Academic literature on the topic 'SECURING INDUSTRIAL IOT'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SECURING INDUSTRIAL IOT.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SECURING INDUSTRIAL IOT"

1

Chen, Chien-Ying, Monowar Hasan, and Sibin Mohan. "Securing Real-Time Internet-of-Things." Sensors 18, no. 12 (December 10, 2018): 4356. http://dx.doi.org/10.3390/s18124356.

Full text
Abstract:
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical systems have real-time requirements (e.g., avionics, automobiles, power grids, manufacturing systems, industrial control systems, etc.). Recent developments and new functionality require real-time embedded devices to be connected to the Internet. This gives rise to the real-time Internet-of-things (RT-IoT) that promises a better user experience through stronger connectivity and efficient use of next-generation embedded devices. However, RT-IoT are also increasingly becoming targets for cyber-attacks, which is exacerbated by this increased connectivity. This paper gives an introduction to RT-IoT systems, an outlook of current approaches and possible research challenges towards secure RT-IoT frameworks.
APA, Harvard, Vancouver, ISO, and other styles
2

Dhirani, Lubna Luxmi, Eddie Armstrong, and Thomas Newe. "Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap." Sensors 21, no. 11 (June 5, 2021): 3901. http://dx.doi.org/10.3390/s21113901.

Full text
Abstract:
Industrial IoT (IIoT) is a novel concept of a fully connected, transparent, automated, and intelligent factory setup improving manufacturing processes and efficiency. To achieve this, existing hierarchical models must transition to a fully connected vertical model. Since IIoT is a novel approach, the environment is susceptible to cyber threat vectors, standardization, and interoperability issues, bridging the gaps at the IT/OT ICS (industrial control systems) level. IIoT M2M communication relies on new communication models (5G, TSN ethernet, self-driving networks, etc.) and technologies which require challenging approaches to achieve the desired levels of data security. Currently there are no methods to assess the vulnerabilities/risk impact which may be exploited by malicious actors through system gaps left due to improper implementation of security standards. The authors are currently working on an Industry 4.0 cybersecurity project and the insights provided in this paper are derived from the project. This research enables an understanding of converged/hybrid cybersecurity standards, reviews the best practices, and provides a roadmap for identifying, aligning, mapping, converging, and implementing the right cybersecurity standards and strategies for securing M2M communications in the IIoT.
APA, Harvard, Vancouver, ISO, and other styles
3

Mahmood, Mohammed, and Jassim Abdul-Jabbar. "Securing Industrial Internet of Things (Industrial IoT)- A Reviewof Challenges and Solutions." Al-Rafidain Engineering Journal (AREJ) 28, no. 1 (March 1, 2023): 312–20. http://dx.doi.org/10.33899/rengj.2022.135292.1196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

George, Gemini, and Sabu M. Thampi. "A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations." IEEE Access 6 (2018): 43586–601. http://dx.doi.org/10.1109/access.2018.2863244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dakhnovich, A. D., D. A. Moskvin, and D. P. Zegzhda. "Approach for Securing Network Communications Modelling Based on Smart Multipath Routing." Nonlinear Phenomena in Complex Systems 23, no. 4 (December 4, 2020): 386–96. http://dx.doi.org/10.33581/1561-4085-2020-23-4-386-396.

Full text
Abstract:
Digital transformation, or Industry 4.0, is already changing manufacturing processes as it brings more automation to standardized Industrial Control Systems (ICS) based systems such as Supervisory Control and Data Acquisition (SCADA) systems. It is performed by the means of cyber-physical systems such as Internet of Things (IoT). For now, these “Things” are communicating in a new network area, where peer-to-peer communications are widely used. Such networks are responsible for real life processes safety. However, such shift also extends a threat vectors and entry points for an adversary inside the industrial segments. In the paper, new cybersecurity challenges on the Industrial Internet of Things network segments are considered as well as known practices to mitigate some of them. As a result, a peer-to-peer smart multipath network routing based on garlic routing is proposed to model secure network communications in IoT field. An approach is aimed to be used on the IoT field to tackle all of the network-scoped cybersecurity challenges.
APA, Harvard, Vancouver, ISO, and other styles
6

Yas, Harith, and Manal M. Nasir. "Securing the IoT: An Efficient Intrusion Detection System Using Convolutional Network." Journal of Cybersecurity and Information Management 1, no. 1 (2020): 30–37. http://dx.doi.org/10.54216/jcim.010105.

Full text
Abstract:
The Internet of Things (IoT) is an ever-expanding network of interconnected devices that enables various applications, such as smart homes, smart cities, and industrial automation. However, with the proliferation of IoT devices, security risks have increased significantly, making it necessary to develop effective intrusion detection systems (IDS) for IoT networks. In this paper, we propose an efficient IDS for complex IoT environments based on convolutional neural networks (CNNs). Our approach uses IoT traffics as input to our CNN architecture to capture representational knowledge required to discriminate different forms of attacks. Our system achieves high accuracy and low false positive rates, even in the presence of complex and dynamic network traffic patterns. We evaluate the performance of our system using public datasets and compare it with other cutting-edge IDS approaches. Our results show that the proposed system outperforms the other approaches in terms of accuracy and false positive rates. The proposed IDS can enhance the security of IoT networks and protect them against various types of cyber-attacks.
APA, Harvard, Vancouver, ISO, and other styles
7

Kurdi, Hassan, and Vijey Thayananthan. "A Multi-Tier MQTT Architecture with Multiple Brokers Based on Fog Computing for Securing Industrial IoT." Applied Sciences 12, no. 14 (July 16, 2022): 7173. http://dx.doi.org/10.3390/app12147173.

Full text
Abstract:
With the rapid growth of internet-connected devices and their resource-constrained capabilities, the current authentication mechanisms are unable to meet the complex IoT application requirements, such as in the Industrial Internet of Things (IIoT), due to the increased computation, communication, and storage overhead arising from these mechanisms. In the IIoT, machine-to-machine (M2M) communication is an underlying technology where devices (e.g., sensors, actuators, and controllers) can be enabled to exchange information autonomously; thus, the massive data generated by these devices can increase latency, network congestion, and the complexity of security management. Message queue telemetry transport (MQTT) is one of the promising M2M protocols used in the IoT that could encounter such issues because it relies on a central broker in the cloud and implements a heavyweight authentication mechanism based on TLS. Therefore, this paper proposes an MQTT architecture with multi-tier brokers based on fog computing, where each broker is deployed with an authentication manager. In addition, the paper presents a lightweight mutual authentication scheme based on hash function and XOR operation. Comparing the results given in the benchmark, the overall performance of our scheme shows that storage and communication overheads are reduced to 89% and 23%, respectively. Furthermore, our system can resist against several cyberattacks and provide scalability.
APA, Harvard, Vancouver, ISO, and other styles
8

Elkanishy, Abdelrahman, Paul M. Furth, Derrick T. Rivera, and Ahameed A. Badawy. "Low-overhead Hardware Supervision for Securing an IoT Bluetooth-enabled Device: Monitoring Radio Frequency and Supply Voltage." ACM Journal on Emerging Technologies in Computing Systems 18, no. 1 (January 31, 2022): 1–28. http://dx.doi.org/10.1145/3468064.

