Katalog Plus
Bibliothek der Frankfurt UAS
Bald neuer Katalog: sichern Sie sich schon vorab Ihre persönlichen Merklisten im Nutzerkonto: Anleitung.
Dieses Ergebnis aus Directory of Open Access Journals kann Gästen nicht angezeigt werden.  Login für vollen Zugriff.

IIoT’s Risk Odyssey: Navigating the Risk Propagation of Illegal Information Flows

Title: IIoT’s Risk Odyssey: Navigating the Risk Propagation of Illegal Information Flows
Authors: Argiro Anagnostopoulou; Ioannis Mavridis; Michael Athanasopoulos; Alexios Mylonas; Dimitris Gritzalis
Source: IEEE Access, Vol 13, Pp 59422-59445 (2025)
Publisher Information: IEEE, 2025.
Publication Year: 2025
Collection: LCC:Electrical engineering. Electronics. Nuclear engineering
Subject Terms: Access control; dependency chain analysis; graph centrality; industry 4.0; information flow control; information security; Electrical engineering. Electronics. Nuclear engineering; TK1-9971
Description: Industrial Internet of Things (IIoT) refers to a broad network of low-cost, interconnected devices, including actuators, programmable logic controllers (PLCs), and sensors. Such environments are characterized by the vast amount of data exchanged among a wide range of devices, applications, and services. The scalability and decentralized nature of IIoT introduces considerable challenges for traditional security mechanisms. As a result, it is crucial to establish more robust security measures, enforce more effective access control policies, and efficiently manage information flows within business processes. In our prior research, we introduced a methodology for the assessment of information flows in IIoT environments and the detection of the illegal ones. Specifically, we utilized a risk-based methodology to model complex business processes as directed graphs. This approach enabled us to thoroughly analyze the interdependencies among participating objects. Through this analysis, we aimed to identify objects that are susceptible to initiating or being influenced by illegal information flows. In our current study, we investigate the propagation of the risk of illegal information flows within and across business processes. Finally, we apply centrality metrics to identify critical objects that require more efficient access control rules and policies in order to mitigate illegal information flows within the IIoT network. To the best of our knowledge, no previous research has explored the concept of risk-based detection of illegal information flows and examined potential propagation of risk in industrial environments.
Document Type: article
File Description: electronic resource
Language: English
ISSN: 2169-3536
Relation: https://ieeexplore.ieee.org/document/10945353/; https://doaj.org/toc/2169-3536
DOI: 10.1109/ACCESS.2025.3555873
Access URL: https://doaj.org/article/bf2b730015f042cb9c8dfcdca7b7a9ed
Accession Number: edsdoj.bf2b730015f042cb9c8dfcdca7b7a9ed
Database: Directory of Open Access Journals