Redirigiendo al acceso original de articulo en 21 segundos...
Inicio  /  Algorithms  /  Vol: 16 Par: 8 (2023)  /  Artículo
ARTÍCULO
TITULO

An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)

Vasiliki Demertzi    
Stavros Demertzis and Konstantinos Demertzis    

Resumen

The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT). These advancements have had a profound impact on the structures of numerous industrial organizations. The IIoT, a seamless integration of the physical and digital realms with minimal human intervention, has ushered in radical changes in the economy and modern business practices. At the heart of the IIoT lies its ability to gather and analyze vast volumes of data, which is then harnessed by artificial intelligence systems to perform intelligent tasks such as optimizing networked units? performance, identifying and correcting errors, and implementing proactive maintenance measures. However, implementing IIoT systems is fraught with difficulties, notably in terms of security and privacy. IIoT implementations are susceptible to sophisticated security attacks at various levels of networking and communication architecture. The complex and often heterogeneous nature of these systems makes it difficult to ensure availability, confidentiality, and integrity, raising concerns about mistrust in network operations, privacy breaches, and potential loss of critical, personal, and sensitive information of the network's end-users. To address these issues, this study aims to investigate the privacy requirements of an IIoT ecosystem as outlined by industry standards. It provides a comprehensive overview of the IIoT, its advantages, disadvantages, challenges, and the imperative need for industrial privacy. The research methodology encompasses a thorough literature review to gather existing knowledge and insights on the subject. Additionally, it explores how the IIoT is transforming the manufacturing industry and enhancing industrial processes, incorporating case studies and real-world examples to illustrate its practical applications and impact. Also, the research endeavors to offer actionable recommendations on implementing privacy-enhancing measures and establishing a secure IIoT ecosystem.

 Artículos similares

       
 
Matthew Warren,Oliver Burmeister    
This is the second special section on applied ethics for AJIS. As was the case for the first special section on ethics, of the various submissions, only three have been accepted for publication. This is not an indication that little work is being done in... ver más

 
Hans Hõrak    
As sedentary lifestyles and childhood obesity are becoming more prevalent, research in the field of physical activity (PA) has gained much momentum. Monitoring the PA of children and adolescents is crucial for ascertaining and understanding the phenomena... ver más
Revista: Information

 
Muhammad Asif,John Krogstie     Pág. pp. 4 - 9
In most personalized mobile services, the user model remains invisible, and users do not have control over it. Externalization of user models can allow users to get an overview the user model that is used for personalization, and adjust the profile and p... ver más