Show simple item record

dc.contributor.authorMoradbeikie, Azin
dc.contributor.authorJamshidi, Kamal
dc.contributor.authorBohlooli, Ali
dc.contributor.authorGarcía Almiñana, Jordi
dc.contributor.authorMasip Bruin, Xavier
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors
dc.date.accessioned2020-11-12T10:12:45Z
dc.date.issued2020
dc.identifier.citationMoradbeikie, A. [et al.]. A fog based approach for hazards differentiation in an IIoT scenario. A: International Conference on Computer and Communication Systems. "2020 5th International Conference on Computer and Communication Systems: ICCCS 2020, Shanghai, China, May 15-18, 2020". 2020, p. 458-462. ISBN 978-1-7281-6136-5. DOI 10.1109/ICCCS49078.2020.9118451.
dc.identifier.isbn978-1-7281-6136-5
dc.identifier.otherhttps://www.researchgate.net/publication/342218738_A_Fog_Based_Approach_for_Hazards_Differentiation_in_an_IIoT_Scenario
dc.identifier.urihttp://hdl.handle.net/2117/331973
dc.description© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.description.abstractIndustrial control systems (ICS) are applied in many critical infrastructures. Reducing reconfiguration time after hazard leads to safety improvement, so it is one of the most important objectives in these systems. Hazards can be due to the “system failure” or “cyber-attacks” factors. One of the procedures that can reduce the reconfiguration time is determining as soon as possible the cause of hazards based on the above mentioned factors. Differentiation of attack from failure without redundant data in addition to data from the system sensors is not possible. With advent of the IoT as IIoT, a condition is developed to provide the required redundant data; however, by increasing the number of IIoT devices within a factory, the generated data volume becomes too large. In this paper we describe a fog-based approach applied in a factory to deal with such increasing complexity. We compare the proposed method with a traditional cloud-based solution. According to the results, the proposed method leads to a reduction of 60% lost time in the recovery reconfiguration step of the system.
dc.format.extent5 p.
dc.language.isoeng
dc.subjectÀrees temàtiques de la UPC::Informàtica::Arquitectura de computadors
dc.subject.lcshCloud computing
dc.subject.lcshInternet of things
dc.subject.otherIndustrial control systems (ICS)
dc.subject.otherIndustrial internet of things (IIOT)
dc.subject.otherFog computing
dc.subject.otherFault and attack detection
dc.titleA fog based approach for hazards differentiation in an IIoT scenario
dc.typeConference report
dc.subject.lemacComputació en núvol
dc.subject.lemacInternet de les coses
dc.contributor.groupUniversitat Politècnica de Catalunya. CRAAX - Centre de Recerca d'Arquitectures Avançades de Xarxes
dc.identifier.doi10.1109/ICCCS49078.2020.9118451
dc.description.peerreviewedPeer Reviewed
dc.relation.publisherversionhttps://ieeexplore.ieee.org/document/9118451
dc.rights.accessRestricted access - publisher's policy
local.identifier.drac29764133
dc.description.versionPostprint (author's final draft)
dc.date.lift2022-06-16
local.citation.authorMoradbeikie, A.; Jamshidi, K.; Bohlooli, A.; Garcia, J.; Masip, X.
local.citation.contributorInternational Conference on Computer and Communication Systems
local.citation.publicationName2020 5th International Conference on Computer and Communication Systems: ICCCS 2020, Shanghai, China, May 15-18, 2020
local.citation.startingPage458
local.citation.endingPage462


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

All rights reserved. This work is protected by the corresponding intellectual and industrial property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public communication or transformation of this work are prohibited without permission of the copyright holder