Overview of the MEDICI Service

Overview of the MEDICI Service

Source publication
Article
Full-text available
Modern industrial systems now, more than ever, require secure and efficient ways of communication. The trend of making connected, smart architectures is beginning to show in various fields of the industry such as manufacturing and logistics. The number of IoT (Internet of Things) devices used in such systems is naturally increasing and industry lea...

Context in source publication

Context 1
... lightweight estimation techniques and previously historical data it predicts the future values of these metrics in order to decide which anomaly detection task should be executed and where, so that the overall time to detect an anomaly will be reduced without compromising the detection accuracy. As seen in Figure 2, MEDICI consists of three services called Request, Response, and Network. The role of the Request Server is to handle incoming offloading requests from the edge devices and forward them to the Decision Maker where the actual decision on which anomaly detection model should be triggered is made. ...

Similar publications

Article
Full-text available
The smart manufacturing ecosystem enhances the end-to-end efficiency of the mine-to-market lifecycle to create the value chain using the big data generated rapidly by edge computing devices, third-party technologies, and various stakeholders connected via the industrial Internet of things. In this context, smart manufacturing faces two serious chal...

Citations

... The integration of these technologies into a cohesive cybersecurity architecture requires careful consideration of various factors, including data privacy, regulatory compliance, and ethical considerations. As Bravos et al. (2022) note, the cybersecurity challenges associated with the Industrial Internet of Things (IIoT) offer valuable lessons for the finance sector. The architecture must not only protect against cyber threats but also ensure that data is processed and stored in a manner that respects privacy rights and complies with regulatory requirements. ...
Article
Full-text available
This study delves into the integration of Artificial Intelligence (AI) in cybersecurity measures within smart cities, aiming to uncover both the challenges and opportunities this fusion presents. With the burgeoning reliance on interconnected digital infrastructures and the vast data ecosystems within urban environments, smart cities are increasingly susceptible to sophisticated cyber threats. Through a systematic literature review and content analysis, this research identifies the unique cybersecurity vulnerabilities faced by smart cities and evaluates how AI technologies can fortify urban cybersecurity frameworks. The methodology encompasses a comprehensive review of recent scholarly articles, industry reports, and case studies to assess the role of AI in enhancing threat detection, response, and prevention mechanisms. Key findings reveal that AI-driven cybersecurity solutions significantly enhance the resilience of smart cities against cyber threats by providing advanced analytical capabilities and real-time threat intelligence. However, the study also highlights the critical need for robust ethical and privacy considerations in the deployment of AI technologies. Strategic recommendations are provided for policymakers, urban planners, and technology leaders, emphasizing the importance of integrating secure AI-enabled infrastructure and fostering public-private partnerships. The study concludes with suggestions for future research directions, focusing on the ethical implications of AI in cybersecurity and the development of scalable AI solutions for diverse urban contexts. Keywords: Artificial Intelligence, Cybersecurity, Smart Cities, Urban Resilience.
... Zudem wirkt sich die individuelle Risikoaversion der Kunden auf die Wahrnehmung und Bewertung der Cybersicherheit aus (Shah et al. 2015). Daher wird der Schutz von IoT-verbundenen Geräten durch Cybersicherheit als eine wesentliche Voraussetzung im industriellen Umfeld angesehen, um potenzielle Bedrohungen frühzeitig zu erkennen und eine sichere Kommunikation zu gewährleisten (Bravos et al. 2022). Andere moderne Technologien wie Deep Learning und Blockchain können jedoch zusätzlich eingesetzt werden, um die Erkennung von Bedrohungen zu verbessern und gleichzeitig die gefühlte Sicherheit von IoT-Diensten zu erhöhen (Bravos et al. 2022;Li et al. 2019). ...
... Daher wird der Schutz von IoT-verbundenen Geräten durch Cybersicherheit als eine wesentliche Voraussetzung im industriellen Umfeld angesehen, um potenzielle Bedrohungen frühzeitig zu erkennen und eine sichere Kommunikation zu gewährleisten (Bravos et al. 2022). Andere moderne Technologien wie Deep Learning und Blockchain können jedoch zusätzlich eingesetzt werden, um die Erkennung von Bedrohungen zu verbessern und gleichzeitig die gefühlte Sicherheit von IoT-Diensten zu erhöhen (Bravos et al. 2022;Li et al. 2019). Aus technischer Sicht kann die Dienstebene von IoT-Geräten als der kritischste Sicherheitsbereich betrachtet werden (Park und Shin 2017). ...
... Es wird festgestellt, dass IoT-Servicemodelle eine teure Sammlung von Big Data bis zu einem gewissen Grad ersetzen können und gleichzeitig erschwinglicher sind (Li et al. 2019). Zusätzlich betrachten Bravos et al. (2022) Cybersicherheit als eine wesentliche Voraussetzung für IoT-verbundene Geräte und veranschaulichen damit die Relevanz der Cybersicherheit aus akademischer Sicht. ...
Article
Full-text available
