Interlocking IT/OT security for edge cloud-enabled manufacturing

After an initial push to outsource every single computation to remote data centers, the edge compute paradigm can now provide the necessary balance of scalability and timeliness for successful manufacturing deployments. By consolidating compute resources that were previously distributed across the s...

Full description

Saved in:
Bibliographic Details
Published inAd hoc networks Vol. 154; p. 103384
Main Authors Kampa, Thomas, Müller, Christian Klaus, Großmann, Daniel
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.03.2024
Subjects
Online AccessGet full text

Cover

Loading…
Abstract After an initial push to outsource every single computation to remote data centers, the edge compute paradigm can now provide the necessary balance of scalability and timeliness for successful manufacturing deployments. By consolidating compute resources that were previously distributed across the shop floor, a major emphasis is being placed on the manufacturing network, which has adapted to its new role by converging the IT and OT domains into a scalable, timely, highly available, and secure network. This work centers around security mechanisms to secure virtualization-based manufacturing. Our proposed concept uses only measures in the network layer, where we see the greatest benefits, while providing the possibility to deploy it in brownfield environments today. Validation is performed by challenging it with known and emerging security threats, the cyber kill chain, and IEC 62443-3-3, improving the security level in most metrics in contrast to perimeter-based legacy architectures. In future work, the validated concept can be extended to the physical, host and application layers, providing holistic IT/OT security and enabling secure edge cloud-enabled manufacturing.
AbstractList After an initial push to outsource every single computation to remote data centers, the edge compute paradigm can now provide the necessary balance of scalability and timeliness for successful manufacturing deployments. By consolidating compute resources that were previously distributed across the shop floor, a major emphasis is being placed on the manufacturing network, which has adapted to its new role by converging the IT and OT domains into a scalable, timely, highly available, and secure network. This work centers around security mechanisms to secure virtualization-based manufacturing. Our proposed concept uses only measures in the network layer, where we see the greatest benefits, while providing the possibility to deploy it in brownfield environments today. Validation is performed by challenging it with known and emerging security threats, the cyber kill chain, and IEC 62443-3-3, improving the security level in most metrics in contrast to perimeter-based legacy architectures. In future work, the validated concept can be extended to the physical, host and application layers, providing holistic IT/OT security and enabling secure edge cloud-enabled manufacturing.
ArticleNumber 103384
Author Großmann, Daniel
Kampa, Thomas
Müller, Christian Klaus
Author_xml – sequence: 1
  givenname: Thomas
  orcidid: 0000-0002-7738-8205
  surname: Kampa
  fullname: Kampa, Thomas
  email: thomas.kampa@thi.de, tho-ka@web.de
  organization: AImotion Bavaria, Technische Hochschule Ingolstadt, Esplanade 10, Ingolstadt, 85049, Bavaria, Germany
– sequence: 2
  givenname: Christian Klaus
  surname: Müller
  fullname: Müller, Christian Klaus
  organization: AUDI AG, Auto-Union-Str. 1, Ingolstadt, 85057, Bavaria, Germany
– sequence: 3
  givenname: Daniel
  surname: Großmann
  fullname: Großmann, Daniel
  organization: AImotion Bavaria, Technische Hochschule Ingolstadt, Esplanade 10, Ingolstadt, 85049, Bavaria, Germany
BookMark eNqFkE1LAzEQhoNUsK3-Ai_7B7adJPuRHgSlaC0UeqnnkE1ma-o2kSQV-u_dWvHgQU8zDPO88D4jMnDeISG3FCYUaDXdTZR59XrCgPH-wrkoLsiQljXkoqZ88LNDeUVGMe4A2IwBHZL7pUsYOq_frNtmy810vcki6kOw6Zi1PmRotpjpzh9Mjk41HZpsr9yhVTr1T257TS5b1UW8-Z5j8vL0uJk_56v1Yjl_WOWaFyLlAljdaMoq5Iw2vK1FxRBZqVRVC14U3LAGsJhBCdxQEG0NyqhKGd2AVhXnY8LPuTr4GAO28j3YvQpHSUGeJMid_JIgTxLkWUJPzX5R2iaVrHcpKNv9w96dWexrfVgMMmqLTqOxAXWSxts_-U9C6nqG
CitedBy_id crossref_primary_10_3390_s25010213
Cites_doi 10.1109/JIOT.2020.3025775
10.1109/JIOT.2019.2912022
10.1109/ACCESS.2019.2956748
10.1016/j.adhoc.2013.05.003
10.1016/j.procir.2016.07.041
10.1016/j.jmsy.2020.10.011
10.3390/fi13100258
10.1016/j.comcom.2020.03.007
10.1109/COMST.2020.3011208
10.1016/j.comnet.2022.109075
ContentType Journal Article
Copyright 2023 The Authors
Copyright_xml – notice: 2023 The Authors
DBID 6I.