Full text
Abstract:
Over the past decade, the number of Internet of Things (IoT) devices increased tremendously. In particular, the Internet of Medical Things (IoMT) and the Industrial Internet of Things (IIoT) expanded dramatically. Resource restrictions on IoT devices and the insufficiency of software security solutions raise the need for smart Hardware-Assisted Security (HAS) solutions. These solutions target one or more of the three C’s of IoT devices: Communication, Control, and Computation. Communication is an essential technology in the development of IoT. Bluetooth is a widely-used wireless communication protocol in small portable devices due to its low energy consumption and high transfer rates. In this work, we propose a supervisory framework to monitor and verify the operation of a Bluetooth system-on-chip (SoC) in real-time. To verify the operation of the Bluetooth SoC, we classify its transmission state in real-time to ensure a secure connection. Our overall classification accuracy is measured as 98.7%. We study both power supply current (IVDD) and RF domains to maximize the classification performance and minimize the overhead of our proposed supervisory system.
APA, Harvard, Vancouver, ISO, and other styles
9

Kristen, Erwin, Reinhard Kloibhofer, Vicente Hernández Díaz, and Pedro Castillejo. "Security Assessment of Agriculture IoT (AIoT) Applications." Applied Sciences 11, no. 13 (June 23, 2021): 5841. http://dx.doi.org/10.3390/app11135841.

Full text
Abstract:
Cybersecurity is an important field in our digital world. It protects computer systems and communication networks against theft or sabotage of information to guarantee trouble-free operation in a trustworthy working environment. This article gives an overview of a cybersecurity assessment process and an appropriate Cybersecurity Management (CSM) implementation for future digital agriculture applications. The cybersecurity assessment follows the IEC 62443 cybersecurity standard for Industrial Automation Control Systems (IACS), adapted to Agriculture Automation Control Systems (AACS). However, the research results showed application differences; thus, an expansion of the standard is necessary to fill the existing open security gaps in agriculture. Agriculture differs from industrial control systems because of the outdoor located field area, which requires other forms of security. An appropriate cybersecurity standard for the agriculture domain is not currently available. However, such a standard will be necessary to define generally applicable procedures to protect agricultural assets against cyberattacks. The cybersecurity standards and regulations existing today (2021) are not sufficient for securing the agriculture domain against new and domain-specific cyberattacks. This article describes some of the cyber vulnerabilities identified and provides initial recommendations for addressing them.
APA, Harvard, Vancouver, ISO, and other styles
10

Juma, Mazen, Fuad AlAttar, and Basim Touqan. "Securing Big Data Integrity for Industrial IoT in Smart Manufacturing Based on the Trusted Consortium Blockchain (TCB)." IoT 4, no. 1 (February 6, 2023): 27–55. http://dx.doi.org/10.3390/iot4010002.

Full text
Abstract:
The smart manufacturing ecosystem enhances the end-to-end efficiency of the mine-to-market lifecycle to create the value chain using the big data generated rapidly by edge computing devices, third-party technologies, and various stakeholders connected via the industrial Internet of things. In this context, smart manufacturing faces two serious challenges to its industrial IoT big data integrity: real-time transaction monitoring and peer validation due to the volume and velocity dimensions of big data in industrial IoT infrastructures. Modern blockchain technologies as an embedded layer substantially address these challenges to empower the capabilities of the IIoT layer to meet the integrity requirements of the big data layer. This paper presents the trusted consortium blockchain (TCB) framework to provide an optimal solution for big data integrity through a secure and verifiable hyperledger fabric modular (HFM). The TCB leverages trustworthiness in heterogeneous IIoT networks of governing end-point peers to achieve strong integrity for big data and support high transaction throughput and low latency of HFM contents. Our proposed framework drives the fault-tolerant properties and consensus protocols to monitor malicious activities of tunable peers if compromised and validates the signed evidence of big data recorded in real-time HFM operated over different smart manufacturing environments. Experimentally, the TCB has been evaluated and reached tradeoff results of throughput and latency better than the comparative consortium blockchain frameworks.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "SECURING INDUSTRIAL IOT"

1

Milinic, Vasilije. "Investigating Security Issues in Industrial IoT: A Systematic Literature Review." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-54980.

Full text
Abstract:
The use of Internet-of-Things (IoT) makes it possible to inter-connect Information Technology (IT) and Operational Technology (OT) into a completely new system. This convergence is often known as Industrial IoT (IIoT). IIoT brings a lot of benefits to industrial assets, such as improved efficiency and productivity, reduced cost, and depletion of human error. However, the high inter-connectivity opens new possibilities for cyber incidents. These incidents can cause major damage like halting of production on the manufacturing line, or catastrophic havoc to companies, communities, and countries causing power outages, floods, and fuel shortages. Such incidents are important to be predicted, stopped, or alleviated at no cost. Moreover, these incidents are a great motive for researchers and practitioners to investigate known security problems and find potential moderation strategies.  In this thesis work, we try to identify what types of IIoT systems have been investigated in the literature. We seek out to find if software-related issues can yield security problems. Also, we make an effort to perceive what are the proposed methods to mitigate the security threats.We employ the systematic literature review (SLR) methodology to collect this information. The results are gathered from papers published in the last five years and they show an increased interest in research in this domain. We find out software vulnerabilities are a concern for IIoT systems, mainly firmware vulnerabilities and buffer overflows, and there are a lot of likely attacks that can cause damage, mostly injection and DDoS attacks. There are a lot of different solutions which offer the possibility to stop the identified problems and we summarize them. Furthermore, the research gap considering the update process in these systems and devices, as well as a problem with the unsupervised software supply chain is identified.
APA, Harvard, Vancouver, ISO, and other styles
2

Kadhum, Hamza. "Enhancing Zigbee Security for Industrial Implementation." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279559.

Full text
Abstract:
Zigbee network is a popular choice for deploying low power personal area network (LoWPAN). The application areas vary but the most popular are industrial area monitoring and home automation. But Zigbee has been identified to have weak security and is not applicable for industrial implementation. This paper is collaboration with Ericsson to investigate Zigbee network security and implementation. This paper will cover security solutions for Zigbee and touch on how to configure Zigbee network such that it can operate for a long period of time without battery changes. The security solutions will demonstrate how public-key respective symmetric key algorithm can be used for enhancing Zigbee security such that it provide authentication and authorization of joining devices while maintaining confidentiality and integrity of the network communication. Security solutions will also take regards to the power consumption of each proposed solution. For the network configuration part of the thesis, it will present node lifetime for different network configuration, i.e. how polling period between each message will affect the total cur- rent consumption of a node and how the joining procedure, depending on the security solution will affect the total node lifetime. Achieving longer node lifetime is desired because it is assumed that the network will be deployed in remote and unfavorable areas. The result of this paper compares different solutions for enhancing the security. Further, it concludes that Zigbee security with authentication and authorization of joining devices is reached through secret-splitting key establishment - which is the best solution. This is possible while maintaining low power consumption in the network.
Zigbee nätverk är ett populärt val vid uppsättning av ett nätverk med låg strömförbrukning. Zigbees användningsområde är olika men den är väldigt populär inom industriell områdesövervakning och hemautomation. Däremot har Zigbees säkerhet varit en nackdel, då det har framkommit att den inte möter kraven för industriell användning. Arbetet kom till genom ett samarbete med Ericsson och KTH för att undersöka Zigbee nätverks implementation och säkerhet. Arbetet bearbetar olika säkerhetslösningar för Zigbee nätverk och hur den kan implementeras för att uppnå långtidsanvändning utan batteribyte. Säkerhetslösningar bygger på public-key samt symmetric key kryptografi algoritmer för att förbättra och öka Zigbees säkerhet genom autentisering och tillåtelse av noder som ansluter sig till nätverket. Nätverkets konfiguration för långtidsanvändning redovisas genom att jämföra olika polling tidsintervaller mellan meddelanden. Långtidsanvändning utan batteribyte är viktigt för att nätverket kommer implementeras i ett avlägset område som är svåråtkomlig. Arbetet redovisar och jämföra olika lösningar för att öka säkerheten för Zigbee nätverk. Den optimala lösningen för att uppnå autentisering samt tillåtelse av noder som ansluter sig uppnås med nyckel skapande genom secret-splitting metoden. Metoden följer NIST rekommendationer och anses vara säker, därav uppfyller den kraven för industriell implementation. Nätverkets säkerhet ökar samt bibehåller ett nätverk med låg strömförbrukning.
APA, Harvard, Vancouver, ISO, and other styles
3

Scata', Marialisa. "Security Analysis of ICT Systems based on Bio-Inspired Models." Doctoral thesis, Università di Catania, 2012. http://hdl.handle.net/10761/1095.

Full text
Abstract:
In recent years, information and communication technology (ICT) has been characterized by several evolving trends and new challenges. The design and management of each information system must address is- sues related to planning an ICT infrastructure. The design of an ICT infrastructure can not ignore the technological and social analysis, to be also linked to the economic aspects, and now also linked to the sustainability. Dwawing inspiration from biology that has led to useful approaches to problem solving, this Ph.D. dissertation propose and develop a risk analysis model and security analysis and management model. This Ph.D. thesis proposes and shows a new kind of research topic, Bio-Inspired Telecommunication Security. It will be key to reach efficiency of the future networks and to obtaine a sustainable ICT infrastructure in terms of energy consumption, economic investment and in terms of privacy and security.
APA, Harvard, Vancouver, ISO, and other styles
4

Arlotti, Luca. "Studio di fattibilità tecnico economico per l'automazione di un reparto presse tramite l'applicazione di cobot." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/16184/.

Full text
Abstract:
In questa tesi viene eseguita una ricerca applicativa sull'implementazione di un robot collaborativo, con lo scopo di sgravare gli operatori da mansioni ripetitive e impiegare il loro tempo per migliorare la qualità della produzione e dei prodotti finali. Dopo una parte introduttiva dedicata alla descrizione dei punti salienti dell’Industria 4.0 e alle scelte che il mercato propone riguardo ai robot collaborativi, si è preso in considerazione il caso specifico di ASA San Marino: l’analisi del processo produttivo del reparto presse ha posto la lente di ingrandimento sulle mansioni che il singolo operatore è chiamato a svolgere. Le problematiche evidenziate non riguardavano tutto il reparto ma solo un gruppo di 6 macchine che operano su più turni e costantemente. Per risolvere le problematiche si è ipotizzata un’implementazione robotica di tipo collaborativa, che potesse garantire l’interazione tra uomo e macchina, che non invadesse il layout di reparto con gabbie di recinzione e che, soprattutto, fosse di facile e veloce installazione. Partendo dall'esperienza maturata durante il percorso di tirocinio in ambito di programmazione del cobot, l’obiettivo della tesi è arrivare all'installazione effettiva del cobot al termine del processo di produzione della pressa, utilizzandolo per pallettizzare i prodotti in maniera automatica, collaborando con l’operatore nel raggiungimento dell’obiettivo comune. Per ottenere ciò si è dunque passati prima per un’analisi delle caratteristiche del cobot, inquadrando le sue esigenze e definendo i suoi limiti, poi risolvendo i vari problemi sorti e implementando il sistema per far svolgere le mansioni al robot senza l’aiuto di altri macchinari che richiedessero modifiche del layout.
APA, Harvard, Vancouver, ISO, and other styles
5

BORA, NILUTPOL. "SECURING INDUSTRIAL IOT: GCN-BASED IDS IMPLEMENTATION AND A REVIEW OF TESTING FRAMEWORKS." Thesis, 2023. http://dspace.dtu.ac.in:8080/jspui/handle/repository/20410.

Full text
Abstract:
Cyber-attacks on Industrial IoT systems can result in severe consequences such as production loss, equipment damage, and even human casualties and hence security is of utmost concern in this application of IoT. This thesis, presents an approach for network security, intrusion detection that utilizes the spatial attributes of a network in attempt overcome the limitations discovered through literature review of various studies in Intrusion Detection and testing frameworks. For this graph-based neural network have been used that was seen promising in modelling complex relationships between graphical entities, making them a suitable approach for IDS in interconnected systems. Our approach leverages a graph representation of network traffic, that is used as an input for neural network through the use of convolution operation. Our approach makes use of flow features of the network in relation with the neighbouring flows in contrast to other machine learning models that uses flow features independent to each other. This work has been evaluated primarily on Edge-IIoT 2022, dataset and compared with existing well-known datasets and machine learning methods. The results show that our approach achieved average 5.49% improved F1-score, compared with other standard existing methods with our model having highest F1-Score of 0.996. Further research and development in this area will advance the field of IIoT security and enhance the resilience of industrial systems in the face of evolving threats.
APA, Harvard, Vancouver, ISO, and other styles
6

Rasori, Marco. "Security & Privacy in Smart Cities and Industrial IoT." Doctoral thesis, 2020. http://hdl.handle.net/2158/1200334.

Full text
Abstract:
The Internet of Things (IoT) technology is now widespread and is indisputably changing our lives. As this technology advances, new security and privacy challenges must be faced. The limitations imposed by resource-constrained devices used in IoT applications play a crucial role and often determine the research directions. This dissertation addresses security problems related to the two main branches of the IoT, namely smart cities and industrial IoT. IoT applications usually rely on input data coming from either provider's smart devices or by end-user's devices, as in mobile participatory sensing. In the latter case, the infrastructure rests on data reported by participants. This paradigm, however, introduces new security problems related to the trustworthiness of the reported data, which might be inaccurate or even counterfeit. Differently, if the data is sensed by trusted devices, the data trustworthiness is not a concern as far as other security properties, e.g., authentication and integrity, are guaranteed. Depending on the scenario, the sensed data can be directly transmitted to the users or stored on cloud servers. Oftentimes, sensed data includes sensitive or valuable information which is intended to be read only by authorized users. If data is stored on the cloud, the owner loses any control on it, and an attack that leads to data disclosure could represent an important loss of money for the data owner or a serious privacy violation for the users. In this dissertation we propose novel solutions to the aforementioned problems. False-measurement reports could be tackled by having a set of trusted verifiers which checks the same measurement. If the measurement cannot be directly checked, the verifiers could at least check the participant's position as an indirect proof. To this aim, we propose an effective and secure location verification solution which uses a swarm of few drones equipped only with common radio-frequency transceivers, e.g., WiFi. Secondly, we propose the use of Attribute-Based Encryption (ABE) in IoT scenarios to protect the data from unauthorized access. We propose ABE-Cities, a secure scheme for smart cities which implements a publish/subscribe-like application in which the data is outsourced to a semi-trusted cloud server. Since ABE encryption might be burdensome for a range of resource-constrained devices, in ABE-Cities, the sensing devices execute only symmetric-key algorithms. Moreover, ABE-Cities leverages the peculiarities of a smart city in order to reduce the complexity of the key revocation operation, which is the most onerous one in ABE systems. In addition, we extend an existing ABE revocation scheme by providing additional security that limits the cloud server capabilities and inhibits it from accessing the data stored on it, when in possession of a revoked key. Finally, we propose fABElous, an ABE scheme for low-bitrate wireless sensor and actuator networks, often used in industrial IoT systems, which aims at minimizing the communication overhead introduced by the adoption of ABE to selectively distribute data through broadcast communications.
APA, Harvard, Vancouver, ISO, and other styles
7

Ghufli, Suhail Mubarak Al. "Urban and industrial air pollution: engineering and strategic planning for environment security." Thesis, 2011. http://localhost:8080/iit/handle/2074/6294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Raposo, Duarte Miguel Garcia. "Monitoring Industrial Wireless Sensor Networks: A model to enhance Security and Reliability." Doctoral thesis, 2020. http://hdl.handle.net/10316/88841.

