Interlocking IT/OT security for edge cloud-enabled manufacturing
After an initial push to outsource every single computation to remote data centers, the edge compute paradigm can now provide the necessary balance of scalability and timeliness for successful manufacturing deployments. By consolidating compute resources that were previously distributed across the s...
Saved in:
Published in | Ad hoc networks Vol. 154; p. 103384 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.03.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | After an initial push to outsource every single computation to remote data centers, the edge compute paradigm can now provide the necessary balance of scalability and timeliness for successful manufacturing deployments. By consolidating compute resources that were previously distributed across the shop floor, a major emphasis is being placed on the manufacturing network, which has adapted to its new role by converging the IT and OT domains into a scalable, timely, highly available, and secure network.
This work centers around security mechanisms to secure virtualization-based manufacturing. Our proposed concept uses only measures in the network layer, where we see the greatest benefits, while providing the possibility to deploy it in brownfield environments today. Validation is performed by challenging it with known and emerging security threats, the cyber kill chain, and IEC 62443-3-3, improving the security level in most metrics in contrast to perimeter-based legacy architectures. In future work, the validated concept can be extended to the physical, host and application layers, providing holistic IT/OT security and enabling secure edge cloud-enabled manufacturing. |
---|---|
AbstractList | After an initial push to outsource every single computation to remote data centers, the edge compute paradigm can now provide the necessary balance of scalability and timeliness for successful manufacturing deployments. By consolidating compute resources that were previously distributed across the shop floor, a major emphasis is being placed on the manufacturing network, which has adapted to its new role by converging the IT and OT domains into a scalable, timely, highly available, and secure network.
This work centers around security mechanisms to secure virtualization-based manufacturing. Our proposed concept uses only measures in the network layer, where we see the greatest benefits, while providing the possibility to deploy it in brownfield environments today. Validation is performed by challenging it with known and emerging security threats, the cyber kill chain, and IEC 62443-3-3, improving the security level in most metrics in contrast to perimeter-based legacy architectures. In future work, the validated concept can be extended to the physical, host and application layers, providing holistic IT/OT security and enabling secure edge cloud-enabled manufacturing. |
ArticleNumber | 103384 |
Author | Großmann, Daniel Kampa, Thomas Müller, Christian Klaus |
Author_xml | – sequence: 1 givenname: Thomas orcidid: 0000-0002-7738-8205 surname: Kampa fullname: Kampa, Thomas email: thomas.kampa@thi.de, tho-ka@web.de organization: AImotion Bavaria, Technische Hochschule Ingolstadt, Esplanade 10, Ingolstadt, 85049, Bavaria, Germany – sequence: 2 givenname: Christian Klaus surname: Müller fullname: Müller, Christian Klaus organization: AUDI AG, Auto-Union-Str. 1, Ingolstadt, 85057, Bavaria, Germany – sequence: 3 givenname: Daniel surname: Großmann fullname: Großmann, Daniel organization: AImotion Bavaria, Technische Hochschule Ingolstadt, Esplanade 10, Ingolstadt, 85049, Bavaria, Germany |
BookMark | eNqFkE1LAzEQhoNUsK3-Ai_7B7adJPuRHgSlaC0UeqnnkE1ma-o2kSQV-u_dWvHgQU8zDPO88D4jMnDeISG3FCYUaDXdTZR59XrCgPH-wrkoLsiQljXkoqZ88LNDeUVGMe4A2IwBHZL7pUsYOq_frNtmy810vcki6kOw6Zi1PmRotpjpzh9Mjk41HZpsr9yhVTr1T257TS5b1UW8-Z5j8vL0uJk_56v1Yjl_WOWaFyLlAljdaMoq5Iw2vK1FxRBZqVRVC14U3LAGsJhBCdxQEG0NyqhKGd2AVhXnY8LPuTr4GAO28j3YvQpHSUGeJMid_JIgTxLkWUJPzX5R2iaVrHcpKNv9w96dWexrfVgMMmqLTqOxAXWSxts_-U9C6nqG |
CitedBy_id | crossref_primary_10_3390_s25010213 |
Cites_doi | 10.1109/JIOT.2020.3025775 10.1109/JIOT.2019.2912022 10.1109/ACCESS.2019.2956748 10.1016/j.adhoc.2013.05.003 10.1016/j.procir.2016.07.041 10.1016/j.jmsy.2020.10.011 10.3390/fi13100258 10.1016/j.comcom.2020.03.007 10.1109/COMST.2020.3011208 10.1016/j.comnet.2022.109075 |
ContentType | Journal Article |
Copyright | 2023 The Authors |
Copyright_xml | – notice: 2023 The Authors |
DBID | 6I. AAFTH AAYXX CITATION |
DOI | 10.1016/j.adhoc.2023.103384 |
DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1570-8713 |
ExternalDocumentID | 10_1016_j_adhoc_2023_103384 S1570870523003049 |
GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 23M 4.4 457 4G. 5GY 5VS 6I. 6OB 7-5 71M 8P~ AACTN AAEDT AAEDW AAFTH AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABJNI ABMAC ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BJAXD BKOJK BLXMC CS3 EBS EFJIC EFLBG EO8 EO9 EP2 EP3 FDB FEDTE FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF IHE J1W JJJVA KOM M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 ROL RPZ SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K ~G- AATTM AAXKI AAYWO AAYXX ABFNM ABWVN ABXDB ACNNM ACRPL ACVFH ADCNI ADJOM ADMUD ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION EJD HZ~ RIG SSH UHS |
ID | FETCH-LOGICAL-c348t-8027bc126e321b3f7862ee25aa6783443d2b0e490503d108f70ada6adcb0ca633 |
IEDL.DBID | .~1 |
ISSN | 1570-8705 |
IngestDate | Tue Jul 01 01:11:27 EDT 2025 Thu Apr 24 23:03:47 EDT 2025 Sat Feb 17 16:08:19 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | ICS Micro-segmentation IT/OT convergence Industrial Ethernet Virtualization |
Language | English |
License | This is an open access article under the CC BY license. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c348t-8027bc126e321b3f7862ee25aa6783443d2b0e490503d108f70ada6adcb0ca633 |
ORCID | 0000-0002-7738-8205 |
OpenAccessLink | https://www.sciencedirect.com/science/article/pii/S1570870523003049 |
ParticipantIDs | crossref_primary_10_1016_j_adhoc_2023_103384 crossref_citationtrail_10_1016_j_adhoc_2023_103384 elsevier_sciencedirect_doi_10_1016_j_adhoc_2023_103384 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-03-01 2024-03-00 |
PublicationDateYYYYMMDD | 2024-03-01 |
PublicationDate_xml | – month: 03 year: 2024 text: 2024-03-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | Ad hoc networks |
PublicationYear | 2024 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | Foschini, Mignardi, Montanari, Scotece (b13) 2021; 13 Kumar, Hu, Andersen, Popa, Culler (b25) 2019 International Electrotechnical Commission (b34) 2016 Kindervag (b2) 2010 Ambrosy, Kampa, Jumar, Großmann (b27) 2022 Åkerberg, Björkman (b41) 2009 Ehrlich, Trsek, Wisniewski, Jasperneite (b12) 2019 HMS (b26) 2023 Cheminod, Durante, Seno, Valenza, Valenzano, Zunino (b14) 2017 Hassija, Chamola, Gupta, Jain, Guizani (b44) 2020; 8 Langer, Bermbach (b32) 2022; 213 Assante, Lee (b38) 2015 Franke, Sibold, Teichel, Dansarie, Sundblad (b31) 2020 5G Alliance for Connected Industries and Automation (b29) 2023 Sebastian Rohr (b40) 2019 Lackorzynski, Köpsell, Strufe (b15) 2019 Zolanvari, Teixeira, Gupta, Khan, Jain (b23) 2019; 6 Kothmayr, Schmitt, Hu, Brünig, Carle (b24) 2013; 11 Bundesamt für Sicherheit in der Informationstechnik (b30) 2022 Alladi, Chamola, Zeadally (b20) 2020; 155 International Electrotechnical Commission, D.I.N (b35) 2020 Arifeen, Petrovski, Petrovski (b22) 2021 Schmittner, Shaaban, Macher (b18) 2022 Smith, Kreeger (b6) 2016 Lockheed Martin (b36) 2021 Kampa, Mueller, Grossmann (b3) 2022 Sung, Rao, Xie, Maltz (b21) 2008 Yadav, Rao (b37) 2015 Thames, Schaefer (b1) 2016; 52 Ward, Beyer (b16) 2014 Mosteiro-Sanchez, Barcelo, Astorga, Urbieta (b10) 2020; 57 IEEE, IEEE Standard for Local and Metropolitan Area Networks–Media Access Control (MAC) Security, IEEE Std 802.1AE-2018, 2018. Kobzan, Schriegel, Althoff, Boschmann, Otto, Jasperneite (b9) 2018 Tange, de Donno, Fafoutis, Dragoni (b11) 2020; 22 IEC (b42) 2001 Walz, Niemann, Göppert, Fischer, Merklin, Ziegler, Sikora (b43) 2023 Nelson (b4) 2016 5G Alliance for Connected Industries and Automation (b28) 2021 Mizrahi (b33) 2011 Baker (b17) 2020 Alladi, Chamola, Parizi, Choo (b19) 2019; 7 P. Pols, J. van den Berg, The Unified Kill Chain, (CSA Thesis), Hague, 2017, pp. 1–104. IEEE, IEEE Standard for Local and Metropolitan Area Networks–Frame Replication and Elimination for Reliability, IEEE Std 802.1 CB-2017, 2017, pp. 1–102. Cisco (b7) 2023 IEC (10.1016/j.adhoc.2023.103384_b42) 2001 Yadav (10.1016/j.adhoc.2023.103384_b37) 2015 Nelson (10.1016/j.adhoc.2023.103384_b4) 2016 Kobzan (10.1016/j.adhoc.2023.103384_b9) 2018 Mosteiro-Sanchez (10.1016/j.adhoc.2023.103384_b10) 2020; 57 Lackorzynski (10.1016/j.adhoc.2023.103384_b15) 2019 Hassija (10.1016/j.adhoc.2023.103384_b44) 2020; 8 Zolanvari (10.1016/j.adhoc.2023.103384_b23) 2019; 6 International Electrotechnical Commission (10.1016/j.adhoc.2023.103384_b34) 2016 5G Alliance for Connected Industries and Automation (10.1016/j.adhoc.2023.103384_b28) 2021 Bundesamt für Sicherheit in der Informationstechnik (10.1016/j.adhoc.2023.103384_b30) 2022 Kumar (10.1016/j.adhoc.2023.103384_b25) 2019 HMS (10.1016/j.adhoc.2023.103384_b26) 2023 Franke (10.1016/j.adhoc.2023.103384_b31) 2020 10.1016/j.adhoc.2023.103384_b39 Cheminod (10.1016/j.adhoc.2023.103384_b14) 2017 Lockheed Martin (10.1016/j.adhoc.2023.103384_b36) 2021 Kampa (10.1016/j.adhoc.2023.103384_b3) 2022 10.1016/j.adhoc.2023.103384_b5 Thames (10.1016/j.adhoc.2023.103384_b1) 2016; 52 Ward (10.1016/j.adhoc.2023.103384_b16) 2014 Mizrahi (10.1016/j.adhoc.2023.103384_b33) 2011 Schmittner (10.1016/j.adhoc.2023.103384_b18) 2022 10.1016/j.adhoc.2023.103384_b8 Langer (10.1016/j.adhoc.2023.103384_b32) 2022; 213 Kindervag (10.1016/j.adhoc.2023.103384_b2) 2010 Foschini (10.1016/j.adhoc.2023.103384_b13) 2021; 13 Cisco (10.1016/j.adhoc.2023.103384_b7) 2023 Kothmayr (10.1016/j.adhoc.2023.103384_b24) 2013; 11 Alladi (10.1016/j.adhoc.2023.103384_b19) 2019; 7 International Electrotechnical Commission (10.1016/j.adhoc.2023.103384_b35) 2020 Arifeen (10.1016/j.adhoc.2023.103384_b22) 2021 Tange (10.1016/j.adhoc.2023.103384_b11) 2020; 22 Smith (10.1016/j.adhoc.2023.103384_b6) 2016 Alladi (10.1016/j.adhoc.2023.103384_b20) 2020; 155 Ambrosy (10.1016/j.adhoc.2023.103384_b27) 2022 Sebastian Rohr (10.1016/j.adhoc.2023.103384_b40) 2019 Assante (10.1016/j.adhoc.2023.103384_b38) 2015 Baker (10.1016/j.adhoc.2023.103384_b17) 2020 Sung (10.1016/j.adhoc.2023.103384_b21) 2008 Åkerberg (10.1016/j.adhoc.2023.103384_b41) 2009 5G Alliance for Connected Industries and Automation (10.1016/j.adhoc.2023.103384_b29) 2023 Ehrlich (10.1016/j.adhoc.2023.103384_b12) 2019 Walz (10.1016/j.adhoc.2023.103384_b43) 2023 |