AAFTH
AAYXX
CITATION
DOI 10.1016/j.adhoc.2023.103384
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1570-8713
ExternalDocumentID 10_1016_j_adhoc_2023_103384
S1570870523003049
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
23M
4.4
457
4G.
5GY
5VS
6I.
6OB
7-5
71M
8P~
AACTN
AAEDT
AAEDW
AAFTH
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABJNI
ABMAC
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BJAXD
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EO8
EO9
EP2
EP3
FDB
FEDTE
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
IHE
J1W
JJJVA
KOM
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
ROL
RPZ
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABFNM
ABWVN
ABXDB
ACNNM
ACRPL
ACVFH
ADCNI
ADJOM
ADMUD
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
EJD
HZ~
RIG
SSH
UHS
ID FETCH-LOGICAL-c348t-8027bc126e321b3f7862ee25aa6783443d2b0e490503d108f70ada6adcb0ca633
IEDL.DBID .~1
ISSN 1570-8705
IngestDate Tue Jul 01 01:11:27 EDT 2025
Thu Apr 24 23:03:47 EDT 2025
Sat Feb 17 16:08:19 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords ICS
Micro-segmentation
IT/OT convergence
Industrial Ethernet
Virtualization
Language English
License This is an open access article under the CC BY license.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c348t-8027bc126e321b3f7862ee25aa6783443d2b0e490503d108f70ada6adcb0ca633
ORCID 0000-0002-7738-8205
OpenAccessLink https://www.sciencedirect.com/science/article/pii/S1570870523003049
ParticipantIDs crossref_primary_10_1016_j_adhoc_2023_103384
crossref_citationtrail_10_1016_j_adhoc_2023_103384
elsevier_sciencedirect_doi_10_1016_j_adhoc_2023_103384
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-03-01
2024-03-00
PublicationDateYYYYMMDD 2024-03-01
PublicationDate_xml – month: 03
  year: 2024
  text: 2024-03-01
  day: 01
PublicationDecade 2020
PublicationTitle Ad hoc networks
PublicationYear 2024
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Foschini, Mignardi, Montanari, Scotece (b13) 2021; 13
Kumar, Hu, Andersen, Popa, Culler (b25) 2019
International Electrotechnical Commission (b34) 2016
Kindervag (b2) 2010
Ambrosy, Kampa, Jumar, Großmann (b27) 2022
Åkerberg, Björkman (b41) 2009
Ehrlich, Trsek, Wisniewski, Jasperneite (b12) 2019
HMS (b26) 2023
Cheminod, Durante, Seno, Valenza, Valenzano, Zunino (b14) 2017
Hassija, Chamola, Gupta, Jain, Guizani (b44) 2020; 8
Langer, Bermbach (b32) 2022; 213
Assante, Lee (b38) 2015
Franke, Sibold, Teichel, Dansarie, Sundblad (b31) 2020
5G Alliance for Connected Industries and Automation (b29) 2023
Sebastian Rohr (b40) 2019
Lackorzynski, Köpsell, Strufe (b15) 2019
Zolanvari, Teixeira, Gupta, Khan, Jain (b23) 2019; 6
Kothmayr, Schmitt, Hu, Brünig, Carle (b24) 2013; 11