Full text
Abstract:
Tese no âmbito do Programa de Doutoramento em Ciências e Tecnologias da Informação e apresentada ao Departamento de Engenharia Informática da Faculdade de Ciências e Tecnologia da Universidade de Coimbra.
A new generation of industrial systems are growing, in a new industrial evolution that connects wireless technologies with powerful devices, capable to make their own decisions. In the Industry 4.0 paradigm, industrial systems are becoming more powerful and complex in order to keep with the requirements needed to build Cyber Physical Systems (CPSs). To achieve such paradigm, Industrial Wireless Sensor Networks (IWSNs) are a key-technology capable to achieve micro-intelligence, with low-cost, and mobility, reducing even further today’s already short production cycles, and at the same time allowing new industrial applications. Specifically, in the last decade, more reliable and deterministic standards were proposed, all of them sharing the same base technology, the IEEE802.15.4 standard. At the same time, until now, Industrial Control Systems (ICSs) have remained disconnected from the Internet, relying in the airgap principle to ensure security. Nevertheless, there is a lack of post-deployment tools to monitor technologies like the WirelessHART, ISA100.11a, WIA-PA and the ZigBee standards, contrary to what happens with most common wired technologies. The lack of these tools can be explained by several characteristics present in current IoT devices like the fragmentation of the operating systems, the need to develop specific firmware for each application, different hardware architectures; etc. Thus, in this thesis, and looking for the current challenges of industrial IoT technologies, a monitoring model is proposed, capable not only to monitor current industrial networks based on the IEEE802.15.4 standard, but also the in-node components of sensor nodes, in several hardware and firmware architectures. The proposed architecture explores several techniques to obtain free monitoring metrics; agents in charge of processing these metrics; and relies in management standards to share all the monitoring information. To prove the performance of this proposal, a WirelessHART testbed was built, as well as the different components presented in the architectural model. Additionally, using representative anomalies, injected in a WirelessHART testbed, an Anomaly Detection system capable to detect network anomalies and security attacks was built, proving the effectiveness of the presented model in the network perspective. In the same way, in order to prove the effectiveness in the detection of firmware and hardware anomalies, an Anomaly Detection system for in-node components was also built. The two Anomaly Detection systems were able to detect with high recall and low false positive ratio the anomalies inserted in the systems, proving that the proposed model can be used as a post-deployment tool in real industrial scenarios.
Atualmente assiste-se a uma nova geração de sistemas industriais, numa evolução que junta tecnologias sem fios com dispositivos embebidos, cada vez mais inteligentes e capazes. No âmbito da Indústria 4.0, os sistemas industriais tornaram-se mais potentes e complexos, em resposta aos requisitos impostos pelos novos Sistemas Ciber-Físicos. No panorama atual, as Redes de Sensores Sem Fios Industriais são uma tecnologia-chave, capaz de fornecer micro-inteligência, e mobilidade, a um baixo-custo, reduzindo cada vez mais os ciclos de produção industrial, e permitindo novos tipos de aplicações. Por esta razão, durante a última década, várias tecnologias baseadas na norma IEEE802.15.4 foram desenvolvidas e propostas, oferecendo técnicas de transmissão mais fiáveis e determinísticas. Ainda, no domínio da segurança, assistimos também a uma mudança de paradigma neste tipo de sistemas. O paradigma utilizado até então, regia-se através de políticas de segurança que privilegiavam o isolamento. Porém, a conexão destes sistemas à Internet origina um novo conjunto de ameaças externas, que tem crescido progressivamente. De modo a manter a fiabilidade, as ferramentas de monitorização em ambiente de produção permitem uma constante monitorização dos sistemas, prevenindo eventuais falhas. Contudo, existe uma ausência de ferramentas para normas como o WirelessHART, ISA100.11a, WIA-PA e ZigBee, ao contrário do que acontece no caso das tecnologias legadas. Esta lacuna pode ser explicada pelas diferentes características presentes nos dispositivos IoT, como por exemplo, a fragmentação dos sistemas operativos, a necessidade de desenvolver firmware específico para cada aplicação, e os diferentes tipos de arquitecturas de hardware existentes. O trabalho desenvolvido nesta tese, apresenta um novo modelo de arquitetura de monitorização, não só capaz de monitorizar as tecnologias industriais baseadas na norma IEEE802.15.4, como também os próprios componentes internos dos nós-sensores (em diferentes arquiteturas de firmware e hardware). O modelo de arquitetura proposto apresenta técnicas que permitem obter métricas de estado sem custos, partilhadas através de protocolos de gestão, por agentes responsáveis pela respetiva aquisição. Para confirmar o baixo impacto da arquitetura proposta foi criada uma testbed utilizando a norma WirelessHART, com todos os agentes. Adicionalmente, para provar a eficácia e utilidade da arquitetura foram desenvolvidos dois sistemas de deteção de anomalias: o primeiro permite a deteção de anomalias de rede; e o segundo possibilita a deteção de anomalias no firmware e hardware nos nós-sensores. Estes sistemas foram avaliados, através da injeção de anomalias de rede, firmware e hardware. Os dois sistemas de deteção propostos conseguiram identificar os comportamentos anómalos com alto recall e baixo false positive ratio, provando assim, que o modelo proposto poderá ser utilizado como ferramenta de diagnóstico em redes de sensores sem fios industriais.
APA, Harvard, Vancouver, ISO, and other styles
9

Manna, Michele La. "Applying Attribute-Based Encryption in IoT and Automotive Scenarios." Doctoral thesis, 2022. http://hdl.handle.net/2158/1264303.

