Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2017
DOI: 10.1108/imds-10-2016-0419
|View full text |Cite
|
Sign up to set email alerts
|

Trustworthy data-driven networked production for customer-centric plants

Abstract: Purpose: Industry 4.0 envisions a future of networked production where interconnected machines and busi-5 ness processes running in the cloud will communicate with one another to optimize production and enable more efficient and sustainable individualized/mass manufacturing. However, the openness and process transparency of networked production in hyperconnected manufacturing enterprises pose severe cyber-security threats and information security challenges that need to be dealt with. 10Design/methodology/appr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
21
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(26 citation statements)
references
References 28 publications
(33 reference statements)
2
21
0
Order By: Relevance
“…Woodside et al [103] point out that Blockchain technology can foster the protection of a supply chain from most malicious attacks. Moreover, Preuveneers et al [104] confirm the usefulness of the Blockchain protocol to secure an IoT network by enabling communication between trustworthy nodes while eschewing malicious nodes. Blockchain technology can restrict the access of some selected devices and minimize the possibilities of unauthorized access.…”
Section: Securitymentioning
confidence: 96%
“…Woodside et al [103] point out that Blockchain technology can foster the protection of a supply chain from most malicious attacks. Moreover, Preuveneers et al [104] confirm the usefulness of the Blockchain protocol to secure an IoT network by enabling communication between trustworthy nodes while eschewing malicious nodes. Blockchain technology can restrict the access of some selected devices and minimize the possibilities of unauthorized access.…”
Section: Securitymentioning
confidence: 96%
“…The excitement and interest regarding Industry 4.0 and its declaration as the next industrial revolution are very much based on a vision of the potential that it holds. According to Preuveneers et al [23], Industry 4.0 proposes a future form of production where machines are networked and communicate with business processes to enable efficient and sustainable manufacturing. A key component of this proposed future appears to be the role of CPS.…”
Section: The Promise and Potential Of Industry 40mentioning
confidence: 99%
“…For example, China introduced the "Basic Security Requirements for Government Department Cloud Computing Service Providers" as the security standard for providing cloud computing services to public agencies. Essentially, many of the information systems, data management, and authorization were not designed with open and collaborative networks, thereby making them more vulnerable to cyber-attacks [23]. Hence, organizations need to develop security strategies and systems geared to cybersecurity which increase protection from attack across the business value chain [18].…”
Section: E Technology Readiness and Industry 40 Implementationmentioning
confidence: 99%
“…Safety and Security (a, b). This barrier accounts for the firms' lack of internal capabilities to guarantee the security of data exchange and storage in such a hyper-connected manufacturing environment (a) (Preuveneers et al 2017;Strozzi et al 2017). In addition, this barrier includes the safety of the personnel operating at close contact with autonomous machines (b) (Liao et al 2017).…”
Section: Internal Barriersmentioning
confidence: 99%