Skip to main content
Top

2019 | OriginalPaper | Chapter

Secure Interconnection of IT-OT Networks in Industry 4.0

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Increasingly, the society is witnessing how today’s industry is adapting the new technologies and communication protocols to offer more optimal and reliable services to end-users, with support for inter-domain communication belonging to diverse critical infrastructures. As a consequence of this technological revolution, interconnection mechanisms are required to offer transparency in the connections and protection in the different application domains, without this implying a significant degradation of the control requirements. Therefore, this book chapter presents a reference architecture for Industry 4.0 where the interconnection core is mainly concentrated in the Policy Decision Points (PDP), which can be deployed in high volume data processing and storage technologies such as cloud and fog servers. Each PDP authorizes actions in the field/plant according to a set of factors (entities, context and risks) computed through the existing access control measures, such as RBAC+ABAC+Risk-BAC (Role/Attribute/Risk-Based Access Control, respectively), to establish coordinated and constrained accesses in extreme situations. Part of these actions also includes proactive risk assessment measures to respond to anomalies or intrusive threats in time.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutorials 17(4):2347–2376CrossRef Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutorials 17(4):2347–2376CrossRef
2.
go back to reference Alcaraz C (2017) Resilient industrial control systems based on multiple redundancy. Int J Crit Infrastruct (IJCIS) 13(2/3):278–295CrossRef Alcaraz C (2017) Resilient industrial control systems based on multiple redundancy. Int J Crit Infrastruct (IJCIS) 13(2/3):278–295CrossRef
3.
go back to reference Alcaraz C (2018) Cloud-assisted dynamic resilience for cyber-physical control systems. IEEE Wirel Commun 25(1):76–82CrossRef Alcaraz C (2018) Cloud-assisted dynamic resilience for cyber-physical control systems. IEEE Wirel Commun 25(1):76–82CrossRef
4.
go back to reference Alcaraz C, Cazorla L, Fernandez G (2015) Context-awareness using anomaly-based detectors for smart grid domains. In: 9th International Conference on Risks and Security of Internet and Systems, vol 8924. Springer, Trento, pp 17–34 Alcaraz C, Cazorla L, Fernandez G (2015) Context-awareness using anomaly-based detectors for smart grid domains. In: 9th International Conference on Risks and Security of Internet and Systems, vol 8924. Springer, Trento, pp 17–34
5.
go back to reference Alcaraz C, Fernandez-Gago C, Lopez J (2011) An early warning system based on reputation for energy control systems. IEEE Trans Smart Grid 2(4):827–834CrossRef Alcaraz C, Fernandez-Gago C, Lopez J (2011) An early warning system based on reputation for energy control systems. IEEE Trans Smart Grid 2(4):827–834CrossRef
6.
go back to reference Alcaraz C, Lopez J (2010) A security analysis for wireless sensor mesh networks in highly critical systems. IEEE Trans Syst Man Cybern Part C Appl Rev 40(4):419–428CrossRef Alcaraz C, Lopez J (2010) A security analysis for wireless sensor mesh networks in highly critical systems. IEEE Trans Syst Man Cybern Part C Appl Rev 40(4):419–428CrossRef
7.
go back to reference Alcaraz C, Lopez J (2012) Analysis of requirements for critical control systems. Int J Crit Infrastruct Prot (IJCIP) 5:137–145CrossRef Alcaraz C, Lopez J (2012) Analysis of requirements for critical control systems. Int J Crit Infrastruct Prot (IJCIP) 5:137–145CrossRef
8.
go back to reference Alcaraz C, Lopez J (2013) Wide-area situational awareness for critical infrastructure protection. IEEE Comput 46(4):30–37CrossRef Alcaraz C, Lopez J (2013) Wide-area situational awareness for critical infrastructure protection. IEEE Comput 46(4):30–37CrossRef
9.
go back to reference Alcaraz C, Lopez J (2017) Secure interoperability in cyber-physical systems. In: Security solutions and applied cryptography in smart grid communications, chap 8. IGI Global, USA, pp 137–158CrossRef Alcaraz C, Lopez J (2017) Secure interoperability in cyber-physical systems. In: Security solutions and applied cryptography in smart grid communications, chap 8. IGI Global, USA, pp 137–158CrossRef
10.