Full text
Abstract:
With the advent of the Internet of Things (IoT) and the Industrial IoT (IIoT), the amount of information available has grown so much that the main focus was to collect and store such data efficiently. Unfortunately, as often happens, security was initially overlooked, and this lack of protection led to several cyberattacks against privates, companies, and even national agencies. Indeed, data generated by IoT devices are usually stored on the Internet (e.g., on a cloud server) in such a way that they are virtually accessible to anybody at any time. Data in such a state is called extit{data at rest}. Access to those cloud servers is protected with some access control mechanisms, for example, enforced via software so that any user can access only data that he/she possesses. extit{Data Leakage} is an outpour of sensible information by a hacker that gained control of a cloud server and, therefore, can access every information stored on it. One solution is to encrypt data at rest. On the one hand, encryption addresses the data leakage problem, but, on the other hand, it makes data sharing complex. Attribute-Based-Encryption (ABE) is an asymmetric encryption scheme that allows one to mathematically enforce an Access Control Mechanism (ACM) during the decryption procedure so that only permitted entities can access the protected data. The main advantage of using ABE in (I)IoT systems is to achieve multiple-receiver encryption with fine-grained access control. ABE provides confidentiality for extit{data at rest} (e.g., stored on third-party cloud storage) while allowing parties with different access privileges to decrypt it. In this dissertation, we investigate the problem of engineering the Attribute-Based Encryption schemes within IoT (Internet of Things) and IIoT (Industrial IoT) systems. However, this displays tough challenges, particularly bandwidth consumption, feasibility over constrained devices, access policies management, and key management. Our investigation has been carried out in several directions. First, we compared the ABE approach with another similar technique in the literature, namely the Sticky Policy technique, to point out ABE potentialities. Secondly, we discuss some scenarios in which ABE can be adopted, while improving one of the original schemes. Then, we evaluate ABE performances in terms of bandwidth, energy consumption, computation time, and CPU load on a broad range of devices: from IoT constrained devices like the ESP32, to the RaspberryPi 3, to a more advanced automotive-compliant Xilinx ZCU 102 evaluation board. We also approach the related problems of: (i) reducing the encryption overhead of the ABE ciphertext; (ii) designing a recovery mechanism in case of key compromise; (iii) correctly selecting the most suitable ABE scheme for any IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
10

ALSHAYA, SHAYA ABDULLAH. "A Comprehensive Cyber Security Enhancing Strategy for Industrial Control Systems in Oil Industry." Doctoral thesis, 2017. http://hdl.handle.net/2158/1079706.

Full text
Abstract:
Industrial Control Systems (ICS) play a critical operational role in modern industrial sectors. Businesses depend on this automated control system for various operations to manage processes in the most benecial manner. Information and Communication Technology (ICT) has enhanced ICS development and implementation. However, such automation advancement may also create many new opportunities for cyberattacks. Certain industries, such as the oil industry within Gulf Cooperation Council (GCC) countries, have begun renewing industrial control systems and related management to counteract cyber-attacks more eectively. The technological system framework which is herewith mainly taken as reference are the Supervisory Control and Data Acquisition (SCADA) systems. The analysis and synthesis made through this Ph.D. thesis account for both technical and human factors impinging on cyber-security system performance. A comprehensive approach has thus adopted to qualify relevant scientic technical contributions available from the literature, as well as to exploit outcomes of actual direct experiences of the involved companies. For such a comprehensive approach some basic analytical contributions have been rst provided for: i) qualifying related scientic technical advancements within the cyber-security literature; ii) performing subjective testing within the community of IT operators of ICS, concerned with made experience and human behavior aecting cyber-security. Such analysis is tuned with the objective of dening and adopting an enhanced comprehensive cyber-security policy within enterprise for ICS operation, which properly accounts also for relevance of human factors. Therefore, nal made contribution is just denition and proposal of appropriate guidelines for such a purpose. Research activity thus carried out is framed with an interdisciplinary context, as needed to innovate enterprise cyber-security management, including specic support and management of enterprise human resources.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "SECURING INDUSTRIAL IOT"

1

Karimipour, Hadis, and Farnaz Derakhshan, eds. AI-Enabled Threat Detection and Security Analysis for Industrial IoT. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-76613-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Electronics, Maplin, ed. Home security projects: [a collection of useful design ideas for security devices around the home]. Oxford: Butterworth-Heinemann, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lobanov, Aleksey. Biomedical foundations of security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1007643.

Full text
Abstract:
The textbook discusses the threats and risks to life and health of people in post-industrial society. The role and place of medical and biological technologies in the system of ensuring the safety of the population of the Russian Federation are shown from the standpoint of an interdisciplinary approach. Briefly, but quite informative, the structure of the human body and the principles of its functioning are described. The specificity and mechanism of toxic effects on humans of harmful substances, energy effects and combined action of the main damaging factors of sources of emergency situations of peace and war are shown. The medical and biological aspects of ensuring the safety of human life in adverse environmental conditions, including in regions with hot and cold climates (Arctic) are considered. Means and methods of first aid to victims are shown. The questions of organization and carrying out of measures of medical support of the population in zones of emergency situations and the centers of defeat are covered. Designed for students, students and cadets of educational institutions of higher education, studying under the bachelor's program. It can also be useful for teachers, researchers and a wide range of professionals engaged in practical work on the planning and organization of biomedical protection of the population.
APA, Harvard, Vancouver, ISO, and other styles
4

Plaskova, Nataliya, and Natal'ya Prodanova. Economic analysis. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1069047.

Full text
Abstract:
The textbook reveals the theoretical foundations of economic analysis, modern methods and techniques of financial and managerial analysis of the activities of economic entities. The development of materials by students is necessary in their further practical activities, will contribute to improving the quality of analytical work in organizations of various industries and organizational and legal forms, and serve as a justification for the optimal strategy and tactics of doing business. It contains theoretical, methodological and practical questions of the basic academic discipline "Economic Analysis". Meets the requirements of the federal state educational standards of higher education of the latest generation. For bachelors studying in the fields of "Economics", "Management", "State and Municipal Management", "Economic Security".
APA, Harvard, Vancouver, ISO, and other styles
5

Gadzhiev, Nazirhan, Sergey Konovalenko, and Mihail Trofimov. Theoretical aspects of the formation and development of the ecological economy in Russia. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1836240.

Full text
Abstract:
The monograph is devoted to the place and role of ecology and environmental safety in ensuring sustainable socio-economic development of society. In the conditions of the forced transition of the economies of the leading countries of the world from an industrial type to a new formation of a green economy aimed at ensuring the preservation of ecological systems and the maximum reduction of damage to the biodiversity of ecological systems, the Russian Federation faces the task of forming a new course of socio-economic development of society focused on the preservation of natural potential and ecology at a level normal for the maintenance of the vital activity of society, flora and fauna in the foreseeable future and in the long term. The role and importance of environmental safety in the system of ensuring the economic security of the state are outlined, the concept of the ideology of "Global Commons" in ensuring sustainable socio-economic development of society is considered, the problems and prospects of the implementation of the program "Green Course of Russia" are analyzed, special aspects of environmental audit, accounting and control, damage assessment in the field of ecology are investigated. Special attention is paid to the forecast of the dynamics of key environmental indicators for the medium term. The main directions of increasing the effectiveness of the mechanism for ensuring environmental safety in a market economy are proposed. For a wide range of readers interested in environmental economics. It will be useful for students, postgraduates and teachers of economic universities.
APA, Harvard, Vancouver, ISO, and other styles
6

Butun, Ismail. Industrial IoT: Challenges, Design Principles, Applications, and Security. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Butun, Ismail. Industrial IoT: Challenges, Design Principles, Applications, and Security. Springer, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Le, Dac-Nhuong, Souvik Pal, and Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Le, Dac-Nhuong, Souvik Pal, and Vicente García Díaz. IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

IoT: Security and Privacy Paradigm. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "SECURING INDUSTRIAL IOT"

