Security and privacy analysis based on Internet of Things in the fourth industrial generation (Industry ۴.۰)
Publish place: International Journal of Innovation in Management, Economics and Social Sciences، Vol: 3، Issue: 2
Publish Year: 1402
نوع سند: مقاله ژورنالی
زبان: English
View: 110
This Paper With 12 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
JR_IJIMES-3-2_001
تاریخ نمایه سازی: 27 بهمن 1402
Abstract:
The connection of smart devices using the Internet has dramatically changed the way people live, and this concept has also been extended to the industrial sector. This practice not only provides more stable, faster, and safer communications but also makes it possible to realize the concept of the smart factory in the fourth industrial revolution. The Internet of Things uses a unique Internet Protocol to identify, control, and transmit data to individuals as well as databases. Data is collected through the Internet of Things, stored in cloud storage, and managed and calculated through analytical tools. Internet of Things security is a field of technology that focuses on protecting connected devices and networks in the Internet of Things (IoT). Ensuring the safety of networks with connected IoT devices is critical. Security in the Internet of Things includes a wide range of techniques, strategies, protocols, and measures aimed at mitigating the ever-increasing vulnerabilities of the Internet of Things in modern businesses. The simultaneous connection of objects also brings privacy concerns. For this reason, in this research, an effort has been made to examine and analyze the most important privacy requirements in the Internet of Things in digital businesses in Industry ۴.۰. In this regard, by using experts' opinions and literature review, privacy requirements were extracted and evaluated using fuzzy non-linear decision-making methodology. The results showed that acquired and intrinsic information has the highest importance.The connection of smart devices using the Internet has dramatically changed the way people live, and this concept has also been extended to the industrial sector. This practice not only provides more stable, faster, and safer communications but also makes it possible to realize the concept of the smart factory in the fourth industrial revolution. The Internet of Things uses a unique Internet Protocol to identify, control, and transmit data to individuals as well as databases. Data is collected through the Internet of Things, stored in cloud storage, and managed and calculated through analytical tools. Internet of Things security is a field of technology that focuses on protecting connected devices and networks in the Internet of Things (IoT). Ensuring the safety of networks with connected IoT devices is critical. Security in the Internet of Things includes a wide range of techniques, strategies, protocols, and measures aimed at mitigating the ever-increasing vulnerabilities of the Internet of Things in modern businesses. The simultaneous connection of objects also brings privacy concerns. For this reason, in this research, an effort has been made to examine and analyze the most important privacy requirements in the Internet of Things in digital businesses in Industry ۴.۰. In this regard, by using experts' opinions and literature review, privacy requirements were extracted and evaluated using fuzzy non-linear decision-making methodology. The results showed that acquired and intrinsic information has the highest importance.
Keywords:
Internet of Things , Industry ۴.۰ , privacy , security of Internet of Things , Industrial Internet of Things (IIoT)
Authors
Mahmonir Bayanati *
Department of Management, Islamic Azad University, West Tehran Branch, Tehran, Iran
مراجع و منابع این Paper:
لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :