A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions
2020
Electronics
This encompasses an assessment of the cyber risks and opportunities for research in the field, including consideration of connectivity, sensing and convergence of systems. ...
The technologies that underpin supply chain 4.0 include blockchain, smart contracts, applications of Artificial Intelligence, cyber-physical systems, Internet of Things and Industrial Internet of Things ...
The Commonwealth of Australia will not be legally responsible in contract, tort or otherwise for any statement made in this publication. ...
doi:10.3390/electronics9111864
fatcat:h54irum3krb77gsj4x76w2mabm
Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges
2020
IEEE Access
This paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. ...
In addition, we analyze the privacy-oriented blockchain-based solutions as well as consensus algorithms for IoT applications and how they will be adapted for green IoT-based agriculture. ...
His research interests include wireless network security, network coding security, and applied cryptography. ...
doi:10.1109/access.2020.2973178
fatcat:dbejlu2lgnf43l2dxg4mrxu6xi
A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges
2021
IEEE Access
in anomaly detection for SCADA system [46] . ...
MACHINE LEARNING-BASED SOLUTIONS The complex nature of cyber-attack needs an efficient and adaptive method for intrusion detection. ...
He has many publications in well renowned International journals and Conferences. ...
doi:10.1109/access.2021.3057766
fatcat:adrf6tuayfagjnwfztzkozf64y
Scada systems in the cloud and fog environments: Migration scenarios and security issues
2019
Facta universitatis - series Electronics and Energetics
This paper addresses scenarios and security issues when migrating SCADA systems to cloud and fog environments. ...
Benefits of cloud-based SCADA systems mainly refer to improving economic efficiency. We further address migration risks, with regards to quality of service and cyber security. ...
Acknowledgement: The paper is a part of the research funded by the Ministry of Education, Science and Technological Development of Serbia, within the projects TR 32025 and TR 36002. ...
doi:10.2298/fuee1903345s
fatcat:5vp23xztkvb6nl6u7hmipqigdi
Cybersecurity for Industrial Control Systems: A Survey
[article]
2020
arXiv
pre-print
Then we discuss the major works, from industry and academia towards the development of the secure ICSs, especially applicability of the machine learning techniques for the ICS cyber-security. ...
Industrial Control System (ICS) is a general term that includes supervisory control & data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as ...
big data analytics in the smart grids [15] Cryptography based solutions to protect the SCADA protocols and communications [19] A cloud-based cyber-physical industrial control system [25] Implemented ...
arXiv:2002.04124v1
fatcat:xh464lhc6vgepmaow7x2crewby
IoT-enabled Smart Energy Grid: Applications and Challenges
2021
IEEE Access
[15]
Survey
No
Yes Yes No Yes Yes Yes No Yes This paper presents a comprehensive survey of existing cybersecurity
solutions for fog-based smart grid SCADA systems. ...
The fog-based smart energy grid SCADA system comprises of four major part [15] In the IoT-enabled SCADA system, fog or edge computing devices are comprised of various network devices such as access point ...
doi:10.1109/access.2021.3067331
fatcat:kfwpgepvqfd2xgat5r3rrp75yy
INDUSTRIAL INTERNET OF THINGS VULNERABILITIES AND THREATS: WHAT STAKEHOLDERS NEED TO CONSIDER
2019
Issues in Information Systems
While the introduction of these Internet-enabled devices creates new efficiencies, improves performance, increases productivity, and increases profitability, it also introduces new security challenges ...
The purpose of this article is to identify for IIoT stakeholders some of the vulnerabilities and threats associated with various layers and functions of an IIoT architecture and illuminate the need for ...
SCADA systems contained within such IIoT systems as train control ("Smart Train") or electric power distribution ("Smart Grid") contain lower-layer sub-controllers called programmable logic controllers ...
doi:10.48009/1_iis_2019_119-133
fatcat:6beomruswrf3thwzbvrkb7cxny
Fog Computing: Platform and Applications
2015
2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb)
We also analyzed the goals and challenges in fog computing platform, and presented platform design with several exemplar applications. ...
We finally implemented and evaluated a prototype fog computing platform. 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies 978-1-4673-9688-2/15 $31.00 ...