1

Kłos, Mateusz, and Imed El Fray. "Securing Event Logs with Blockchain for IoT." In Computer Information Systems and Industrial Management, 77–87. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47679-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vijayalakshmi, S. R., and S. Muruganand. "Industrial Internet of Things (IIoT) and Smart Industries." In Securing IoT in Industry 4.0 Applications with Blockchain, 51–79. Boca Raton: Auerbach Publications, 2021. http://dx.doi.org/10.1201/9781003175872-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sundaram, Saravana Kumari. "Industrial Internet of Things (IIoT) Applications." In Securing IoT in Industry 4.0 Applications with Blockchain, 115–36. Boca Raton: Auerbach Publications, 2021. http://dx.doi.org/10.1201/9781003175872-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Manzoor, Amir. "Securing Device Connectivity in the Industrial Internet of Things (IoT)." In Computer Communications and Networks, 3–22. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33124-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nagarajan, G., R. I. Minu, and T. Sasikala. "Intelligent Securing the Industrial IoT Data Based on Consensus Mechanism." In Lecture Notes in Mechanical Engineering, 373–80. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7909-4_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vijayakumar, J., and R. Maheswaran. "PLC and SCADA as Smart Services in Industry 4.0 for Industrial Automation Techniques." In Securing IoT in Industry 4.0 Applications with Blockchain, 297–318. Boca Raton: Auerbach Publications, 2021. http://dx.doi.org/10.1201/9781003175872-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maji, Raghunath, Atreyee Biswas, and Rituparna Chaki. "A Novel Proposal of Using NLP to Analyze IoT Apps Towards Securing User Data." In Computer Information Systems and Industrial Management, 156–68. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84340-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Agrawal, Megha, Jianying Zhou, and Donghoon Chang. "A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT." In Security and Privacy Trends in the Industrial Internet of Things, 71–94. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12330-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ahmed, Monjur, Sapna Jaidka, and Nurul I. Sarkar. "Security in Decentralised Computing, IoT and Industrial IoT." In Industrial IoT, 191–211. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42500-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ledwaba, Lehlogonolo P. I., and Gerhard P. Hancke. "Security Challenges for Industrial IoT." In Wireless Networks and Industrial IoT, 193–206. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51473-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SECURING INDUSTRIAL IOT"

1

Forsstrom, Stefan, Ismail Butun, Mohamed Eldefrawy, Ulf Jennehag, and Mikael Gidlund. "Challenges of Securing the Industrial Internet of Things Value Chain." In 2018 Workshop on Metrology for Industry 4.0 and IoT. IEEE, 2018. http://dx.doi.org/10.1109/metroi4.2018.8428344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

O'Raw, John, David Laverty, and D. John Morrow. "Securing the Industrial Internet of Things for Critical Infrastructure (IIoT-CI)." In 2019 IEEE 5th World Forum on Internet of Things (WF-IoT'19). IEEE, 2019. http://dx.doi.org/10.1109/wf-iot.2019.8767279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Usman, Muhammad, and Nazar Abbas. "On the Application of IOT (Internet of Things) for Securing Industrial Threats." In 2014 12th International Conference on Frontiers of Information Technology (FIT). IEEE, 2014. http://dx.doi.org/10.1109/fit.2014.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kolluru, Katyayani Kiranmayee, Cristina Paniagua, Jan van Deventer, Jens Eliasson, Jerker Delsing, and Rance J. DeLong. "An AAA solution for securing industrial IoT devices using next generation access control." In 2018 IEEE Industrial Cyber-Physical Systems (ICPS). IEEE, 2018. http://dx.doi.org/10.1109/icphys.2018.8390799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Murray, Iain. "Keynote Address-2: Securing critical infrastructure and the IIoT." In SLIIT 2nd International Conference on Engineering and Technology. SLIIT, 2023. http://dx.doi.org/10.54389/iqpv3890.

Full text
Abstract:
With the advent of the IoT and its application in industrial settings, there is a significant gap in security policy and implementation as data traverses the traditional Operational Technology (OT) infrastructure and into the IT space. Data gathered in the OT environment now needs to traverse the corporate network to decision makers opening up an array of security and compatibility issues that need to be addressed to keep our critical infrastructure safe.
APA, Harvard, Vancouver, ISO, and other styles
6

Asare, Bismark Tei, Kester Quist-Aphetsi, and Laurent Nana. "A Hybrid Lightweight Cryptographic Scheme For Securing Node Data Based On The Feistel Cipher And MD5 Hash Algorithm In A Local IoT Network." In 2019 International Conference on Mechatronics, Remote Sensing, Information Systems and Industrial Information Technologies (ICMRSISIIT). IEEE, 2019. http://dx.doi.org/10.1109/icmrsisiit46373.2020.9405869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar, Rakesh, Bipin Kandpal, and Vasim Ahmad. "Industrial IoT (IIOT): Security Threats and Countermeasures." In 2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA). IEEE, 2023. http://dx.doi.org/10.1109/icidca56705.2023.10100145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Neville, Karen, and Philip Powell. "Securing Security through Education." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2716.

Full text
Abstract:
Traditionally security has been the pervasive factor in organizational growth but its importance has surpassed that of any other issue in retaining a competitive advantage. Security is, therefore, of paramount importance in the retention of organizational innovation. The key in building a secure environment lies in an organizations ability to react to changing threats both from within and external to the case. The objective of security is to protect corporate knowledge as well that of the tangible asset. It is ironic that to secure knowledge the organization must expand its knowledge of security. To this end universities are currently striving to produce educational programmes to meet industrial demand for this core requirement. The amalgamation of theoretical research and industrial practice in Third level programmes is vital to ensure ongoing industrial support for academia. To this end the case under investigation strives to produce IT graduates with the ability to utilize theoretical knowledge, particularly of security, in a practitioners domain. The construction and implementation of any course is very much emergent, given the unique institutional nature of academic programmes. This paper conducts an analysis of an approach in delivering practical, as well as theoretical, knowledge of security, using a unique project to enable the learners to utilize the theoretical knowledge gained through the classroom.
APA, Harvard, Vancouver, ISO, and other styles
9

Nikolić, Vojkan, Zoran Stević, Stefana Janićijević, and Dragan Kreculj. "Possibilities of IIOT application platforms in the electrical power systems." In 8th International Conference on Renewable Electrical Power Sources. SMEITS, 2020. http://dx.doi.org/10.24094/mkoiee.020.8.1.255.

Full text
Abstract:
Nowadays in the market there are different Internet of Things (IoT) devices, that are used in electrical power systems. Such IoT devices can be physically, or virtually networked, with interoperable communication protocols and intelligent interfaces. IoT technologies provide their connection to the internet, as well as connection to special services and applications. Electrical power systems have traditional Enterprise resource planning (ERP), Supervisory control and data acquisition (SCADA), Distributed control systems (DCSs), as well as traditional industrial automation stack to achieve functional integration between the company management level and the production level. Industrial IoT (IIoT) platforms should overcome the gap between Information technology (IT) and Operational technology (OT) environments. These platforms providing a more suitable data architecture for the modern industrial automation stack. The paper presents the overview of one modern solution with the Claroty IIoT platform. Claroty delivers comprehensive and reduces the complexity of OT security.
APA, Harvard, Vancouver, ISO, and other styles
10

Fabri, Vladimir, Miroslav Stefanović, Đorđe Pržulj, Teodora Vučković, and Rogerio Dionisio. "INDUSTRIAL INTERNET OF THINGS (IIOT) - SECURITY WEAKNESSES AND MOST COMMON TYPES OF ATTACKS – A SYSTEMATIC LITERATURE REVIEW." In 19th International Scientific Conference on Industrial Systems. Faculty of Technical Sciences, 2023. http://dx.doi.org/10.24867/is-2023-t4.1-9_05441.