go back to reference Alcaraz C, Lopez J, Choo KKR (2017) Resilient interconnection in cyber-physical control systems. Comput Secur 71:2–14CrossRef Alcaraz C, Lopez J, Choo KKR (2017) Resilient interconnection in cyber-physical control systems. Comput Secur 71:2–14CrossRef
11.
go back to reference Alcaraz C, Lopez J, Wolthusen S (2016) Policy enforcement system for secure interoperable control in distributed smart grid systems. J Netw Comput Appl 59:301–314CrossRef Alcaraz C, Lopez J, Wolthusen S (2016) Policy enforcement system for secure interoperable control in distributed smart grid systems. J Netw Comput Appl 59:301–314CrossRef
13.
go back to reference Alizadeh M, Abolfazli S, Zamani M, Baharun S, Sakurai K (2016) Authentication in mobile cloud computing: a survey. J Netw Comput Appl 61:59–80CrossRef Alizadeh M, Abolfazli S, Zamani M, Baharun S, Sakurai K (2016) Authentication in mobile cloud computing: a survey. J Netw Comput Appl 61:59–80CrossRef
14.
go back to reference H. F. Atlam, A. Alenezi, R. J. Walters, G. B. Wills and J. Daniel, ”Developing an Adaptive Risk-Based Access Control Model for the Internet of Things,” 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, 2017, pp. 655–661. H. F. Atlam, A. Alenezi, R. J. Walters, G. B. Wills and J. Daniel, ”Developing an Adaptive Risk-Based Access Control Model for the Internet of Things,” 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, 2017, pp. 655–661.
15.
go back to reference Cazorla L, Alcaraz C, Lopez J (2018) Cyber stealth attacks in critical information infrastructures. IEEE Syst J 12:1778–1792CrossRef Cazorla L, Alcaraz C, Lopez J (2018) Cyber stealth attacks in critical information infrastructures. IEEE Syst J 12:1778–1792CrossRef
16.
go back to reference Chen B, Wan J, Shu L, Li P, Mukherjee M, Yin B (2018) Smart factory of industry 4.0: key technologies, application case, and challenges. IEEE Access 6:6505–6519CrossRef Chen B, Wan J, Shu L, Li P, Mukherjee M, Yin B (2018) Smart factory of industry 4.0: key technologies, application case, and challenges. IEEE Access 6:6505–6519CrossRef
17.
go back to reference Chin WL, Lin YH, Chen HH (2016) A framework of machine-to-machine authentication in smart grid: a two-layer approach. IEEE Commun Mag 54(12):102–107CrossRef Chin WL, Lin YH, Chen HH (2016) A framework of machine-to-machine authentication in smart grid: a two-layer approach. IEEE Commun Mag 54(12):102–107CrossRef
18.
go back to reference Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, Song Z (2010) Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW’10. ACM, New York, pp 1–6 Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, Song Z (2010) Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW’10. ACM, New York, pp 1–6
19.
go back to reference Cisneros-Cabrera S, Ramzan A, Sampaio P, Mehandjiev N (2017) Digital marketplaces for industry 4.0: a survey and gap analysis. In: Camarinha-Matos LM, Afsarmanesh H, Fornasiero R (eds) Collaboration in a data-rich world. Springer, Cham, pp 18–27CrossRef Cisneros-Cabrera S, Ramzan A, Sampaio P, Mehandjiev N (2017) Digital marketplaces for industry 4.0: a survey and gap analysis. In: Camarinha-Matos LM, Afsarmanesh H, Fornasiero R (eds) Collaboration in a data-rich world. Springer, Cham, pp 18–27CrossRef
21.
go back to reference Dar KS, Taherkordi A, Eliassen F (2016) Enhancing dependability of cloud-based IoT services through virtualization. In: 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, Berlin, pp 106–116 Dar KS, Taherkordi A, Eliassen F (2016) Enhancing dependability of cloud-based IoT services through virtualization. In: 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, Berlin, pp 106–116
24.
go back to reference Dzung D, Naedele M, Von Hoff TP, Crevatin M (2005) Security for industrial communication systems. Proc IEEE 93(6):1152–1177CrossRef Dzung D, Naedele M, Von Hoff TP, Crevatin M (2005) Security for industrial communication systems. Proc IEEE 93(6):1152–1177CrossRef
25.
go back to reference Edwards NJ, Rouault J (2008) Multi-domain authorization and authentication. US 7.444,666B2 Edwards NJ, Rouault J (2008) Multi-domain authorization and authentication. US 7.444,666B2
27.
28.
go back to reference Ferrag MA, Maglaras LA, Janicke H, Jiang J (2016) Authentication protocols for internet of things: a comprehensive survey. CoRR abs/1612.07206 Ferrag MA, Maglaras LA, Janicke H, Jiang J (2016) Authentication protocols for internet of things: a comprehensive survey. CoRR abs/1612.07206
30.
go back to reference Grangel-González I, Baptista P, Halilaj L, Lohmann S, Vidal ME, Mader C, Auer S (2017) The industry 4.0 standards landscape from a semantic integration perspective. In: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp 1–8 Grangel-González I, Baptista P, Halilaj L, Lohmann S, Vidal ME, Mader C, Auer S (2017) The industry 4.0 standards landscape from a semantic integration perspective. In: 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp 1–8
31.
go back to reference Hernández-Ramos JL, Pawlowski MP, Jara AJ, Skarmeta AF, Ladid L (2015) Toward a lightweight authentication and authorization framework for smart objects. IEEE J Sel Areas Commun 33(4):690–702CrossRef Hernández-Ramos JL, Pawlowski MP, Jara AJ, Skarmeta AF, Ladid L (2015) Toward a lightweight authentication and authorization framework for smart objects. IEEE J Sel Areas Commun 33(4):690–702CrossRef
32.
go back to reference IEC-61850 (2003) Power utility automation – communication networks and systems in substations – parts 1–10. TC 57 – Power systems management and associated information exchange IEC-61850 (2003) Power utility automation – communication networks and systems in substations – parts 1–10. TC 57 – Power systems management and associated information exchange
34.
go back to reference Industrial Internet Consortium, Edge Computing Task Group (2018) Introduction to edge computing in IIoT. An Industrial Internet Consortium White Paper, IIC:WHT:IN24:V1.0:PB:20180618. https://www.iiconsortium.org. Last retrieved in June 2018 Industrial Internet Consortium, Edge Computing Task Group (2018) Introduction to edge computing in IIoT. An Industrial Internet Consortium White Paper, IIC:WHT:IN24:V1.0:PB:20180618. https://​www.​iiconsortium.​org. Last retrieved in June 2018
35.
36.
go back to reference Ishihara Y, Seki H, Kasami T (1993) A translation method from natural language specifications into formal specifications using contextual dependencies. In: Proceedings of the IEEE International Symposium on Requirements Engineering, pp 232–239 Ishihara Y, Seki H, Kasami T (1993) A translation method from natural language specifications into formal specifications using contextual dependencies. In: Proceedings of the IEEE International Symposium on Requirements Engineering, pp 232–239
37.
go back to reference Lee JY, Lin WC, Huang YH (2014) A lightweight authentication protocol for internet of things. In: International Symposium on Next-Generation Electronics (ISNE), pp 1–2 Lee JY, Lin WC, Huang YH (2014) A lightweight authentication protocol for internet of things. In: International Symposium on Next-Generation Electronics (ISNE), pp 1–2
38.
go back to reference Liu Q, Zhang H, Wan J, Chen X (2017) An access control model for resource sharing based on the role-based access control intended for multi-domain manufacturing internet of things. IEEE Access 5:7001–7011CrossRef Liu Q, Zhang H, Wan J, Chen X (2017) An access control model for resource sharing based on the role-based access control intended for multi-domain manufacturing internet of things. IEEE Access 5:7001–7011CrossRef
39.
go back to reference Lom M, Pribyl O, Svitek M (2016) Industry 4.0 as a part of smart cities. In: 2016 Smart Cities Symposium Prague (SCSP), pp 1–6 Lom M, Pribyl O, Svitek M (2016) Industry 4.0 as a part of smart cities. In: 2016 Smart Cities Symposium Prague (SCSP), pp 1–6
40.
go back to reference Lopez J, Alcaraz C, Roman R (2013) Smart control of operational threats in control substations. Comput Secur 38:14–27CrossRef Lopez J, Alcaraz C, Roman R (2013) Smart control of operational threats in control substations. Comput Secur 38:14–27CrossRef
41.
