Security Issues and Privacy Concerns in Industry 4.0 Applications

Здесь есть возможность читать онлайн «Security Issues and Privacy Concerns in Industry 4.0 Applications» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Security Issues and Privacy Concerns in Industry 4.0 Applications: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Security Issues and Privacy Concerns in Industry 4.0 Applications»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

The scope of
is to envision the need for security in Industry 4.0 applications and the research opportunities for the future. This book discusses the security issues in the Industry 4.0 applications for research development. It will also enable the reader to develop solutions for the security threats and attacks that prevail in the industry. The chapters will be framed on par with advancements in the industry in the area of Industry 4.0 with its applications in additive manufacturing, cloud computing, IoT (Internet of Things), and many others. This book helps a researcher and an industrial specialist to reflect on the latest trend and the need for technological change in Industry 4.0.
Smart water management using IoT, cloud security issues with network forensics, regional language recognition for industry 4.0, IoT based health care management system, artificial intelligence for fake profile detection, and packet drop detection in agriculture-based IoT are covered in this outstanding new volume. Leading innovations such as smart drone for railway track cleaning, everyday life-supporting blockchain and big data, effective prediction using machine learning, classification of the dog breed based on CNN, load balancing using the SPE approach and cyber culture impact on media consumers are also addressed.
Whether a reference for the veteran engineer or an introduction to the technologies covered in the book for the student, this is a must-have for any library.

Security Issues and Privacy Concerns in Industry 4.0 Applications — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Security Issues and Privacy Concerns in Industry 4.0 Applications», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Keywords: Network forensic, digital forensics, cloud forensics, cloud computing services, M2M communication application, fourth industrial revolution, impact and issues in Industry 4.0 cloud application

2.1 Introduction

Nowadays, several organizations use cloud resources offered by a cloud service provider as an external IT-infrastructure for their organization. Cloud computing has emerged as a highly powerful and most popular field over the past few years, the significant aspect of which is getting more focus on virtual crime and cyber-threat activities that are IT-based services [1]. As a result, digital forensics has gained increasing importance as a cloud investigation technology. Cloud computing security imposes several new challenges in between M2M communication technology [2, 3]. In this chapter, we address critical cloud security issues, network forensics investigation challenges, machine communication interruption, and the impact on industry 4.0 application.

2.1.1 Network Forensics

Network forensics (NF) is a crucial sub-branch of digital forensics (DF), itself a branch of forensics science, in which experts and law enforcement capture, record and analyze network events, and discover the source of attacks and cyber incidents [4] that enhance security in the cyber environment. Simson Garfinkel writes, “network forensics systems can be one of two kinds either catch-it-as-you-can or stop, look and listen to system” [5]. Catch-it-as-you-can is a network approach in which packages pass through a certain traffic point, catch packages, and subsequently store analysis in batch mode. The approach requires a huge amount of memory storage that usually involves a Redundant Array of Inexpensive Disks or Redundant Array of Independent Disks (RAID) system. On the other side, Stop, Look, and Listen is a network approach in which individual package analysis is carried out in an initial way; only certain information stores in the memory for future analysis. Undoubtedly, this type of method used less memory storage but needs more processing power to tackle the incoming traffic on the network environment.

In computer forensics, data is more often seized in disk storage, which makes it easier to obtain; unlike DF, NF is more difficult to carry out data while it is transmitted across the network and then lost in a short time [6]. Anyone planning to apply NF tools for analysis data needs to know about the privacy laws; privacy and data protection laws restrict active tracking as well as analysis of network traffic without explicit permission. In the network and IT infrastructure, NF is used in a proactive fashion to dig out flaws; however, the scope includes shoring up defenses by the officers of information security and IT administrators against future cyber-attacks.

2.1.2 The Fourth Industrial Revolution

The digital transformation of production, manufacturing, and several other related industries that value process creation have led to the fourth industrial revolution [9], is a new phase in the organization and control of chain value interchangeably [7]. Industry 4.0 is concerned with those areas that are not usually classified such as smart cities where industry applications cannot perform their own rights [8]. In the first industrial revolution, the advent of mechanization, water, and steam power made a huge and positive impact on the traditional industry. In short, the first revolution boosted industrial production; the second industrial revolution revolved around using electricity, mass production, and assembly lines. Industry 3.0 was the revolution of electronics, IT systems, and automation at the industrial level that led to Industry 4.0, which is [10] associated with the cyber-physical system.

The Industry 4.0 briefly elaborates the automation growth trend and data exchange in industrial technology as well as processes within the manufacturing industry, such as Artificial Intelligence (AI), Cloud Computing (CC), the Internet of Things (IoT), the Industrial Internet of Things (IIoT), Cyber-Physical Systems (CPS), Cognitive Computing, Smart Manufacture (SM), and Smart Factories (SF). The mentioned automation creates individual manufacturing systems; the machines in industries are augmented with multiple sensors and network connectivity to monitor an entire process of the production and make decisions autonomously [12]. However, augmentation of machines and wireless connectivity can highly advance industrial and manufacturing systems, create robust response times, and allow for a near real-time machine-to-machine communication. Nevertheless, the revolution relates to the digital twin technologies; these technologies make real-world virtual versions of installations, processes, and real-time applications that can enhance testing to make cost-effective decentralized decisions.

The virtual copies allowing the cyber-physical machine to communicate with each other also create a real-time data exchange for human staff and automation interconnectivity between transparent information, processes, and technical assistance for industry 4.0 manufacturing [11]. Industry 4.0 demonstrates the business models, for example, offline programming for arc welding, take adoptive controls, and the overall processes of product design architecture and automotive industry 4.0 businesses implementation as well as a variety of smart factories all around the world.

2.1.2.1 Machine-to-Machine (M2M) Communication

A new concept evolved in Industry 4.0: machine-to-machine (M2M) communication, which is becoming an increasingly important technology in the entire domain. M2M refers to the concept where two devices exchange information with each other, such as sending and receiving data. The communication that occurs between devices is autonomous; no human intervention is required for the overall process of exchanging information. The wireless connectivity [13] between interrelated devices automatically exchanges and analyzes data in the cloud. The Internet of Things (IoT) enabled integrating several M2M systems and cloud computing that process all data by using the cloud web platform.

This chapter highlights the distinct types of connectivity used between machines for communication. The most used connectivity [16] is: (i) Radiofrequency identification (RFID), which has a maximum range up to 10 meters that indicate the limitation of this type of connectivity; (ii) Bluetooth and Wireless-Fidelity (Wi-Fi), the most useable and reliable wireless connectivity for communication, with the range limitation from 10-20 meters in the case of Bluetooth and approximately 50 meters in the case of Wi-Fi; and (iii) low-frequency connectivity [15], which has a range of up to 1000 kilometers, such as GSM network and satellite.

In general, the applications and the area of M2M connectivity that can be applied and used widely most probably apply to all domains. Likewise, it is successfully utilized in the artificial intelligence industry [14], allowing devices to communicate with each other and make autonomous decisions. Some established and used crucial industrial M2M applications that enhance the productions in the manufacturing industry are: (i) intelligent stock control, (ii) data collection for processing, (iii) just-in-time implementation, (iv) automated maintenance, and many more.

2.1.3 Cloud Computing

The National Institute of Standard and Technology (NIST) defines cloud computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources” [17]. Cloud computing is considered as a new business model throughout the world, computing as a utility [18]; there are five essential characteristics of the cloud: (i) on-demand self-service, (ii) resource pooling, (iii) rapid expansion, (iv) broad network access, and (v) measured service. Furthermore, cloud computing has three service models [19] for cloud users, such as software, platform, and infrastructure. In the same manner, Forensics-as-a-Service is the emerging technology in the area of cloud computing that facilitates investigators to perform digital crime investigation tasks utilizing the services of the cloud. Cloud categorizes four distinct deployment models, public, private, commercial, and hybrid models, a proper way to deliver cloud services to cloud users. In cloud computing, this is intended to serve as a way of making broad comparisons of cloud deployment strategies, services models, and describing the actual baseline [20], for using cloud computing in the best manner.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Security Issues and Privacy Concerns in Industry 4.0 Applications»

Представляем Вашему вниманию похожие книги на «Security Issues and Privacy Concerns in Industry 4.0 Applications» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Security Issues and Privacy Concerns in Industry 4.0 Applications»

Обсуждение, отзывы о книге «Security Issues and Privacy Concerns in Industry 4.0 Applications» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x