Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems
Autor:
Pan, Yao
; White, Jules
; Schmidt, Douglas
; Elhabashy, Ahmad
; Sturm, Logan
; Camelio, Jaime
; Williams, Christopher
Fecha:
03/2017Palabra clave:
Revista / editorial:
International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI)Tipo de Ítem:
articleDirección web:
https://ijimai.org/journal/bibcite/reference/2566Resumen:
The Internet of Things (IoT) has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development- cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures.
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(es)
Estadísticas de uso
Año |
2012 |
2013 |
2014 |
2015 |
2016 |
2017 |
2018 |
2019 |
2020 |
2021 |
2022 |
2023 |
2024 |
Vistas |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
118 |
229 |
250 |
95 |
Descargas |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
96 |
195 |
215 |
86 |
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
Fast hybrid-MixNet for security and privacy using NTRU algorithm
Ahmad, Khaleel; Kamal, Afsar; Bin Ahmad, Khairol Amali; Khari, Manju; González-Crespo, Rubén (Journal of information security and applications, 2021)Security and privacy-enhancing techniques are developed in order to provide strong protection over the Internet. These techniques aim to enable the users to keep their identities secret during the communication when they ... -
Business Process Re-engineering in Saudi Arabia: A Survey of Understanding and Attitudes
Rahali, Essam; Chaczko, Zenon; Agbinya, Johnson; Chiu, Christopher (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2009)This survey was conducted in the Kingdom of Saudi Arabia (KSA) to investigate the level of awareness of BPR. Respondents (customers, employees, and Managers) had different educational backgrounds and were from private and ... -
El otro como punto de referencia para la educación en Europa
Wulf, Christoph (Revista Española de Pedagogía, 31/01/2002)En Europa la educación se tiene que convertir en una responsabilidad intercultural que considere las similitudes y diferencias entre las diferentes culturas. Cada cultura es una diversidad profunda. Por eso es importante ...