Bundesamt für Sicherheit in der Informationstechnik (b30) 2022
Alladi, Chamola, Zeadally (b20) 2020; 155
International Electrotechnical Commission, D.I.N (b35) 2020
Arifeen, Petrovski, Petrovski (b22) 2021
Schmittner, Shaaban, Macher (b18) 2022
Smith, Kreeger (b6) 2016
Lockheed Martin (b36) 2021
Kampa, Mueller, Grossmann (b3) 2022
Sung, Rao, Xie, Maltz (b21) 2008
Yadav, Rao (b37) 2015
Thames, Schaefer (b1) 2016; 52
Ward, Beyer (b16) 2014
Mosteiro-Sanchez, Barcelo, Astorga, Urbieta (b10) 2020; 57
IEEE, IEEE Standard for Local and Metropolitan Area Networks–Media Access Control (MAC) Security, IEEE Std 802.1AE-2018, 2018.
Kobzan, Schriegel, Althoff, Boschmann, Otto, Jasperneite (b9) 2018
Tange, de Donno, Fafoutis, Dragoni (b11) 2020; 22
IEC (b42) 2001
Walz, Niemann, Göppert, Fischer, Merklin, Ziegler, Sikora (b43) 2023
Nelson (b4) 2016
5G Alliance for Connected Industries and Automation (b28) 2021
Mizrahi (b33) 2011
Baker (b17) 2020
Alladi, Chamola, Parizi, Choo (b19) 2019; 7
P. Pols, J. van den Berg, The Unified Kill Chain, (CSA Thesis), Hague, 2017, pp. 1–104.
IEEE, IEEE Standard for Local and Metropolitan Area Networks–Frame Replication and Elimination for Reliability, IEEE Std 802.1 CB-2017, 2017, pp. 1–102.
Cisco (b7) 2023
IEC (10.1016/j.adhoc.2023.103384_b42) 2001
Yadav (10.1016/j.adhoc.2023.103384_b37) 2015
Nelson (10.1016/j.adhoc.2023.103384_b4) 2016
Kobzan (10.1016/j.adhoc.2023.103384_b9) 2018
Mosteiro-Sanchez (10.1016/j.adhoc.2023.103384_b10) 2020; 57
Lackorzynski (10.1016/j.adhoc.2023.103384_b15) 2019
Hassija (10.1016/j.adhoc.2023.103384_b44) 2020; 8
Zolanvari (10.1016/j.adhoc.2023.103384_b23) 2019; 6
International Electrotechnical Commission (10.1016/j.adhoc.2023.103384_b34) 2016
5G Alliance for Connected Industries and Automation (10.1016/j.adhoc.2023.103384_b28) 2021
Bundesamt für Sicherheit in der Informationstechnik (10.1016/j.adhoc.2023.103384_b30) 2022
Kumar (10.1016/j.adhoc.2023.103384_b25) 2019
HMS (10.1016/j.adhoc.2023.103384_b26) 2023
Franke (10.1016/j.adhoc.2023.103384_b31) 2020
10.1016/j.adhoc.2023.103384_b39
Cheminod (10.1016/j.adhoc.2023.103384_b14) 2017
Lockheed Martin (10.1016/j.adhoc.2023.103384_b36) 2021
Kampa (10.1016/j.adhoc.2023.103384_b3) 2022
10.1016/j.adhoc.2023.103384_b5
Thames (10.1016/j.adhoc.2023.103384_b1) 2016; 52
Ward (10.1016/j.adhoc.2023.103384_b16) 2014
Mizrahi (10.1016/j.adhoc.2023.103384_b33) 2011
Schmittner (10.1016/j.adhoc.2023.103384_b18) 2022
10.1016/j.adhoc.2023.103384_b8
Langer (10.1016/j.adhoc.2023.103384_b32) 2022; 213
Kindervag (10.1016/j.adhoc.2023.103384_b2) 2010
Foschini (10.1016/j.adhoc.2023.103384_b13) 2021; 13
Cisco (10.1016/j.adhoc.2023.103384_b7) 2023
Kothmayr (10.1016/j.adhoc.2023.103384_b24) 2013; 11
