6,640 Hits in 4.4 sec

Increasing and Validating the Safety and Reliability of Cyber-Physical Systems

Johannes Pribyl, Willibald Krenn
2018 Zenodo  
4.0" and "Mobility of the Future" are on everybody's mind.  ...  In this way, they not only drive scientific progress in their field of study but also keep their eyes on the practical applicability of their solutions.  ...  autonomous industrial collaborative applications and autonomous vehicles come to mind. • With emerging trends such as Industry 4.0 or the Internet of Things, CPS are mostly integrated into some form of  ... 
doi:10.5281/zenodo.1486559 fatcat:fyx7wqtsina3nczj5ickbyj3jy

Verifying next generation electronic systems

Rolf Drechsler, Daniel Grose
2017 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS)  
The application domains of electronic systems range from consumer devices to safety-critical systems. Of course, for systems of the latter areas a thorough verification is required.  ...  However, due to increasing complexity, verification is still the major bottleneck. Hence, new approaches are required. In this paper the state-of-theart on verification is reported.  ...  However, formal verification is not always easy-to-use and complexity issues still limit its application.  ... 
doi:10.1109/ictus.2017.8285965 fatcat:ajyzto3v7vhqbnr2xmqakmmzb4

DESSERT 2020 Welcome Note

2020 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)  
and mixed reality for secure industrial and human applications Blockchain technology for critical and business domains Fintech, digital banking and cybersecurity Formal methods and assurance case-based  ...  This year DESSERT'2020 is addressing the main dependability challenges related to the IoT, Big Data and Artificial Intelligence for a Safe & Secure World and Industry 4.0.  ...  We thank our industrial and project partners, public organizations and media partners for comprehensive cooperation.  ... 
doi:10.1109/dessert50317.2020.9125044 fatcat:akxrzebwp5ffvllg5sfetqgkyq

Lessons Learned [chapter]

Ralf Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit Vogel-Heuser, Jan Keim, Lukas Märtin
2019 Managed Software Evolution  
Potentially wrong usage behaviour might transition into a pattern that is of interest and relevant for a new feature or functionality of an application.  ...  Likewise, it is important to distinguish tacit knowledge from any kind of noise effects. We learned that only a limited set of new features can be detected, while the quality  ...  Formal verification is not commonly applied in the industrial practice of software development for the automation domain.  ... 
doi:10.1007/978-3-030-13499-0_13 fatcat:2hqg6g3qazdcblioqmn5gklv4i

Formal verification of dynamic hybrid systems: a NuSMV-based model checking approach

Zhi Xu, Deming Zhong, Weigang Li, Hao Huang, And Yigang Sun, Kei Eguchi, Tong Chen
2018 ITM Web of Conferences  
Currently available security analysis methods for system risks have been limited, as they rely on manual inspections of the individual subsystems under simplifying assumptions.  ...  Software security is an important and challenging research topic in developing dynamic hybrid embedded software systems.  ...  Formal methods are an effective means of logical consistency verification of the system, which can ensure the adequacy of verification.  ... 
doi:10.1051/itmconf/20181703026 fatcat:dspndvnevve6rb5xkzzs2z6q4q

Internet of Things

Sebastian Steinhorst
2020 it - Information Technology  
Internet of Things (IoT), together with adjacent terms digitalization and Industry 4.0, is currently dominating discussions as much in industry as in academic research.  ...  From a testing and verification perspective, the possibilities of formal methods to verify component and system architectures have not been systematically exploited and are a major research opportunity  ...  Internet of Things (IoT), together with adjacent terms digitalization and Industry 4.0, is currently dominating discussions as much in industry as in academic research.  ... 
doi:10.1515/itit-2020-0047 fatcat:ztbq7sypq5gczgso4xrwn6gdzq

Industry 4.0 – Challenges in Anti-Counterfeiting [chapter]

Christian Thiel, Christoph Thiel
2015 ISSE 2015  
The Vision of a 4th Industrial Revolution [acatech, 2013] Definition: Industry 4.0 • The term »Industry 4.0« describes the expected digitalization of industrial value chains. • Industry 4.0 describes  ...  Unfortunately the security applications required in open networks work often at the expense of realtime capability.  ... 
doi:10.1007/978-3-658-10934-9_10 dblp:conf/isse/ThielT15 fatcat:rkxt43fdlrhbxkxq2ifejbz2wm

An Efficient Web Authentication Mechanism Preventing Man-In-The-Middle Attacks in Industry 4.0 Supply Chain

Alireza Esfahani, Georgios Mantas, Jose Ribeiro, Joaquim Bastos, Shahid Mumtaz, Manuel A. Violas, A. Manuel De Oliveira Duarte, Jonathan Rodriguez
2019 IEEE Access  
Consequently, secure data communications across the partners in the Industry 4.0 Supply Chain are of utmost importance.  ...  However, data communication across the partners in the Industry 4.0 supply chain can be the target of a wide spectrum of attackers exploiting security breaches in the internal/external environment of the  ...  Industry 4.0 Supply Chain raises many security challenges that should be addressed effectively and efficiently before the next generation of the Supply Chain reaches its full potential in Industry 4.0  ... 
doi:10.1109/access.2019.2914454 fatcat:szogrq4dn5gaxouqjgveefmqqq

