Cyber Security Systems in Manufacturing Process Application: A Review

Rakshith S.; Dileep L.; Dr. Gopalakrishna1

1

Publication Date: 2024/05/29

Abstract: In recent times, technological progress has become increasingly pivotal across various sectors, particularly in engineering and its associated fields. However, organizations are grappling with numerous challenges, foremost among them being security threats such as unauthorized access to sensitive company data by external entities. The prevalence of such security issues has emerged as a significant concern for many enterprises, as the economic stability of an organization hinges on the secure integration of diverse information assets, free from external vulnerabilities. This study delves into existing literature on advancements in cybersecurity within manufacturing process networks, aiming to bolster safety measures against cyber-attacks and fortify operations. With the advent of Industry 4.0, there is a ripe opportunity to infuse modernizing elements into manufacturing systems, thereby fortifying their security infrastructure. By leveraging cybersecurity protocols, organizations can safeguard information integrity to uphold stringent safety standards effectively.

Keywords: Cyber Security, Industrial, Integrated Data, Manufacturing Systems, Smart Manufacturing.

DOI: https://doi.org/10.38124/ijisrt/IJISRT24MAY1800

PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT24MAY1800.pdf

REFERENCES

  1. V Mullet, P Sondi and E Ramat (2021). A review of cybersecurity guidelines for manufacturing factories in industry 4.0, IEEE Access, 9, 23235-23263, Available at: https://doi.org/10.1109/ACCESS.2021.3056 650.
  2. S Chaitanya Chaduvula, A Dachowicz, M J. Atallah and J H. Panchal (2018). Security in cyber-enabled design and manufacturing: A survey, Journal of Computing and Information Science in Engineering, 18(4), Available at: https://doi.org/10.1115/1.4040341.
  3. N Tuptuk and S Hailes (2018). Security of smart manufacturing systems, Journal of Manufacturing Systems, 47, 93-106, Available at: https://doi.org/10.1016/j.jmsy.2018.04.007.
  4. U P. Daniel Ani, H (Mary) He and A Tiwari (2016). Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective, Journal of Cyber Security Technology, 1(1), 32-74, Available at: https://doi.org/10.1080/23742917.2016.125 2211.
  5. A Araújo de Souza, J Luiz de Souza Pio, J Cunha Fonseca, et al (2021). The state of cybersecurity in smart manufacturing systems: A systematic review, European Journal of Business and Management Research, 6(6), 188-194, Available at: https://doi.org/10.24018/ejbmr.2021.6.6.11 73.
  6. K Kannus Deloitte and I Ilvonen (2018). Future prospects of cyber security in Manufacturing: Findings from Delphi study. Proceedings of 51st Hawaii International Conference on systems sciences. Scholar Space, Available at: https://scholarspace.manoa.hawaii.edu/item s/b640e9b8-c8f3-43cc-aa41-ae2e43803edf.
  7. F Cremer, B Sheehan, M Fortmann, et al (2022). Cyber risk and cybersecurity: a systematic review of data availability, Geneva Papers on Risk and Insurance: Issues and Practice, 47(3), 698-736, Available at: https://doi.org/10.1057/s41288-022-00266- 6.
  8. A Fedelle and C Roner (2022). Dangerous games: A literature review on cybersecurity investments, Journal of Economic Surveys, 36(1), 157-187, Available at: https://doi.org/10.1111/joes.12456.
  9. R. K. Mantha Bharadwaj and B García de Soto (2021). Cybersecurity in construction: Where do we stand and how do we get better prepared, Frontiers in Built Environment, 7, Available at: https://doi.org/10.3389/fbuil.2021.612668.
  10. R Jorge Raimundo and A Travassos Rosário (2022). Cybersecurity in the internet of things in industrial management, Applied Sciences, 12(3), Available at: https://doi.org/10.3390/app12031598.
  11. D Faquir, N Chouliaras, V Sofia, et al (2020). Cybersecurity in smart grids, challenges and solutions, AIMS Electronics and Electrical Engineering, 5(1), 24-37, Available at: https://www.aimspress.com/aimspressdata/electreng/2021/1/PDF/ElectronEng-05- 01-002.pdf.
  12. D Wu, A Ren, W Zhang, et al (2018). Cybersecurity for digital manufacturing, Journal of Manufacturing Systems, 48(C), 3-12, Available at: https://doi.org/10.1016/j.jmsy.2018.03.006.
  13. L Mohd Nasrulddin Abd, A Nurul Ashykin Abd, H Nik Syuhailah Nik and A Zuraimi Abdul (2021). Cyber security in supply chain management: A systematic review, LogForum, 17(1), 49-57, Available at: http://dx.doi.org/10.17270/J.LOG.2021.555 .
  14. P Theron (2018). Through-life cyber resilience in future smart manufacturing environments. A research programme, Procedia Manufacturing, 16, 193-207, Available at: https://doi.org/10.1016/j.promfg.2018.10.15 7.
  15. J-Paul A. Yaacoub, H N. Noura, O Salman and A Chehab (2022). Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations, International Journal of Information Security, 21, 115-158, Available at: https://doi.org/10.1007/s10207-021-00545- 8.
  16. A Zarreha, C Saygin, H Da Wan, et al (2018). Cybersecurity analysis of smart manufacturing system using game theory approach and quantal response equilibrium, Procedia Manufacturing, 17, 1001-1008, Available at: https://doi.org/10.1016/j.promfg.2018.10.08 7.
  17. V. Alcácer and V. Cruz-Machado (2019). Scanning the industry 4.0: A literature review on technologies for manufacturing systems, Engineering Science and Technology, an International Journal, 22(3), 899-919, Available at: https://doi.org/10.1016/j.jestch.2019.01.006 .
  18. J Prinsloo, S Sinha and B von Solms (2019). A review of industry 4.0 manufacturing process security risks, Applied Sciences, 9(23), Available at: https://doi.org/10.3390/app9235105.
  19. R Ahamed and R Thurasamy (2022). A systematic literature review of routine activity theory’s applicability in cybercrimes, Journal of Cyber Security and Mobility, 11(3), 405-431, Available at: https://journals.riverpublishers.com/index.p hp/JCSANDM/article/view/12451/13563.
  20. A Ghadge, M Weiß, N D. Caldwell and R Wilding (2020). Managing cyber risk in supply chains: a review and research agenda, Supply Chain Management, 25(2), 223-240, Available at: https://doi.org/10.1108/SCM-10-2018- 0357.
  21. Anand E, Panneerselvam R. (2016). A study of crossover operators for genetic algorithm and proposal of a new crossover operator to solve open shop scheduling problem, American Journal of Industrial and Business Management, 6(6),774-789, Available at: https://www.scirp.org/journal/paperinforma tion.aspx?paperid=67660