Alladi (10.1016/j.adhoc.2023.103384_b19) 2019; 7
International Electrotechnical Commission (10.1016/j.adhoc.2023.103384_b35) 2020
Arifeen (10.1016/j.adhoc.2023.103384_b22) 2021
Tange (10.1016/j.adhoc.2023.103384_b11) 2020; 22
Smith (10.1016/j.adhoc.2023.103384_b6) 2016
Alladi (10.1016/j.adhoc.2023.103384_b20) 2020; 155
Ambrosy (10.1016/j.adhoc.2023.103384_b27) 2022
Sebastian Rohr (10.1016/j.adhoc.2023.103384_b40) 2019
Assante (10.1016/j.adhoc.2023.103384_b38) 2015
Baker (10.1016/j.adhoc.2023.103384_b17) 2020
Sung (10.1016/j.adhoc.2023.103384_b21) 2008
Åkerberg (10.1016/j.adhoc.2023.103384_b41) 2009
5G Alliance for Connected Industries and Automation (10.1016/j.adhoc.2023.103384_b29) 2023
Ehrlich (10.1016/j.adhoc.2023.103384_b12) 2019
Walz (10.1016/j.adhoc.2023.103384_b43) 2023
References_xml – volume: 213
  year: 2022
  ident: b32
  article-title: NTS4PTP—A comprehensive key management solution for PTP networks
  publication-title: Comput. Netw.
– year: 2016
  ident: b34
  article-title: Industrial Communication Networks-High Availability Automation Networks-Part 3: Parallel Redundancy Protocol (PRP) and High-Availability Seamless Redundancy (HSR) Methods
– start-page: 1
  year: 2022
  end-page: 6
  ident: b27
  article-title: 5G and DetNet: Towards holistic determinism in industrial networks
  publication-title: 2022 IEEE International Conference on Industrial Technology (ICIT)
– year: 2014
  ident: b16
  article-title: Beyondcorp: A new approach to enterprise security
– start-page: 1
  year: 2019
  end-page: 8
  ident: b15
  article-title: A comparative study on virtual private networks for future industrial communication systems
  publication-title: 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS)
– year: 2023
  ident: b29
  article-title: Industrial 5G edge computing – use cases, architecture and deployment
– year: 2023
  ident: b26
  article-title: Continued growth for Industrial Ethernet and wireless networks
– reference: P. Pols, J. van den Berg, The Unified Kill Chain, (CSA Thesis), Hague, 2017, pp. 1–104.
– volume: 6
  start-page: 6822
  year: 2019
  end-page: 6834
  ident: b23
  article-title: Machine learning-based network vulnerability analysis of industrial Internet of Things
  publication-title: IEEE Internet Things J.
– start-page: 3
  year: 2020
  ident: b35
  article-title: 62443-3-3: 2020.01
  publication-title: Industrielle Kommunikationsnetze–IT-Sicherheit für Netze und Systeme–Teil
– volume: 8
  start-page: 6222
  year: 2020
  end-page: 6246
  ident: b44
  article-title: A survey on supply chain security: Application areas, security threats, and solution architectures
  publication-title: IEEE Internet Things J.
