Zero-Trust Model for Smart Manufacturing Industry

被引:7
|
作者
Paul, Biplob [1 ]
Rao, Muzaffar [1 ,2 ,3 ]
机构
[1] Univ Limerick, Dept Elect & Comp Engn, Limerick V94 T9PX, Ireland
[2] Confirm SFI Ctr Smart Mfg, Pk Point,Dublin Rd, Limerick V94 C928, Ireland
[3] Lero Sci Fdn Ireland Res Ctr Software, Limerick V94 NYD3, Ireland
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 01期
关键词
cybersecurity; zero trust; network security; access control; smart manufacturing; cyber-physical system; Industry; 4.0; internet of things; cloud computing; CYBERSECURITY;
D O I
10.3390/app13010221
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Traditional security architectures use a perimeter-based security model where everything internal to the corporate network is trusted by default. This type of architecture was designed to protect static servers and endpoints; however, we need to adapt to emerging technologies where serverless applications are running on containers, mobile endpoints, IoT, and cyber-physical systems. Since the beginning of the fourth industrial revolution (Industry 4.0), there has been a massive investment in smart manufacturing which responds in real-time to the supply chain and connects the digital and physical environments using IoT, cloud computing, and data analytics. The zero-trust security model is a concept of implementing cybersecurity techniques considering all networks and hosts to be hostile irrespective of their location. Over the past few years, this model has proven to be a remarkably effective security solution in conventional networks and devices. In this paper, the zero-trust approach will be fully explored and documented explaining its principles, architecture, and implementation procedure. It will also include a background of the smart manufacturing industry and a review of the existing cyber security solutions followed by a proposed design of the zero-trust model along with all the enabling factors for on-premises and cloud-hosted infrastructure. Various security solutions such as micro-segmentation of the industrial network, device discovery, and compliance management tools that are essential in achieving complete zero-trust security are considered in the proposed architecture.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Zero-trust based dynamic access control for cloud computing
    Wang, Ri
    Li, Chen
    Zhang, Kun
    Tu, Bibo
    CYBERSECURITY, 2025, 8 (01):
  • [32] Identity authentication for edge devices based on zero-trust architecture
    Liu, Haiqing
    Ai, Ming
    Huang, Rong
    Qiu, Rixuan
    Li, Yuancheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (23):
  • [33] A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT
    Tian, Minqiu
    Li, Zifu
    Li, Fenghua
    Cao, Jin
    Guo, Chao
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 299 - 306
  • [34] A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing
    Ali, Belal
    Hijjawi, Simsam
    Campbell, Leith H.
    Gregory, Mark A.
    Li, Shuo
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [35] Identity authentication for edge devices based on zero-trust architecture
    Liu, Haiqing
    Ai, Ming
    Huang, Rong
    Qiu, Rixuan
    Li, Yuancheng
    Concurrency and Computation: Practice and Experience, 2022, 34 (23)
  • [36] ZETA: Transparent Zero-Trust Security Add-on for RDMA
    Chang, Hyunseok
    Mukherjee, Sarit
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 1041 - 1050
  • [37] A Blockchain-Inspired Attribute-Based Zero-Trust Access Control Model for IoT
    Awan, Samia Masood
    Azad, Muhammad Ajmal
    Arshad, Junaid
    Waheed, Urooj
    Sharif, Tahir
    INFORMATION, 2023, 14 (02)
  • [38] A Zero-Trust Architecture for Remote Access in Industrial IoT Infrastructures
    Federici, Fabio
    Martintoni, Davide
    Senni, Valerio
    ELECTRONICS, 2023, 12 (03)
  • [39] OZTrust: An O-RAN Zero-Trust Security System
    Jiang, Hao
    Chang, Hyunseok
    Mukherjee, Sarit
    Van der Merwe, Jacobus
    2023 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS, NFV-SDN, 2023, : 129 - 134
  • [40] Stability Analysis for Heterogeneous Vehicle Platoon in A Zero-Trust Environment
    Bao, Yibo
    Huang, Darong
    Na, Yuhong
    2023 2ND CONFERENCE ON FULLY ACTUATED SYSTEM THEORY AND APPLICATIONS, CFASTA, 2023, : 372 - 377