Full text
Abstract:
In recent years there has been a growing interest in the Industrial Internet of Things (IIoT) coming from business and scientific communities alike. One of the elementary concepts of the proposed Industry 4.0 is the IIoT which proposes the implementation of the regular Internet of Things (IoT) concept on a much larger scale within the industrial facilities, thus interconnecting devices in industrial settings. While the main focus of the scientific community is on the cost/benefit analysis and practical application of the mentioned concept, one often overlooked aspect is its security. The following paper presents a comprehensive systematic literature review for the Industrial Internet of Things security. It contains a review of the most common types of attacks committed within the Industrial Internet of Things and a consequential analysis of the weaknesses those attacks exposed.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SECURING INDUSTRIAL IOT"

1

Falco, J., K. Stouffer, A. Wavering, and F. Proctor. IT security for industrial control systems. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.ir.6859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kelsey, Tom. When Missions Fail: Lessons in ‘High Technology’ From Post-War Britain. Blavatnik School of Government, December 2023. http://dx.doi.org/10.35489/bsg-wp_2023/056.

Full text
Abstract:
The idea that national security and economic prosperity stem from being at the technological frontier (‘techno-nationalism’) is once again a dominant feature of global politics. The post-war United States has emerged as the key model in these discussions, with the ‘moonshot’ seen as an outstanding example of how to direct state resources towards technological breakthroughs, while the capacity of the American government is praised more generally for its ability to sponsor ground-breaking technology. This paper, however, suggests that the United States was the exception, not the rule, and that the failures of post-war Britain highlight the limitations of ‘techno-nationalism’ with vivid clarity. During the 1950s and 1960s, the British state took long-term bets on securing a leading role in the world’s technological future, specifically in the areas of supersonic flight via Concorde and nuclear power generation. The result, however, was not export glory but industrial calamity. These long-running programmes were eventually cut back in the 1970s, when it became accepted in Whitehall that Britain should no longer try to be the Science and Tech Superpower, attempting to leapfrog the United States to technological glory. Understanding this trajectory in Britain dislodges the sense that focusing on emerging technology and the long term is a silver bullet in policymaking. We must appreciate that the realities of technological power matter, and grasp that the post-war US was an unrepresentative case: no country today will have the relative level of industrial and technological might that it enjoyed at that time. While my arguments will resonate in other national contexts, my focus is on ensuring that any strategy for ‘high technology’ in the UK today continues to learn the lessons from the errors of the post-war period. It must be wary of expert capture within the state. It must also think about industrial strategy in an integrated way, across national security, economics, and foreign policy, with a policymaking machinery set up to deal with this level of complexity. Moreover, despite the attention afforded to national state funding, the UK should continue to see forging alliances as essential alongside working with international business and be clear-eyed about where it does and does not need to sustain national capabilities.
APA, Harvard, Vancouver, ISO, and other styles
3

Hinojosa, Jorge Luis, Saúl Villamizar, and Nathalia Gama. Green Hydrogen Opportunities for the Caribbean. Inter-American Development Bank, January 2023. http://dx.doi.org/10.18235/0004621.

Full text
Abstract:
The decarbonization of the energy, transport, and industrial sectors is an essential part of achieving net-zero CO2 emissions, to limit global warming to 1.5C above pre-industrial levels. Green hydrogen is emerging as one of the most versatile climate change mitigation tools, since it poses a unique potential to decarbonize hard-to-abate sectors, such as freight transport, energy-intensive industries, and power systems highly dominated by fossil fuels. It also holds an alternative to produce fuels and chemical feedstock locally, using renewable energy without dependency on imported fuel, energy, or commodities. The Caribbean has defined as a priority its aim to enhance its energy security with resilient and low-carbon technologies while improving reliability, affordability, and sustainability of energy services. This report aims to contribute to the ongoing discussion on the role that green hydrogen can play to support the achievement of these goals and to provide an overview and guide for decision-makers in this area. Even though hydrogen is currently expensive for most applications at a global level, the exponential decrease in renewable energy costs in the last decade and the expected accelerated cost reduction of hydrogen technologies in the upcoming years are projected to drive an increase in the attractiveness of green hydrogen worldwide. As Caribbean countries are in the early stages of developing their renewable energy potential, there are opportunities to keep the cost decline of renewable energy production, enabling green hydrogen to get closer to achieving cost-competitiveness and could eventually become economically viable and a more broadly adopted solution.
APA, Harvard, Vancouver, ISO, and other styles
4

Carlile, Rachel, Matthew Kessler, and Tara Garnett. What is food sovereignty? TABLE, May 2021. http://dx.doi.org/10.56661/f07b52cc.

Full text
Abstract:
Food sovereignty, “the right of peoples to healthy and culturally appropriate food produced through ecologically sound and sustainable methods, and their right to define their own food and agriculture systems,” is often discussed as an alternative political framework and approach to food security (Nyéléni, 2007). Food sovereignty has grown as a countermovement to the growing dominance of industrial agricultural practices, the increasing power of corporations in the global food system, and the convergence of diets towards more imported and processed foods. This explainer explores food sovereignty as a concept and movement, how it differs from the concept of food security, criticisms of the movement, and evolving definitions.
APA, Harvard, Vancouver, ISO, and other styles
5

Torvikey, Gertrude Dzifa, and Fred Mawunyo Dzanku. In the Shadow of Industrial Companies: Class and Spatial Dynamics of Artisanal Palm Oil Processing in Rural Ghana. Institute of Development Studies (IDS), March 2022. http://dx.doi.org/10.19088/apra.2022.010.

Full text
Abstract:
This paper is concerned with the multiple opportunities and challenges of artisanal palm oil processing and the potential multiplier effects on local economies. It examines the effect of the presence of large oil palm plantations and their industrial processing mills on artisanal palm oil processing in two districts in the Western region of Ghana. Although artisanal and industrial processors have co-existed for a long time in the same catchment areas, little is known about the impact of this relationship on artisanal processing. Acknowledging the importance of rural diversity, complexity, and difference in agriculture-based off-farm activities, this paper also examines the effect of community and household level factors on palm oil processing incidence and intensity as well as the impact of processing on food (in)security.
APA, Harvard, Vancouver, ISO, and other styles
6

Hrytsenko, Olena. Sociocultural and informational and communication transformations of a new type of society (problems of preserving national identity and national media space). Ivan Franko National University of Lviv, February 2022. http://dx.doi.org/10.30970/vjo.2022.51.11406.

Full text
Abstract:
The problems of the correlation of cosmopolitan and national identities are too complex to be unambiguous assessment, let alone alternative values (related to the ecological paradigm and the spiritual traditions of other cultures). However, it is obvious that without preserving the national identity, the integrity and independence of the national state becomes problematic. On the other hand, without taking into account the consequences of information wars and aggressive cosmopolitan tendencies of global media culture, there is a threat of losing the national information space and displacing it to the periphery of socio-political and economic life in Ukraine and in the modern world. In the process of working on research issues, the author of the article came out on the principles of objectivity, systematic and determinism, which in combination of their observance made it possible to determine the influence of the post-industrial information society on the formation of a new type of mass consciousness. As a result of the influence of globalization processes, there was a filling of the domestic information space with a supernational mass culture of entertainment, which in most cases leads to the spread of a primitive world outlook based on the ideology of consumption society, without leaving places to preserve sociocultural traditions and national identity. Therefore, given the problems of preserving national identity, it is necessary should be mentioned the information security of the state, which occupies one of the most important places, among various aspects of information security, since the unresolved problem of protection of the national information space significantly complicates the processes of formation of national identity.
APA, Harvard, Vancouver, ISO, and other styles
7

Zholdayakova, Saule, Yerdaulet Abuov, Daulet Zhakupov, Botakoz Suleimenova, and Alisa Kim. Toward a Hydrogen Economy in Kazakhstan. Asian Development Bank Institute, October 2022. http://dx.doi.org/10.56506/iwlu3832.

