2021
DOI: 10.1109/access.2021.3104649
|View full text |Cite
|
Sign up to set email alerts
|

Toward an Ideal Access Control Strategy for Industry 4.0 Manufacturing Systems

Abstract: Industrial control systems control and supervise our most important and critical infrastructures, such as power utilities, clean water plants and nuclear plants, as well as the manufacturing industries at the base of our economy. These systems are currently undergoing a transformation driven by the Industry 4.0 evolution, characterized by increased connectivity and flexibility. Consequently, the cybersecurity threat landscape for industrial control systems is evolving as well. Current strategies used for acces… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 34 publications
0
7
0
Order By: Relevance
“…Privilege escalation attack or elevation of privilege is an attack that exploits a bug in the application software, or operating system to access protected resources. The effect of this action is that unauthorized attackers can access and modify an application with more privileges than system administrator, or application developer can do [41], [42].…”
Section: Access Controlmentioning
confidence: 99%
“…Privilege escalation attack or elevation of privilege is an attack that exploits a bug in the application software, or operating system to access protected resources. The effect of this action is that unauthorized attackers can access and modify an application with more privileges than system administrator, or application developer can do [41], [42].…”
Section: Access Controlmentioning
confidence: 99%
“…The necessity of cybersecurity continues to expand as the number of people, devices and programs in the modern company grow, along with the rising deluge of data, most of which is sensitive or confidential. The problem is exacerbated by the increasing number and sophistication of cyber attackers and attack strategies (Buldakova, 2020; Leander et al , 2021). The necessity of cybersecurity continues to expand as the number of people, devices and programs in the modern company grow, along with the rising deluge of data, most of which is sensitive or confidential.…”
Section: What Is Cybersecurity?mentioning
confidence: 99%
“…With the advancement of information and communication technology, efforts to actively establish a smart work environment in various domestic industries, such as the hospitality industry, have increased, and these systems contribute to energy conservation through various effective programs to achieve optimal system performance and aid in the process of operation and maintenance (Leander et al, 2021;Abdel-Karim, 2021).…”
Section: Smart Services Formsmentioning
confidence: 99%
“…Access control and control systems such as fingerprint systems, eye retardation, and face pattern are used to determine entry to the building and internal spaces (Abdelmoaty & Soliman, 2020). It also provides flexibility and ease of management of the spaces via the access control points (Leander et al, 2021). Identity verification systems, such as passwords or magnetic cards, are used to determine whether a person has access to a location, and it also allows for video recording (Abdelmoaty & Soliman, 2020).…”
Section: Access Control and Control Systemsmentioning
confidence: 99%