References_xml | – volume: 213 year: 2022 ident: b32 article-title: NTS4PTP—A comprehensive key management solution for PTP networks publication-title: Comput. Netw. – year: 2016 ident: b34 article-title: Industrial Communication Networks-High Availability Automation Networks-Part 3: Parallel Redundancy Protocol (PRP) and High-Availability Seamless Redundancy (HSR) Methods – start-page: 1 year: 2022 end-page: 6 ident: b27 article-title: 5G and DetNet: Towards holistic determinism in industrial networks publication-title: 2022 IEEE International Conference on Industrial Technology (ICIT) – year: 2014 ident: b16 article-title: Beyondcorp: A new approach to enterprise security – start-page: 1 year: 2019 end-page: 8 ident: b15 article-title: A comparative study on virtual private networks for future industrial communication systems publication-title: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS) – year: 2023 ident: b29 article-title: Industrial 5G edge computing – use cases, architecture and deployment – year: 2023 ident: b26 article-title: Continued growth for Industrial Ethernet and wireless networks – reference: P. Pols, J. van den Berg, The Unified Kill Chain, (CSA Thesis), Hague, 2017, pp. 1–104. – volume: 6 start-page: 6822 year: 2019 end-page: 6834 ident: b23 article-title: Machine learning-based network vulnerability analysis of industrial Internet of Things publication-title: IEEE Internet Things J. – start-page: 3 year: 2020 ident: b35 article-title: 62443-3-3: 2020.01 publication-title: Industrielle Kommunikationsnetze–IT-Sicherheit für Netze und Systeme–Teil – volume: 8 start-page: 6222 year: 2020 end-page: 6246 ident: b44 article-title: A survey on supply chain security: Application areas, security threats, and solution architectures publication-title: IEEE Internet Things J. – year: 2020 ident: b17 article-title: BeyondProd: The Origin of Cloud-Native Security at Google – start-page: 1105 year: 2018 end-page: 1108 ident: b9 article-title: Secure and time-sensitive communication for remote process control and monitoring publication-title: 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), Vol. 1 – volume: 7 start-page: 176935 year: 2019 end-page: 176951 ident: b19 article-title: Blockchain applications for industry 4.0 and industrial IoT: A review publication-title: IEEE Access – year: 2019 ident: b40 article-title: Industrial IT Security: Effizienter Schutz Vernetzter Produktionslinien – reference: IEEE, IEEE Standard for Local and Metropolitan Area Networks–Media Access Control (MAC) Security, IEEE Std 802.1AE-2018, 2018. – start-page: 1 year: 2021 end-page: 6 ident: b22 article-title: Automated microsegmentation for lateral movement prevention in industrial internet of things (IIoT) publication-title: 2021 14th International Conference on Security of Information and Networks (SIN), Vol. 1 – volume: 22 start-page: 2489 year: 2020 end-page: 2520 ident: b11 article-title: A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities publication-title: IEEE Commun. Surv. Tutor. – year: 2022 ident: b30 article-title: Industrial control system security top 10 bedrohungen und gegenmaßnahmen 2022 – year: 2016 ident: b6 article-title: VXLAN group policy option – start-page: 1 year: 2022 end-page: 6 ident: b3 article-title: IP-based architecture for an edge cloud enabled factory: Concept and requirements publication-title: 2022 IEEE 18th International Conference on Factory Communication Systems (WFCS) – volume: 155 start-page: 1 year: 2020 end-page: 8 ident: b20 article-title: Industrial control systems: Cyberattack trends and countermeasures publication-title: Comput. Commun. – start-page: 1 year: 2023 end-page: 6 ident: b43 article-title: PROFINET security: A look on selected concepts for secure communication in the automation domain publication-title: 2023 IEEE 21st International Conference on Industrial Informatics (INDIN) – reference: IEEE, IEEE Standard for Local and Metropolitan Area Networks–Frame Replication and Elimination for Reliability, IEEE Std 802.1 CB-2017, 2017, pp. 1–102. – volume: 13 start-page: 258 year: 2021 ident: b13 article-title: An sdn-enabled architecture for it/ot converged networks: A proposal and qualitative analysis under ddos attacks publication-title: Future Internet – year: 2023 ident: b7 article-title: Cisco DNA center user guide, release 2.3.4: Configure a fabric zone – start-page: 24 year: 2015 ident: b38 article-title: The Industrial Control System Cyber Kill Chain, Vol. 1 – start-page: 1519 year: 2019 end-page: 1536 ident: b25 article-title: JEDI: Many-to-many end-to-end encryption and key delegation for IoT publication-title: USENIX Security Symposium – year: 2021 ident: b28 article-title: Security aspects of 5G for industrial networks – year: 2020 ident: b31 article-title: RFC 8915: Network time security for the network time protocol – year: 2016 ident: b4 article-title: The Impact of Dragonfly Malware on Industrial Control Systems – volume: 11 start-page: 2710 year: 2013 end-page: 2723 ident: b24 article-title: DTLS based security and two-way authentication for the Internet of Things publication-title: Ad Hoc Netw. – start-page: 1 year: 2022 end-page: 6 ident: b18 article-title: ThreatGet: Ensuring the implementation of defense-in-depth strategy for IIoT based on IEC 62443 publication-title: 2022 IEEE 5th International Conference on Industrial Cyber-Physical Systems (ICPS) – volume: 57 start-page: 367 year: 2020 end-page: 378 ident: b10 article-title: Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0 publication-title: J. Manuf. Syst. – year: 2010 ident: b2 article-title: Build Security into Your Network’s DNA: The Zero Trust Network Architecture, Vol. 27 – start-page: 67 year: 2009 end-page: 80 ident: b41 article-title: Exploring network security in profisafe publication-title: International Conference on Computer Safety, Reliability, and Security – start-page: 1 year: 2017 end-page: 7 ident: b14 article-title: Leveraging SDN to improve security in industrial networks publication-title: 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS) – year: 2001 ident: b42 article-title: 62280-2, Railway Applications Communi-Cation, Signaling and Processing Systems-Part 2: Safety-Related Communication in Open Transmission Systems – year: 2021 ident: b36 article-title: Cyber kill chain® – volume: 52 start-page: 12 year: 2016 end-page: 17 ident: b1 article-title: Software-defined cloud manufacturing for industry 4.0 publication-title: Procedia CIRP – start-page: 2849 year: 2019 end-page: 2854 ident: b12 article-title: Survey of security standards for an automated industrie 4.0 compatible manufacturing publication-title: IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society – start-page: 438 year: 2015 end-page: 452 ident: b37 article-title: Technical aspects of cyber kill chain publication-title: Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings 3 – start-page: 38 year: 2011 end-page: 43 ident: b33 article-title: Time synchronization security using IPsec and MACsec publication-title: 2011 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication – start-page: 1 year: 2008 end-page: 12 ident: b21 article-title: Towards systematic design of enterprise networks publication-title: Proceedings of the 2008 ACM CoNEXT Conference – start-page: 1519 year: 2019 ident: 10.1016/j.adhoc.2023.103384_b25 article-title: JEDI: Many-to-many end-to-end encryption and key delegation for IoT – start-page: 1 year: 2019 ident: 10.1016/j.adhoc.2023.103384_b15 article-title: A comparative study on virtual private networks for future industrial communication systems – year: 2023 ident: 10.1016/j.adhoc.2023.103384_b26 – start-page: 438 year: 2015 ident: 10.1016/j.adhoc.2023.103384_b37 