Full text
Abstract:
The energy transition is driving governments and industries to adopt various measures to reduce their climate impacts while maintaining the stability of their economy. Hydrogen technologies are one of the central topics in the energy transition. Different nations have different stances on it. Some governments see hydrogen as a decarbonization tool or part of their energy security strategy, while some others see it as a potential export commodity. While identifying priorities for the future, Kazakhstan should clearly define the role of hydrogen in the country’s long-term energy and decarbonization strategy. This work presents the first country-scale assessment of hydrogen technologies in Kazakhstan by focusing on policy, technology and economy aspects. A preliminary analysis has shown that Kazakhstan should approach hydrogen mainly as a part of its long-term decarbonization strategy. While coping with the financial risks of launching a hydrogen economy, the country can benefit from the export potential of low-carbon hydrogen in the near term. The export potential of low-carbon hydrogen in Kazakhstan is justified by its proximity to the largest hydrogen markets, huge resource base, and potentially low cost of production (in the case of blue hydrogen). Technology options for hydrogen transportation and storage for Kazakhstan are discussed in our work. The paper also identifies target hydrogen utilization areas in emission sectors regulated by Kazakhstan’s Emissions Trading System.
APA, Harvard, Vancouver, ISO, and other styles
8

Harangozó, Dániel. Serbia and the Russia–Ukraine War: Implications and Challenges II. Külügyi és Külgazdasági Intézet, 2022. http://dx.doi.org/10.47683/kkielemzesek.ke-2022.65.

Full text
Abstract:
The outbreak of the Russia-Ukraine war in February 2022 has had a marked effect on the Western Balkan region. Among the countries of this region, Serbia is in a unique situation due to its military neutrality, and the fact that it follows a balancing foreign policy between the Western powers on the one hand, and Russia, Turkey, and China on the other hand, also maintaining close political, economic, and security ties with the latter two powers. The second part of the paper continues to review the consequences and challenges of the war on Serbia by examining the energy domain. Russian exposure in Serbia’s energy sector, apart from the near-total reliance on Moscow for gas imports, is compounded by the fact that the most important oil company of the country, Naftna Industrija Srbije (NIS) is majority-owned by Gazprom Group. As with other countries in the Central and Eastern European region as well as wider Europe, the diversification of sources and decreasing the reliance on Russian energy will take considerable time for Serbia. Cooperation both with Serbia’s neighbours and the countries of the region (e.g. Bulgaria and Greece) will play a significant role in the diversification of both sources and supply routes.
APA, Harvard, Vancouver, ISO, and other styles
9

Wendt-Lucas, Nicola, and Ana de Jesus. The Role of 5G in the Transition to a Digital and Green Economy in the Nordic and Baltic Countries: Analytic Report. Nordregio, June 2023. http://dx.doi.org/10.6027/r2023:7.1403-2503.

Full text
Abstract:
The report provides an overview of the status of 5G roll-out and its industrial uptake in the Nordic-Baltic region. The aim is not only to present the roll-out status across the region but also to put these insights into a broader political and technological context. The report describes some of the most relevant testbeds and policy initiatives, provides examples of successful and promising use cases, and highlights existing strengths and ongoing challenges in the Nordic-Baltic region. Juxtaposing these against established goals emphasises areas for possible future cooperation and knowledge exchange between the Nordic and Baltic actors to encourage sustainable innovation and competitiveness across the region. The report reveals notable variations in the progress of 5G coverage among the Nordic-Baltic countries. Denmark and Finland have made significant strides and surpassed the European Union average regarding 5G coverage, while other countries still face challenges in catching up. Despite the presence of numerous 5G activities, such as testbeds and innovation hubs, a considerable number of initiatives remain in the testing and prototyping stage. The report indicates that the full potential of 5G for innovation and competitiveness in the Nordic-Baltic region has yet to be fully realised. With the accelerated digitalisation brought by 5G, the importance of cyber security considerations increases. As 5G networks increase electricity demand, it is essential to consider the environmental footprint and societal effects of their rollout. While 5G has immense potential, it necessitates significant adjustments in various areas, including network infrastructure, systems, applications, data ethics, privacy, and workforce implications. Challenges related to social inclusion further underscore the importance of cooperation and synergy across the region. The report highlights the need for increased knowledge exchange, the formulation of common roadmaps, and the establishment of guidelines to promote harmonised 5G deployment. Collaborative efforts among stakeholders are crucial for maximising the benefits of 5G technology in the Nordic and Baltic countries.
APA, Harvard, Vancouver, ISO, and other styles
10

Lazonick, William, and Matt Hopkins. Why the CHIPS Are Down: Stock Buybacks and Subsidies in the U.S. Semiconductor Industry. Institute for New Economic Thinking Working Paper Series, September 2021. http://dx.doi.org/10.36687/inetwp165.

Full text
Abstract:
The Semiconductor Industry Association (SIA) is promoting the Creating Helpful Incentives to Produce Semiconductors (CHIPS) for America Act, introduced in Congress in June 2020. An SIA press release describes the bill as “bipartisan legislation that would invest tens of billions of dollars in semiconductor manufacturing incentives and research initiatives over the next 5-10 years to strengthen and sustain American leadership in chip technology, which is essential to our country’s economy and national security.” On June 8, 2021, the Senate approved $52 billion for the CHIPS for America Act, dedicated to supporting the U.S. semiconductor industry over the next decade. As of this writing, the Act awaits approval in the House of Representatives. This paper highlights a curious paradox: Most of the SIA corporate members now lobbying for the CHIPS for America Act have squandered past support that the U.S. semiconductor industry has received from the U.S. government for decades by using their corporate cash to do buybacks to boost their own companies’ stock prices. Among the SIA corporate signatories of the letter to President Biden, the five largest stock repurchasers—Intel, IBM, Qualcomm, Texas Instruments, and Broadcom—did a combined $249 billion in buybacks over the decade 2011-2020, equal to 71 percent of their profits and almost five times the subsidies over the next decade for which the SIA is lobbying. In addition, among the members of the Semiconductors in America Coalition (SIAC), formed specifically in May 2021 to lobby Congress for the passage of the CHIPS for America Act, are Apple, Microsoft, Cisco, and Google. These firms spent a combined $633 billion on buybacks during 2011-2020. That is about 12 times the government subsidies provided under the CHIPS for America Act to support semiconductor fabrication in the United States in the upcoming decade. If the Congress wants to achieve the legislation’s stated purpose of promoting major new investments in semiconductors, it needs to deal with this paradox. It could, for example, require the SIA and SIAC to extract pledges from its member corporations that they will cease doing stock buybacks as open-market repurchases over the next ten years. Such regulation could be a first step in rescinding Securities and Exchange Commission Rule 10b-18, which has since 1982 been a major cause of extreme income inequality and loss of global industrial competitiveness in the United States.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography