dc.contributor.author | Moradbeikie, Azin |
dc.contributor.author | Jamshidi, Kamal |
dc.contributor.author | Bohlooli, Ali |
dc.contributor.author | García Almiñana, Jordi |
dc.contributor.author | Masip Bruin, Xavier |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors |
dc.date.accessioned | 2020-11-12T10:12:45Z |
dc.date.available | 2022-06-16T00:32:22Z |
dc.date.issued | 2020 |
dc.identifier.citation | Moradbeikie, A. [et al.]. A fog based approach for hazards differentiation in an IIoT scenario. A: International Conference on Computer and Communication Systems. "2020 5th International Conference on Computer and Communication Systems: ICCCS 2020, Shanghai, China, May 15-18, 2020". 2020, p. 458-462. ISBN 978-1-7281-6136-5. DOI 10.1109/ICCCS49078.2020.9118451. |
dc.identifier.isbn | 978-1-7281-6136-5 |
dc.identifier.other | https://www.researchgate.net/publication/342218738_A_Fog_Based_Approach_for_Hazards_Differentiation_in_an_IIoT_Scenario |
dc.identifier.uri | http://hdl.handle.net/2117/331973 |
dc.description | © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
dc.description.abstract | Industrial control systems (ICS) are applied in many critical infrastructures. Reducing reconfiguration time after hazard leads to safety improvement, so it is one of the most important objectives in these systems. Hazards can be due to the “system failure” or “cyber-attacks” factors. One of the procedures that can reduce the reconfiguration time is determining as soon as possible the cause of hazards based on the above mentioned factors. Differentiation of attack from failure without redundant data in addition to data from the system sensors is not possible. With advent of the IoT as IIoT, a condition is developed to provide the required redundant data; however, by increasing the number of IIoT devices within a factory, the generated data volume becomes too large. In this paper we describe a fog-based approach applied in a factory to deal with such increasing complexity. We compare the proposed method with a traditional cloud-based solution. According to the results, the proposed method leads to a reduction of 60% lost time in the recovery reconfiguration step of the system. |
dc.format.extent | 5 p. |
dc.language.iso | eng |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Arquitectura de computadors |
dc.subject.lcsh | Cloud computing |
dc.subject.lcsh | Internet of things |
dc.subject.other | Industrial control systems (ICS) |
dc.subject.other | Industrial internet of things (IIOT) |
dc.subject.other | Fog computing |
dc.subject.other | Fault and attack detection |
dc.title | A fog based approach for hazards differentiation in an IIoT scenario |
dc.type | Conference report |
dc.subject.lemac | Computació en núvol |
dc.subject.lemac | Internet de les coses |
dc.contributor.group | Universitat Politècnica de Catalunya. CRAAX - Centre de Recerca d'Arquitectures Avançades de Xarxes |
dc.identifier.doi | 10.1109/ICCCS49078.2020.9118451 |
dc.description.peerreviewed | Peer Reviewed |
dc.relation.publisherversion | https://ieeexplore.ieee.org/document/9118451 |
dc.rights.access | Open Access |
local.identifier.drac | 29764133 |
dc.description.version | Postprint (author's final draft) |
local.citation.author | Moradbeikie, A.; Jamshidi, K.; Bohlooli, A.; Garcia, J.; Masip, X. |
local.citation.contributor | International Conference on Computer and Communication Systems |
local.citation.publicationName | 2020 5th International Conference on Computer and Communication Systems: ICCCS 2020, Shanghai, China, May 15-18, 2020 |
local.citation.startingPage | 458 |
local.citation.endingPage | 462 |