– year: 2020
  ident: b17
  article-title: BeyondProd: The Origin of Cloud-Native Security at Google
– start-page: 1105
  year: 2018
  end-page: 1108
  ident: b9
  article-title: Secure and time-sensitive communication for remote process control and monitoring
  publication-title: 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), Vol. 1
– volume: 7
  start-page: 176935
  year: 2019
  end-page: 176951
  ident: b19
  article-title: Blockchain applications for industry 4.0 and industrial IoT: A review
  publication-title: IEEE Access
– year: 2019
  ident: b40
  article-title: Industrial IT Security: Effizienter Schutz Vernetzter Produktionslinien
– reference: IEEE, IEEE Standard for Local and Metropolitan Area Networks–Media Access Control (MAC) Security, IEEE Std 802.1AE-2018, 2018.
– start-page: 1
  year: 2021
  end-page: 6
  ident: b22
  article-title: Automated microsegmentation for lateral movement prevention in industrial internet of things (IIoT)
  publication-title: 2021 14th International Conference on Security of Information and Networks (SIN), Vol. 1
– volume: 22
  start-page: 2489
  year: 2020
  end-page: 2520
  ident: b11
  article-title: A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
  publication-title: IEEE Commun. Surv. Tutor.
– year: 2022
  ident: b30
  article-title: Industrial control system security top 10 bedrohungen und gegenmaßnahmen 2022
– year: 2016
  ident: b6
  article-title: VXLAN group policy option
– start-page: 1
  year: 2022
  end-page: 6
  ident: b3
  article-title: IP-based architecture for an edge cloud enabled factory: Concept and requirements
  publication-title: 2022 IEEE 18th International Conference on Factory Communication Systems (WFCS)
– volume: 155
  start-page: 1
  year: 2020
  end-page: 8
  ident: b20
  article-title: Industrial control systems: Cyberattack trends and countermeasures
  publication-title: Comput. Commun.
– start-page: 1
  year: 2023
  end-page: 6
  ident: b43
  article-title: PROFINET security: A look on selected concepts for secure communication in the automation domain
  publication-title: 2023 IEEE 21st International Conference on Industrial Informatics (INDIN)
– reference: IEEE, IEEE Standard for Local and Metropolitan Area Networks–Frame Replication and Elimination for Reliability, IEEE Std 802.1 CB-2017, 2017, pp. 1–102.
– volume: 13
  start-page: 258
  year: 2021
  ident: b13
  article-title: An sdn-enabled architecture for it/ot converged networks: A proposal and qualitative analysis under ddos attacks
  publication-title: Future Internet
– year: 2023
  ident: b7
  article-title: Cisco DNA center user guide, release 2.3.4: Configure a fabric zone
– start-page: 24
  year: 2015
  ident: b38
  article-title: The Industrial Control System Cyber Kill Chain, Vol. 1
– start-page: 1519
  year: 2019
  end-page: 1536
  ident: b25
  article-title: JEDI: Many-to-many end-to-end encryption and key delegation for IoT
  publication-title: USENIX Security Symposium
– year: 2021
  ident: b28
  article-title: Security aspects of 5G for industrial networks
– year: 2020
  ident: b31
  article-title: RFC 8915: Network time security for the network time protocol
– year: 2016
  ident: b4
  article-title: The Impact of Dragonfly Malware on Industrial Control Systems
– volume: 11
  start-page: 2710
  year: 2013
  end-page: 2723
  ident: b24
  article-title: DTLS based security and two-way authentication for the Internet of Things
  publication-title: Ad Hoc Netw.
– start-page: 1
  year: 2022
  end-page: 6
  ident: b18
  article-title: ThreatGet: Ensuring the implementation of defense-in-depth strategy for IIoT based on IEC 62443
  publication-title: 2022 IEEE 5th International Conference on Industrial Cyber-Physical Systems (ICPS)
– volume: 57
  start-page: 367
  year: 2020
  end-page: 378
  ident: b10
  article-title: Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0
  publication-title: J. Manuf. Syst.