Security in Wireless Sensor Networks: A formal verification of protocols

Giann Spilere Nandi, David Pereira, Martin Vigil, Ricardo Moraes, Analucia Schiaffino Morales, Gustavo Araujo
2019 2019 IEEE 17th International Conference on Industrial Informatics (INDIN)  
In this paper we formally verify, using ProVerif, three cryptographic protocols used in WSN, regarding the security properties of secrecy and authenticity.  ...  The increase of the digitalization takingplace in various industrial domains is leading developerstowards the design and implementation of moreand more complex networked control systems (NCS)supported  ...  The application of these paradigms leads to the definition of the so-called Industry 4.0 concept, making it possible to create intelligent products, intelligent production and intelligent services [1]  ... 
doi:10.1109/indin41052.2019.8972080 dblp:conf/indin/NandiPVMMA19 fatcat:km6746ueuvesrcco6lerv2geta

Table of Contents

2019 IEEE Industrial Electronics Magazine  
IEM will be limited to the scope of the IES, which is given as theory and applications of electronics, controls, communications, instrumentation, and computational intelligence to industrial and manufacturing  ...  tutorial surveys in the field of interest to the membership of the IEEE Industrial Electronics Society (IEEE/IES).  ... 
doi:10.1109/mie.2019.2893514 fatcat:urwom3hrtzaq3gshghq3u3yus4

Security Analysis for Distributed IoT-Based Industrial Automation [article]

Vuk Lesi, Zivana Jakovljevic, Miroslav Pajic
2020 arXiv   pre-print
Despite industry-wide use of programming languages based on the CIPN formalism, formal verification of such control applications in the presence of adversarial activity is not supported.  ...  Consequently, in this paper we focus on security-aware modeling and verification challenges for CIPN-based sequential control applications.  ...  It was also partially supported by Serbian Ministry of Education, Science and Technological Development, research grants TR35004 and TR35020.  ... 
arXiv:2006.00044v1 fatcat:bhrkqyau75eldjrn27klehepca

Towards Formal Verification of Cyber Security Standards
К формальной верификации стандартов кибербезопасности

T. Kulik, Aarhus University, Aarhus, Denmark, P.G. Larsen, Aarhus University, Aarhus, Denmark
2018 Proceedings of the Institute for System Programming of RAS  
Cyber security standard compliance is also only validated and not formally verified, often not providing strong proofs of correct use of cyber security standard.  ...  Cyber security standards are often used to ensure the security of industrial control systems. Nowadays, these systems are becoming more decentralized, making them more vulnerable to cyber attacks.  ...  Acknowledgments This work is partially supported by the Manufacturing Academy of Denmark (MADE) Digital project. For more information see  ... 
doi:10.15514/ispras-2018-30(4)-5 fatcat:fgkhag44xncnhf44sephcgmfy4

Industrial Cyber–Physical Systems [Scanning the Issue]

Armando W. Colombo, Stamatis Karnouskos, Yang Shi, Shen Yin, Okyay Kaynak
2016 Proceedings of the IEEE  
In the first paper, titled "Formal verification of fault-tolerant startup algorithms for time-triggered architectures: A survey," Saha et al. survey various formal verification efforts for checking the  ...  processes of Industrie 4.0.  ... 
doi:10.1109/jproc.2016.2548318 fatcat:vdcoursj4rfapi77mcbmvmxaa4

Systematic Mapping Study on Verification and Validation of Industrial Third-party Iot Applications

Ivan Tritchkov, Siemens Corporate Technology
2017 Advances in Cyber-Physical Systems  
This paper presents the results of a systematic mapping study carried out in the area of verification and validation of industrial IoT third-party applications.  ...  The next industrial revolution commonly known as Industry 4.0 represents the idea of interconnected manufacturing, where intelligent devices, systems and processes exchange information, resources and artifacts  ...  This witnesses the importance of the security topic on industrial ecosystems and industrial third-party applications.  ... 
doi:10.23939/acps2020.01.030 fatcat:5jvfpd4wxjckbjadyzbw43osge

A Taxonomy Study on Securing Blockchain-based Industrial Applications: An Overview, Application Perspectives, Requirements, Attacks, Countermeasures, and Open Issues [article]

Khizar Hameed, Mutaz Barika, Saurabh Garg, Muhammad Bilal Amin, Byeong Kang
2021 arXiv   pre-print
This study presents a state-of-the-art survey of Blockchain-based Industry 4.0 applications, focusing on crucial application and security and privacy requirements, as well as corresponding attacks on Blockchain  ...  application, security and privacy challenges, and requirements of Blockchain-based industrial applications, along with possible security threats and countermeasures.  ...  From this Industry 4.0 example, we draw two requirement perspectives for the design of secure Blockchain-based Industry 4.0 applications, including application and security.  ... 
arXiv:2105.11665v1 fatcat:bsm7w2shjneajp425oddszr6ju
« Previous Showing results 1 — 15 out of 6,640 results