article-title: Technical aspects of cyber kill chain – volume: 8 start-page: 6222 issue: 8 year: 2020 ident: 10.1016/j.adhoc.2023.103384_b44 article-title: A survey on supply chain security: Application areas, security threats, and solution architectures publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.3025775 – year: 2001 ident: 10.1016/j.adhoc.2023.103384_b42 – year: 2019 ident: 10.1016/j.adhoc.2023.103384_b40 – start-page: 24 year: 2015 ident: 10.1016/j.adhoc.2023.103384_b38 – year: 2010 ident: 10.1016/j.adhoc.2023.103384_b2 – year: 2020 ident: 10.1016/j.adhoc.2023.103384_b31 – year: 2016 ident: 10.1016/j.adhoc.2023.103384_b34 – year: 2022 ident: 10.1016/j.adhoc.2023.103384_b30 – start-page: 67 year: 2009 ident: 10.1016/j.adhoc.2023.103384_b41 article-title: Exploring network security in profisafe – start-page: 1 year: 2017 ident: 10.1016/j.adhoc.2023.103384_b14 article-title: Leveraging SDN to improve security in industrial networks – year: 2023 ident: 10.1016/j.adhoc.2023.103384_b29 – volume: 6 start-page: 6822 issue: 4 year: 2019 ident: 10.1016/j.adhoc.2023.103384_b23 article-title: Machine learning-based network vulnerability analysis of industrial Internet of Things publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2019.2912022 – start-page: 38 year: 2011 ident: 10.1016/j.adhoc.2023.103384_b33 article-title: Time synchronization security using IPsec and MACsec – year: 2021 ident: 10.1016/j.adhoc.2023.103384_b28 – ident: 10.1016/j.adhoc.2023.103384_b8 – volume: 7 start-page: 176935 year: 2019 ident: 10.1016/j.adhoc.2023.103384_b19 article-title: Blockchain applications for industry 4.0 and industrial IoT: A review publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2956748 – start-page: 1 year: 2022 ident: 10.1016/j.adhoc.2023.103384_b18 article-title: ThreatGet: Ensuring the implementation of defense-in-depth strategy for IIoT based on IEC 62443 – start-page: 1 year: 2022 ident: 10.1016/j.adhoc.2023.103384_b27 article-title: 5G and DetNet: Towards holistic determinism in industrial networks – year: 2016 ident: 10.1016/j.adhoc.2023.103384_b6 – start-page: 1 year: 2022 ident: 10.1016/j.adhoc.2023.103384_b3 article-title: IP-based architecture for an edge cloud enabled factory: Concept and requirements – volume: 11 start-page: 2710 issue: 8 year: 2013 ident: 10.1016/j.adhoc.2023.103384_b24 article-title: DTLS based security and two-way authentication for the Internet of Things publication-title: Ad Hoc Netw. doi: 10.1016/j.adhoc.2013.05.003 – year: 2014 ident: 10.1016/j.adhoc.2023.103384_b16 – year: 2016 ident: 10.1016/j.adhoc.2023.103384_b4 – year: 2023 ident: 10.1016/j.adhoc.2023.103384_b7 – volume: 52 start-page: 12 year: 2016 ident: 10.1016/j.adhoc.2023.103384_b1 article-title: Software-defined cloud manufacturing for industry 4.0 publication-title: Procedia CIRP doi: 10.1016/j.procir.2016.07.041 – start-page: 1 year: 2021 ident: 10.1016/j.adhoc.2023.103384_b22 article-title: Automated microsegmentation for lateral movement prevention in industrial internet of things (IIoT) – volume: 57 start-page: 367 year: 2020 ident: 10.1016/j.adhoc.2023.103384_b10 article-title: Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0 publication-title: J. Manuf. Syst. doi: 10.1016/j.jmsy.2020.10.011 – volume: 13 start-page: 258 issue: 10 year: 2021 ident: 10.1016/j.adhoc.2023.103384_b13 article-title: An sdn-enabled architecture for it/ot converged networks: A proposal and qualitative analysis under ddos attacks publication-title: Future Internet doi: 10.3390/fi13100258 – volume: 155 start-page: 1 year: 2020 ident: 10.1016/j.adhoc.2023.103384_b20 article-title: Industrial control systems: Cyberattack trends and countermeasures