With fog computing, the smart grid will turn into a multitier hierarchical system with the interplay between the fog and SCADA [2] , [27] . ...
doi:10.1109/hotweb.2015.22
dblp:conf/hotweb/YiHQL15
fatcat:gg32jhoj5jamldexq6jebavyq4
Fog Computing in IoT Aided Smart Grid Transition- Requirements, Prospects, Status Quos and Challenges
[article]
2018
arXiv
pre-print
Intelligent Transportation and Information Technology contemporary Smart Grid (SG) systems are leveraged with smart devices and entities. ...
Correspondingly, we also highlight the challenges and research thrusts elucidated towards the viability of fog computing for successful SG Transition. ...
Fog enables data analytics at the network edge and can support time-sensitive functions for SG like cyber-physical systems. ...
arXiv:1802.01818v1
fatcat:3zzefjxcqng35kguhzuocy5hsq
Medical Cyber Physical Systems and Its Issues
2019
Procedia Computer Science
These cyber infrastructures face several serious concerns privacy, trust, security, etc. ...
In e-healthcare, these devices built the structure of Medical Cyber Physical System (MCPS). ...
SMART GRID [20 ] They are susceptible to privacy and security issues. There is an increasing concern over the privacy issues I n this system. ...
doi:10.1016/j.procs.2020.01.059
fatcat:ldougyplanh6znw5hk3bslc4ze
Investigation of Cyber-Attack Methods and Measures in Smart Grids
2021
Sakarya University Journal of Science
The studies on security in smart grids in the last 10 years have been examined and presented in a table. ...
In addition, the measures that can be taken against cyber-attacks are analyzed in detail. In addition, in this article, studies on security problems in smart grids are examined and evaluated. ...
Figure 3 3 Figure 3 Cyber events that took place in October-2020 [11]
Ferrag et al. base on available smart grid fog SCADA systems to provide a comprehensive overview of cybersecurity solutions [72] ...
doi:10.16984/saufenbilder.955914
fatcat:kjbuxja23zganodpk2ofuuzvpu
A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks, Detection, Countermeasure Techniques, and Future Directions
[article]
2022
arXiv
pre-print
One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. ...
In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication ...
However, prior studies have shown a constrained role in evaluating cyber-security solutions for smart grid networks. ...
arXiv:2207.07738v1
fatcat:px2nhhvasngvfiuoe4ncty2eu4
Cyber–Physical Systems Forensics: Today and Tomorrow
2020
Journal of Sensor and Actuator Networks
This discussion aims to create a starting point for researchers where they can identify the gaps and challenges and create suitable solutions through their research in CPS forensics. ...
Cyber–Physical Systems (CPS) connect the physical world (systems, environments, and humans) with the cyber world (software, data, etc.) to intelligently enhance the operational environment they serve. ...
In the smart manufacturing CPS, fog nodes can be the points of control and decision making based on the data collected locally in the area. ...
doi:10.3390/jsan9030037
fatcat:aoxjnewcmvbvvb6tw563ififry
IEEE Access Special Section Editorial: Cloud-Fog-Edge Computing in Cyber–Physical–Social Systems (CPSS)
2020
IEEE Access
Open issues and challenges for AI-based SC are analyzed. ...
His expertise is in the areas of system performance (e.g., Web servers, P2P, and Cloud) and system security (e.g., SCADA systems). ...
doi:10.1109/access.2020.3042584
fatcat:zwqibk22qzh7nedoz7b5dlbimu
Cybersecurity of Industrial Cyber-Physical Systems: A Review
2022
ACM Computing Surveys
Industrial cyber-physical systems (ICPSs) manage critical infrastructures by controlling the processes based on the "physics" data gathered by edge sensor networks. ...
In particular, multi-dimensional adaptive attack taxonomy is presented and utilized for evaluating real-life ICPS cyber incidents. ...
ACKNOWLEDGMENTS This work is partially supported by EPSRC PETRAS (EP/S035362/1) and GCHQ National Resilience Fellowship. ...
doi:10.1145/3510410
fatcat:fa73nli6zzfxjkedcosbj3j4li
« Previous
Showing results 1 — 15 out of 224 results