通过数据过程分解的供应链安全管理:一个体系结构视角

W. Afrifah, G. Epiphaniou, C. Maple
{"title":"通过数据过程分解的供应链安全管理:一个体系结构视角","authors":"W. Afrifah, G. Epiphaniou, C. Maple","doi":"10.1049/icp.2021.2426","DOIUrl":null,"url":null,"abstract":"In today's volatile environment, we have never been more reliant on a tightly knit supply chain (SC). Globalisation, mass manufacturing, and specialisation are now hallmarks of our integrated, industrialised world. Decision-makers rely heavily on accurate up-to-the-minute data. Even the tiniest interruption in data flow can have a huge effect on the quality of decision-making and performance. In the full interconnection paradigm, this dependency has inadvertently pushed device connectivity toward an Industrial Internet of Things (IIoT) approach. This has allowed the provision of 'added value resources' such as SC optimisation for Industry 4.0 (I4.0) or enhanced process controls. While system interconnectivity has increased, Internet of Things (IoT) and I4.0 SC protection measures have lagged behind. The root cause of this disparity is the existing mainstream security practices inherited from industrial networks and linking systems that neglect any specific security capability. This paper introduces the preliminary design of an I4.0 SC architecture that offers a complete protocol break about how exacting security functions could be implemented by isolation, a rigorous access control system, and surveillance to ensure the proposed architecture's end-to-end security to I4.0 SC.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Supply Chain Security Management through Data Process Decomposition: An Architecture Perspective\",\"authors\":\"W. Afrifah, G. Epiphaniou, C. Maple\",\"doi\":\"10.1049/icp.2021.2426\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's volatile environment, we have never been more reliant on a tightly knit supply chain (SC). Globalisation, mass manufacturing, and specialisation are now hallmarks of our integrated, industrialised world. Decision-makers rely heavily on accurate up-to-the-minute data. Even the tiniest interruption in data flow can have a huge effect on the quality of decision-making and performance. In the full interconnection paradigm, this dependency has inadvertently pushed device connectivity toward an Industrial Internet of Things (IIoT) approach. This has allowed the provision of 'added value resources' such as SC optimisation for Industry 4.0 (I4.0) or enhanced process controls. While system interconnectivity has increased, Internet of Things (IoT) and I4.0 SC protection measures have lagged behind. The root cause of this disparity is the existing mainstream security practices inherited from industrial networks and linking systems that neglect any specific security capability. This paper introduces the preliminary design of an I4.0 SC architecture that offers a complete protocol break about how exacting security functions could be implemented by isolation, a rigorous access control system, and surveillance to ensure the proposed architecture's end-to-end security to I4.0 SC.\",\"PeriodicalId\":254750,\"journal\":{\"name\":\"Competitive Advantage in the Digital Economy (CADE 2021)\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Competitive Advantage in the Digital Economy (CADE 2021)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/icp.2021.2426\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Competitive Advantage in the Digital Economy (CADE 2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/icp.2021.2426","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在当今动荡的环境中,我们从未像现在这样依赖于紧密结合的供应链。全球化、大规模制造和专业化现在是我们这个一体化、工业化世界的标志。决策者在很大程度上依赖于准确的最新数据。即使是数据流中最微小的中断也会对决策质量和性能产生巨大影响。在完全互连范例中,这种依赖性无意中将设备连接推向了工业物联网(IIoT)方法。这允许提供“附加价值资源”,例如工业4.0 (I4.0)的SC优化或增强的过程控制。虽然系统互联性提高了,但物联网(IoT)和I4.0 SC保护措施却落后了。造成这种差异的根本原因是现有的主流安全实践继承自工业网络和连接系统,忽视了任何特定的安全能力。本文介绍了I4.0 SC架构的初步设计,该架构提供了一个完整的协议突破,关于如何通过隔离、严格的访问控制系统和监视来实现严格的安全功能,以确保所提议的架构对I4.0 SC的端到端安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Supply Chain Security Management through Data Process Decomposition: An Architecture Perspective
In today's volatile environment, we have never been more reliant on a tightly knit supply chain (SC). Globalisation, mass manufacturing, and specialisation are now hallmarks of our integrated, industrialised world. Decision-makers rely heavily on accurate up-to-the-minute data. Even the tiniest interruption in data flow can have a huge effect on the quality of decision-making and performance. In the full interconnection paradigm, this dependency has inadvertently pushed device connectivity toward an Industrial Internet of Things (IIoT) approach. This has allowed the provision of 'added value resources' such as SC optimisation for Industry 4.0 (I4.0) or enhanced process controls. While system interconnectivity has increased, Internet of Things (IoT) and I4.0 SC protection measures have lagged behind. The root cause of this disparity is the existing mainstream security practices inherited from industrial networks and linking systems that neglect any specific security capability. This paper introduces the preliminary design of an I4.0 SC architecture that offers a complete protocol break about how exacting security functions could be implemented by isolation, a rigorous access control system, and surveillance to ensure the proposed architecture's end-to-end security to I4.0 SC.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信