– year: 2010
  ident: b2
  article-title: Build Security into Your Network’s DNA: The Zero Trust Network Architecture, Vol. 27
– start-page: 67
  year: 2009
  end-page: 80
  ident: b41
  article-title: Exploring network security in profisafe
  publication-title: International Conference on Computer Safety, Reliability, and Security
– start-page: 1
  year: 2017
  end-page: 7
  ident: b14
  article-title: Leveraging SDN to improve security in industrial networks
  publication-title: 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS)
– year: 2001
  ident: b42
  article-title: 62280-2, Railway Applications Communi-Cation, Signaling and Processing Systems-Part 2: Safety-Related Communication in Open Transmission Systems
– year: 2021
  ident: b36
  article-title: Cyber kill chain®
– volume: 52
  start-page: 12
  year: 2016
  end-page: 17
  ident: b1
  article-title: Software-defined cloud manufacturing for industry 4.0
  publication-title: Procedia CIRP
– start-page: 2849
  year: 2019
  end-page: 2854
  ident: b12
  article-title: Survey of security standards for an automated industrie 4.0 compatible manufacturing
  publication-title: IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society
– start-page: 438
  year: 2015
  end-page: 452
  ident: b37
  article-title: Technical aspects of cyber kill chain
  publication-title: Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings 3
– start-page: 38
  year: 2011
  end-page: 43
  ident: b33
  article-title: Time synchronization security using IPsec and MACsec
  publication-title: 2011 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication
– start-page: 1
  year: 2008
  end-page: 12
  ident: b21
  article-title: Towards systematic design of enterprise networks
  publication-title: Proceedings of the 2008 ACM CoNEXT Conference
– start-page: 1519
  year: 2019
  ident: 10.1016/j.adhoc.2023.103384_b25
  article-title: JEDI: Many-to-many end-to-end encryption and key delegation for IoT
– start-page: 1
  year: 2019
  ident: 10.1016/j.adhoc.2023.103384_b15
  article-title: A comparative study on virtual private networks for future industrial communication systems
– year: 2023
  ident: 10.1016/j.adhoc.2023.103384_b26
– start-page: 438
  year: 2015
  ident: 10.1016/j.adhoc.2023.103384_b37
  article-title: Technical aspects of cyber kill chain
– volume: 8
  start-page: 6222
  issue: 8
  year: 2020
  ident: 10.1016/j.adhoc.2023.103384_b44
  article-title: A survey on supply chain security: Application areas, security threats, and solution architectures
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.3025775
– year: 2001
  ident: 10.1016/j.adhoc.2023.103384_b42
– year: 2019
  ident: 10.1016/j.adhoc.2023.103384_b40
– start-page: 24
  year: 2015
  ident: 10.1016/j.adhoc.2023.103384_b38
– year: 2010
  ident: 10.1016/j.adhoc.2023.103384_b2
– year: 2020
  ident: 10.1016/j.adhoc.2023.103384_b31
– year: 2016
  ident: 10.1016/j.adhoc.2023.103384_b34
– year: 2022
  ident: 10.1016/j.adhoc.2023.103384_b30
– start-page: 67
  year: 2009
  ident: 10.1016/j.adhoc.2023.103384_b41
  article-title: Exploring network security in profisafe
– start-page: 1
  year: 2017
  ident: 10.1016/j.adhoc.2023.103384_b14
  article-title: Leveraging SDN to improve security in industrial networks
– year: 2023
  ident: 10.1016/j.adhoc.2023.103384_b29
– volume: 6
  start-page: 6822
  issue: 4
  year: 2019
  ident: 10.1016/j.adhoc.2023.103384_b23
  article-title: Machine learning-based network vulnerability analysis of industrial Internet of Things
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2019.2912022
– start-page: 38
  year: 2011
  ident: 10.1016/j.adhoc.2023.103384_b33
  article-title: Time synchronization security using IPsec and MACsec
– year: 2021
  ident: 10.1016/j.adhoc.2023.103384_b28
– ident: 10.1016/j.adhoc.2023.103384_b8
– volume: 7
  start-page: 176935
  year: 2019
  ident: 10.1016/j.adhoc.2023.103384_b19
  article-title: Blockchain applications for industry 4.0 and industrial IoT: A review
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2956748
– start-page: 1
  year: 2022
  ident: 10.1016/j.adhoc.2023.103384_b18
  article-title: ThreatGet: Ensuring the implementation of defense-in-depth strategy for IIoT based on IEC 62443
– start-page: 1
  year: 2022
  ident: 10.1016/j.adhoc.2023.103384_b27
  article-title: 5G and DetNet: Towards holistic determinism in industrial networks
– year: 2016
  ident: 10.1016/j.adhoc.2023.103384_b6
– start-page: 1
  year: 2022
  ident: 10.1016/j.adhoc.2023.103384_b3
  article-title: IP-based architecture for an edge cloud enabled factory: Concept and requirements
– volume: 11
  start-page: 2710
  issue: 8
  year: 2013
  ident: 10.1016/j.adhoc.2023.103384_b24
  article-title: DTLS based security and two-way authentication for the Internet of Things
  publication-title: Ad Hoc Netw.