Zusammenfassung In den letzten Jahren hat der Trend zur Digitalisierung und Konnektivität die Kundenerwartungen an den B2B-Kundenservice verändert. Vorliegender Artikel arbeitet mit zwei klaren Studienzielen und untersucht zum einen die Rolle von IoT (Internet of Things) und Cybersicherheit als Erfolgsfaktoren für den Business-to-Business (B2B) Kundenservice und zum anderen wie eine sichere Integration zu einem Wettbewerbsvorteil auf dem deutschen Markt beitragen kann. Durch einen qualitativen Ansatz mithilfe von 20 Befragungen wurde untersucht, dass IoT und Cybersicherheit als Erfolgsfaktoren für den deutschen B2B-Kundenservice angesehen werden können. Als Ergebnis liefert diese Studie fünf Kernaussagen (Hypothesen) aus qualitativen Interviews. Neben der Diskussion allgemeiner Erfolgsfaktoren und deren Einfluss, wurde die Rolle von IoT bei der Optimierung des B2B Kundendienstes diskutiert. Zudem werden potenzielle Sicherheitsrisken in Zusammenhang mit den Dienstleistungsmodellen, notwendige Anforderungen an Cybersicherheit sowie Datenerfassung erörtert. Abschließend wurde ein Modell entwickelt, das interne und externe Aspekte aufzeigt, die dazu beitragen, dass IoT und Cybersicherheit als Erfolgsfaktoren in der Aktivitätskette des Kunden in der Pre-Sales‑, Sales- und After-Sales-Phase erlebt werden. Dieser praxis-nahe und industrie-übergreifende Artikel liefert somit Einblicke basierend auf qualitativen Erkenntnissen für weitere Forschung in der Theorie und befähigt Organisationen das Thema ganzeinheitlich zu betrachten.
... In the work [29], the authors developed a hardware monitor that operates in parallel to the embedded processor and detects any attack that causes a wrong behaviour. In the recent work [30], the proposed framework (called C4IIoT) helps to detect and mitigate attacks on a complete IIoT system through offloading mechanisms and machine learning techniques. In particular, this work mentions the protection of nodes with HSMs. ...
Article
Full-text available
The security of Industrial Internet of Things (IIoT) systems is a challenge that needs to be addressed immediately, as the increasing use of new communication paradigms and the abundant use of sensors opens up new opportunities to compromise these types of systems. In this sense, technologies such as Trusted Execution Environments (TEEs) and Hardware Security Modules (HSMs) become crucial for adding new layers of security to IIoT systems, especially to edge nodes that incorporate sensors and perform continuous measurements. These technologies, coupled with new communication paradigms such as Blockchain, offer a high reliability, robustness and good interoperability between them. This paper proposes the design of a secure sensor incorporating the above mentioned technologies—HSMs and a TEE—in a hardware device based on a dual-core architecture. Through this combination of technologies, one of the cores collects the data extracted by the sensors and implements the security mechanisms to guarantee the integrity of these data, while the remaining core is responsible for sending these data through the appropriate communication protocol. This proposed approach fits into the Blockchain networks, which act as an Oracle. Finally, to illustrate the application of this concept, a use case applied to wine logistics is described, where this secure sensor is integrated into a Blockchain that collects data from the storage and transport of barrels, and a performance evaluation of the implemented prototype is provided.
... In recent days, everyone uses several types of network equipment on a daily basis to maintain a healthy lifestyle. Switches, routers and wireless equipment are connected with IIOT devices to provide better bandwidth in a firm [15]. This equipment is immensely helpful for an organisation to support communication protocols. ...
Article
Industrial internet of things are essential factors for an organisation to maintain relevant work strategy. In this study, several types of security issues and countermeasures for IIOT are discussed critically. Various kinds of sensors, applications and devices are used by a company to identify security issues for IIOT. Visibility of work is overseen by a firm to gather several types of information related to work. Every company always tries to enhance troubleshooting and maintenance capabilities. Regulatory compliance is controlled by an organisation to understand issues of IIOT. Operational efficiency improves by these security issues for IIOT process. Quality assurance and artificial intelligence are controlled with help of these security issues. Digital transformation helps a company to mitigate those issues for IIOT. Lack of visibility, security integration and poor testing related issues are faced by a firm. Centralised connectivity helps an organisation to connect all networks in an organised way. This centralised connectivity plays an essential role to control performance. Secondary network system is managed by a company to mitigate security issues for IIOT. Several types of modern IoT devices are used for mitigating security issues. Keyword : Security issues, IIOT, IOT, centralised connectivity.
Article
Full-text available
This paper focuses on adopting cybersecurity procedures in Chilean manufacturing companies in the context of the Fourth Industrial Revolution’s data-driven demands, which have exposed vulnerabilities in cybersecurity. This analysis is based on data from the Fifth Longitudinal Survey of Companies - ELE 5 - conducted by the National Institute of Statistics. Using the TOE adoption model, we employ binary and ordered Logit and Probit models with data from 574 companies and 17 explanatory variables. The objective is to gain insight into the factors influencing the adoption of cybersecurity processes, complementing the existing literature, which often focuses on developing specific technologies or conducting comprehensive analyses of digital transformation. The study highlights the significance of company size in explaining the adoption of cybersecurity procedures and reveals the relevance of explanatory variables as the depth of adoption increases. The findings underscore the need for public policies that facilitate the implementation of existing regulations, such as ISO 27.001, particularly for small companies. Additionally, the study emphasizes the importance of fostering a "culture of cybersecurity" across different sectors of society.