go back to reference Lopez J, Rubio JE (2018) Access control for cyber-physical systems interconnected to the cloud. Comput Netw 134:46–54CrossRef Lopez J, Rubio JE (2018) Access control for cyber-physical systems interconnected to the cloud. Comput Netw 134:46–54CrossRef
46.
go back to reference Pearson S, Benameur A (2010) Privacy, security and trust issues arising from cloud computing. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, pp 693–702 Pearson S, Benameur A (2010) Privacy, security and trust issues arising from cloud computing. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, pp 693–702
47.
go back to reference Qiu Y, Ma M (2016) A mutual authentication and key establishment scheme for M2M communication in 6LoWPAN networks. IEEE Trans Ind Inf 12(6):2074–2085CrossRef Qiu Y, Ma M (2016) A mutual authentication and key establishment scheme for M2M communication in 6LoWPAN networks. IEEE Trans Ind Inf 12(6):2074–2085CrossRef
48.
go back to reference Raza S, Shafagh H, Hewage K, Hummen R, Voigt T (2013) Lithe: lightweight secure CoAP for the Internet of Things. IEEE Sens J 13(10):3711–3720 (2013)CrossRef Raza S, Shafagh H, Hewage K, Hummen R, Voigt T (2013) Lithe: lightweight secure CoAP for the Internet of Things. IEEE Sens J 13(10):3711–3720 (2013)CrossRef
49.
go back to reference Rubio JE, Alcaraz C, Lopez J (2017) Preventing advanced persistent threats in complex control networks. In: 22nd European Symposium on Research in Computer Security (ESORICS 2017), vol 10493, pp 402–418CrossRef Rubio JE, Alcaraz C, Lopez J (2017) Preventing advanced persistent threats in complex control networks. In: 22nd European Symposium on Research in Computer Security (ESORICS 2017), vol 10493, pp 402–418CrossRef
50.
go back to reference Rubio JE, Alcaraz C, Roman R, López J (2017) Analysis of intrusion detection systems in industrial ecosystems. In: Proceedings of the 14th International Joint Conference on E-Business and Telecommunications (ICETE 2017), vol 4, pp 116–128 Rubio JE, Alcaraz C, Roman R, López J (2017) Analysis of intrusion detection systems in industrial ecosystems. In: Proceedings of the 14th International Joint Conference on E-Business and Telecommunications (ICETE 2017), vol 4, pp 116–128
51.
go back to reference Rubio JE, Roman R, Alcaraz C, Zhang Y (2018), Tracking advanced persistent threats in critical infrastructures through opinion dynamics. In: European Symposium on Research in Computer Security. Springer, Barcelona, vol 11098, pp. 555–574CrossRef Rubio JE, Roman R, Alcaraz C, Zhang Y (2018), Tracking advanced persistent threats in critical infrastructures through opinion dynamics. In: European Symposium on Research in Computer Security. Springer, Barcelona, vol 11098, pp. 555–574CrossRef
52.
go back to reference Schwab D, Yang L (2013) Entity authentication in a mobile-cloud environment. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW’13). ACM, New York, pp 42:1–42:4 Schwab D, Yang L (2013) Entity authentication in a mobile-cloud environment. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW’13). ACM, New York, pp 42:1–42:4
53.
go back to reference Sharaf-Dabbagh Y, Saad W (2017) Cyber-physical fingerprinting for Internet of Things authentication: demo abstract. In: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation (IoTDI’17). ACM, New York, pp 301–302CrossRef Sharaf-Dabbagh Y, Saad W (2017) Cyber-physical fingerprinting for Internet of Things authentication: demo abstract. In: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation (IoTDI’17). ACM, New York, pp 301–302CrossRef
54.
go back to reference Shrouf F, Ordieres J, Miragliotta G (2014) Smart factories in industry 4.0: a review of the concept and of energy management approached in production based on the internet of things paradigm. In: 2014 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM). IEEE, pp 301–302 Shrouf F, Ordieres J, Miragliotta G (2014) Smart factories in industry 4.0: a review of the concept and of energy management approached in production based on the internet of things paradigm. In: 2014 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM). IEEE, pp 301–302
55.
go back to reference Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of Things: the road ahead. Comput Netw 76:146–164CrossRef Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of Things: the road ahead. Comput Netw 76:146–164CrossRef
56.