  doi: 10.1016/j.adhoc.2013.05.003
– year: 2014
  ident: 10.1016/j.adhoc.2023.103384_b16
– year: 2016
  ident: 10.1016/j.adhoc.2023.103384_b4
– year: 2023
  ident: 10.1016/j.adhoc.2023.103384_b7
– volume: 52
  start-page: 12
  year: 2016
  ident: 10.1016/j.adhoc.2023.103384_b1
  article-title: Software-defined cloud manufacturing for industry 4.0
  publication-title: Procedia CIRP
  doi: 10.1016/j.procir.2016.07.041
– start-page: 1
  year: 2021
  ident: 10.1016/j.adhoc.2023.103384_b22
  article-title: Automated microsegmentation for lateral movement prevention in industrial internet of things (IIoT)
– volume: 57
  start-page: 367
  year: 2020
  ident: 10.1016/j.adhoc.2023.103384_b10
  article-title: Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0
  publication-title: J. Manuf. Syst.
  doi: 10.1016/j.jmsy.2020.10.011
– volume: 13
  start-page: 258
  issue: 10
  year: 2021
  ident: 10.1016/j.adhoc.2023.103384_b13
  article-title: An sdn-enabled architecture for it/ot converged networks: A proposal and qualitative analysis under ddos attacks
  publication-title: Future Internet
  doi: 10.3390/fi13100258
– volume: 155
  start-page: 1
  year: 2020
  ident: 10.1016/j.adhoc.2023.103384_b20
  article-title: Industrial control systems: Cyberattack trends and countermeasures
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2020.03.007
– start-page: 1105
  year: 2018
  ident: 10.1016/j.adhoc.2023.103384_b9
  article-title: Secure and time-sensitive communication for remote process control and monitoring
– ident: 10.1016/j.adhoc.2023.103384_b39
– volume: 22
  start-page: 2489
  issue: 4
  year: 2020
  ident: 10.1016/j.adhoc.2023.103384_b11
  article-title: A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2020.3011208
– volume: 213
  year: 2022
  ident: 10.1016/j.adhoc.2023.103384_b32
  article-title: NTS4PTP—A comprehensive key management solution for PTP networks
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2022.109075
– start-page: 1
  year: 2023
  ident: 10.1016/j.adhoc.2023.103384_b43
  article-title: PROFINET security: A look on selected concepts for secure communication in the automation domain
– year: 2020
  ident: 10.1016/j.adhoc.2023.103384_b17
– start-page: 2849
  year: 2019
  ident: 10.1016/j.adhoc.2023.103384_b12
  article-title: Survey of security standards for an automated industrie 4.0 compatible manufacturing
– year: 2021
  ident: 10.1016/j.adhoc.2023.103384_b36
– start-page: 1
  year: 2008
  ident: 10.1016/j.adhoc.2023.103384_b21