publication-title: Comput. Commun. doi: 10.1016/j.comcom.2020.03.007 – start-page: 1105 year: 2018 ident: 10.1016/j.adhoc.2023.103384_b9 article-title: Secure and time-sensitive communication for remote process control and monitoring – ident: 10.1016/j.adhoc.2023.103384_b39 – volume: 22 start-page: 2489 issue: 4 year: 2020 ident: 10.1016/j.adhoc.2023.103384_b11 article-title: A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2020.3011208 – volume: 213 year: 2022 ident: 10.1016/j.adhoc.2023.103384_b32 article-title: NTS4PTP—A comprehensive key management solution for PTP networks publication-title: Comput. Netw. doi: 10.1016/j.comnet.2022.109075 – start-page: 1 year: 2023 ident: 10.1016/j.adhoc.2023.103384_b43 article-title: PROFINET security: A look on selected concepts for secure communication in the automation domain – year: 2020 ident: 10.1016/j.adhoc.2023.103384_b17 – start-page: 2849 year: 2019 ident: 10.1016/j.adhoc.2023.103384_b12 article-title: Survey of security standards for an automated industrie 4.0 compatible manufacturing – year: 2021 ident: 10.1016/j.adhoc.2023.103384_b36 – start-page: 1 year: 2008 ident: 10.1016/j.adhoc.2023.103384_b21 article-title: Towards systematic design of enterprise networks – ident: 10.1016/j.adhoc.2023.103384_b5 – start-page: 3 year: 2020 ident: 10.1016/j.adhoc.2023.103384_b35 article-title: 62443-3-3: 2020.01 |
SSID | ssj0029201 |
Score | 2.3949041 |
Snippet | After an initial push to outsource every single computation to remote data centers, the edge compute paradigm can now provide the necessary balance of... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 103384 |
SubjectTerms | ICS Industrial Ethernet IT/OT convergence Micro-segmentation Virtualization |
Title | Interlocking IT/OT security for edge cloud-enabled manufacturing |
URI | https://dx.doi.org/10.1016/j.adhoc.2023.103384 |
Volume | 154 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwEA9jvuiD-InzY-TBR2vTJG3aN8dwbCpTdIO9lTRJcTK7odurf7u5tJUJsgefSksOyq_Xu8vl7ncIXTIZcWlC6SU6iD0us8SLOQ_tngfY4azLDcsq32HUH_O7SThpoG7dCwNllZXtL226s9bVE79C019Mp_5LEApitQ3SmnC-B018nAvQ8uuvnzIPGMZUcqYK4sHqmnnI1XhJ_ToHHkPKoPmcxfxv77TmcXp7aLcKFXGnfJt91DDFAdpZIxA8RDcuoWf9ESS88WDkP47wZzWRDttwFEO2DKvZfKU947qkNH6XxQraGVx_4hEa925H3b5XzUTwFOPx0joUKjIV0MgwGmQsF3ZHYgwNpYzcyAymaUYMT4DmRQckzgWRWkZSq4woGTF2jJrFvDAnCAdc5SyPExszJVwJktjQRQmWs0TbH5-yFqI1FqmqCMNhbsUsrSvD3lIHYAoApiWALXT1I7Qo-TI2L49qkNNfnz21Fn2T4Ol_Bc_Qtr3jZRnZOWouP1bmwsYVy6ztFKeNtjrd54cnuA7u-8NvutvKqA |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwED6VMgAD4inKMwMjIYntPLyBKqoWShlIpW6WYzuiqKQVtCu_HdtJqiKhDqyJLVlf7Lvz5bvvAK4xjwhXIXepDBKX8Iy6CSGhvvMYdTjtcsOS5TuIukPyOApHDWjXtTCGVlnZ_tKmW2tdPfEqNL3ZeOy9BmHs691m0prm_x7dgE2ij69pY3D7veR5mG5MpWhq7LtmeC09ZEleXL5NjZAhwqb6HCfkb_e04nI6e7BbxYrOfbmcfWio4gB2VhQED-HOZvS0QzIZb6eXei-p81W1pHN0POqYdJkjJtOFdJUtk5LOBy8Wpp7BFigewbDzkLa7btUUwRWYJHPtUVCciQBFCqMgw3msryRKoZDzyPbMwBJlviLU6LzIwE_y2OeSR1yKzBc8wvgYmsW0UCfgBETkOE-oDpooEbFPdewiYpxjKvXJR7gFqMaCiUox3DSumLCaGvbOLIDMAMhKAFtws5w0KwUz1g-PapDZr-_OtElfN_H0vxOvYKubPvdZvzd4OoNt_YaUnLJzaM4_F-pCBxnz7NJuoh88Zcqh |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Interlocking+IT%2FOT+security+for+edge+cloud-enabled+manufacturing&rft.jtitle=Ad+hoc+networks&rft.au=Kampa%2C+Thomas&rft.au=M%C3%BCller%2C+Christian+Klaus&rft.au=Gro%C3%9Fmann%2C+Daniel&rft.date=2024-03-01&rft.issn=1570-8705&rft.volume=154&rft.spage=103384&rft_id=info:doi/10.1016%2Fj.adhoc.2023.103384&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_adhoc_2023_103384 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1570-8705&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1570-8705&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1570-8705&client=summon |