go back to reference Thamhain H (2013) Managing risks in complex projects. Proj Manag J 44(2):20–35CrossRef Thamhain H (2013) Managing risks in complex projects. Proj Manag J 44(2):20–35CrossRef
57.
go back to reference Thomas MV, Chandrasekaran K (2016) Identity and access management in the cloud computing environments, chap. 3. ISI Global, Hershey, Pennsylvania, USA, pp 61–89 Thomas MV, Chandrasekaran K (2016) Identity and access management in the cloud computing environments, chap. 3. ISI Global, Hershey, Pennsylvania, USA, pp 61–89
58.
go back to reference Thota P, Kim Y (2016) Implementation and comparison of M2M protocols for Internet of Things. In: 2016 4th International Conference on Applied Computing and Information Technology/3rd International Conference on Computational Science/Intelligence and Applied Informatics/1st International Conference on Big Data, Cloud Computing, Data Science Engineering (ACIT-CSII-BCD), pp 43–48 Thota P, Kim Y (2016) Implementation and comparison of M2M protocols for Internet of Things. In: 2016 4th International Conference on Applied Computing and Information Technology/3rd International Conference on Computational Science/Intelligence and Applied Informatics/1st International Conference on Big Data, Cloud Computing, Data Science Engineering (ACIT-CSII-BCD), pp 43–48
60.
go back to reference Vollbrecht J, Calhoun P, Farrell S, Gommans L, Gross G, de Bruijn B, de Laat C, Holdrege M, Spence D (2000) AAA authorization framework. RFC 2904 Vollbrecht J, Calhoun P, Farrell S, Gommans L, Gross G, de Bruijn B, de Laat C, Holdrege M, Spence D (2000) AAA authorization framework. RFC 2904
61.
go back to reference Wang H, Xiong D, Wang P, Liu Y (2017) A lightweight XMPP publish/subscribe scheme for resource-constrained IoT devices. IEEE Access 5:16393–16405CrossRef Wang H, Xiong D, Wang P, Liu Y (2017) A lightweight XMPP publish/subscribe scheme for resource-constrained IoT devices. IEEE Access 5:16393–16405CrossRef
62.
go back to reference Wang KH, Chen CM, Fang W, Wu TY (2018) On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J Supercomput 74(1):65–70CrossRef Wang KH, Chen CM, Fang W, Wu TY (2018) On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. J Supercomput 74(1):65–70CrossRef
63.
go back to reference Wu XW, Yang EH, Wang J (2017) Lightweight security protocols for the Internet of Things. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp 1–7 Wu XW, Yang EH, Wang J (2017) Lightweight security protocols for the Internet of Things. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp 1–7
64.
go back to reference Yassein MB, Shatnawi MQ, Al-zoubi D (2016) Application layer protocols for the Internet of Things: a survey. In: 2016 International Conference on Engineering MIS (ICEMIS), pp 1–4 Yassein MB, Shatnawi MQ, Al-zoubi D (2016) Application layer protocols for the Internet of Things: a survey. In: 2016 International Conference on Engineering MIS (ICEMIS), pp 1–4
65.
go back to reference Zheng P, Wang H, Sang Z, Zhong RY, Liu Y, Liu C, Mubarok K, Yu S, Xu X (2018) Smart manufacturing systems for industry 4.0: conceptual framework, scenarios, and future perspectives. Front Mech Eng 13(2):137–150CrossRef Zheng P, Wang H, Sang Z, Zhong RY, Liu Y, Liu C, Mubarok K, Yu S, Xu X (2018) Smart manufacturing systems for industry 4.0: conceptual framework, scenarios, and future perspectives. Front Mech Eng 13(2):137–150CrossRef
66.
go back to reference Zhong RY, Xu X, Klotz E, Newman ST (2017) Intelligent manufacturing in the context of Industry 4.0: a review. Engineering 3(5):616–630CrossRef Zhong RY, Xu X, Klotz E, Newman ST (2017) Intelligent manufacturing in the context of Industry 4.0: a review. Engineering 3(5):616–630CrossRef
67.
go back to reference Zhou W, Zhang Y, Liu P (2018) The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. CoRR abs/1802.03110 Zhou W, Zhang Y, Liu P (2018) The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. CoRR abs/1802.03110
Metadata
Title
Secure Interconnection of IT-OT Networks in Industry 4.0
Author
Cristina Alcaraz
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-00024-0_11

Premium Partner