectivity between devices (Condry; Nelson, 2016); ii) Availability is presented in some studies that describe solutions to increase the redundancy of devices and reduce failures with safety mechanisms to increase availability (IWANICKI, 2018), (Urbina et al, 2019); iii) Scalability is described in some studies that present solutions for reconfiguration of devices to increase the ability to change the production structure and increase the productivity, and scalability in the machine level that could be tailored according to manufacturing demands (Imtiaz; Jasperneite, 2013). These quality concerns have been the focus during the design of architectures, metamodels, and security mechanism for providing more reliable interoperability, but also have been considered big challenges as described in (IWANICKI, 2018; Sisinni et al, 2018; XU; XU; LI, 2018; Habib; Chimsom, 2019 ;Delsing, 2017;Schulte;Colombo, 2017).…”
Section: Synthesis Of Resultsmentioning
confidence: 99%
“…Architectural solutions for interoperability in Industry 4.0 must be first designed by identifying the main quality aspects that can interfere with the whole project. To support this identification, use case scenarios and specific requirements for Data Privacy: This often related to two main concerns: (i) an anonymous data process to ensure confidentiality of information through cryptography protection (PERALTA et al, 2019); and (ii) a data collection process to ensure data will be collected for authorized personnel only (Sisinni et al, 2018;Petroulakis et al, 2019;Polonia;Melgarejo;de Queiroz, 2015). Data privacy should obey legislative requirements to bring trustworthy interoperability in Industry 4.0, protecting and monitoring data, and avoiding that production process secrets are betrayed (Schulz, 2015;Fraile et al, 2018).…”
Section: Synthesis Of Resultsmentioning
confidence: 99%
See 1 more Smart Citation