  article-title: Towards systematic design of enterprise networks
– ident: 10.1016/j.adhoc.2023.103384_b5
– start-page: 3
  year: 2020
  ident: 10.1016/j.adhoc.2023.103384_b35
  article-title: 62443-3-3: 2020.01
SSID ssj0029201
Score 2.3949041
Snippet After an initial push to outsource every single computation to remote data centers, the edge compute paradigm can now provide the necessary balance of...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 103384
SubjectTerms ICS
Industrial Ethernet
IT/OT convergence
Micro-segmentation
Virtualization
Title Interlocking IT/OT security for edge cloud-enabled manufacturing
URI https://dx.doi.org/10.1016/j.adhoc.2023.103384
Volume 154
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwEA9jvuiD-InzY-TBR2vTJG3aN8dwbCpTdIO9lTRJcTK7odurf7u5tJUJsgefSksOyq_Xu8vl7ncIXTIZcWlC6SU6iD0us8SLOQ_tngfY4azLDcsq32HUH_O7SThpoG7dCwNllZXtL226s9bVE79C019Mp_5LEApitQ3SmnC-B018nAvQ8uuvnzIPGMZUcqYK4sHqmnnI1XhJ_ToHHkPKoPmcxfxv77TmcXp7aLcKFXGnfJt91DDFAdpZIxA8RDcuoWf9ESS88WDkP47wZzWRDttwFEO2DKvZfKU947qkNH6XxQraGVx_4hEa925H3b5XzUTwFOPx0joUKjIV0MgwGmQsF3ZHYgwNpYzcyAymaUYMT4DmRQckzgWRWkZSq4woGTF2jJrFvDAnCAdc5SyPExszJVwJktjQRQmWs0TbH5-yFqI1FqmqCMNhbsUsrSvD3lIHYAoApiWALXT1I7Qo-TI2L49qkNNfnz21Fn2T4Ol_Bc_Qtr3jZRnZOWouP1bmwsYVy6ztFKeNtjrd54cnuA7u-8NvutvKqA
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwED6VMgAD4inKMwMjIYntPLyBKqoWShlIpW6WYzuiqKQVtCu_HdtJqiKhDqyJLVlf7Lvz5bvvAK4xjwhXIXepDBKX8Iy6CSGhvvMYdTjtcsOS5TuIukPyOApHDWjXtTCGVlnZ_tKmW2tdPfEqNL3ZeOy9BmHs691m0prm_x7dgE2ij69pY3D7veR5mG5MpWhq7LtmeC09ZEleXL5NjZAhwqb6HCfkb_e04nI6e7BbxYrOfbmcfWio4gB2VhQED-HOZvS0QzIZb6eXei-p81W1pHN0POqYdJkjJtOFdJUtk5LOBy8Wpp7BFigewbDzkLa7btUUwRWYJHPtUVCciQBFCqMgw3msryRKoZDzyPbMwBJlviLU6LzIwE_y2OeSR1yKzBc8wvgYmsW0UCfgBETkOE-oDpooEbFPdewiYpxjKvXJR7gFqMaCiUox3DSumLCaGvbOLIDMAMhKAFtws5w0KwUz1g-PapDZr-_OtElfN_H0vxOvYKubPvdZvzd4OoNt_YaUnLJzaM4_F-pCBxnz7NJuoh88Zcqh
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Interlocking+IT%2FOT+security+for+edge+cloud-enabled+manufacturing&rft.jtitle=Ad+hoc+networks&rft.au=Kampa%2C+Thomas&rft.au=M%C3%BCller%2C+Christian+Klaus&rft.au=Gro%C3%9Fmann%2C+Daniel&rft.date=2024-03-01&rft.issn=1570-8705&rft.volume=154&rft.spage=103384&rft_id=info:doi/10.1016%2Fj.adhoc.2023.103384&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_adhoc_2023_103384
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1570-8705&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1570-8705&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1570-8705&client=summon