Cyber risk at the edge: current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains

Digital technologies have changed the way supply chain operations are structured. In this article, we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks. A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0, with a specific focus on the mitigation of cyber risks. An analytical framework is presented, based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies. This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning (AI/ML) and real-time intelligence for predictive cyber risk analytics. The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge. This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when AI/ML technologies are migrated to the periphery of IoT networks.

[1]  Vicky Manthou,et al.  Virtual e-Chain (VeC) model for supply chain collaboration , 2004 .

[2]  Oliver Niggemann,et al.  Data-Driven Monitoring of Cyber-Physical Systems Leveraging on Big Data and the Internet-of-Things for Diagnosis and Control , 2015, DX.

[3]  Jason R. C. Nurse,et al.  Insider threat response and recovery strategies in financial services firms , 2016 .

[4]  Bradley R. Schmerl,et al.  View Consistency in Architectures for Cyber-Physical Systems , 2011, 2011 IEEE/ACM Second International Conference on Cyber-Physical Systems.

[5]  Petar Radanliev,et al.  Green-Field Architecture for Sustainable Supply Chain Strategy Formulation , 2015 .

[6]  Paulo Leitão,et al.  Industrial automation based on cyber-physical systems technologies: Prototype implementations and challenges , 2016, Comput. Ind..

[7]  Wilhelm Bauer,et al.  Transforming to a Hyper-connected Society and Economy – Towards an “Industry 4.0” , 2015 .

[8]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[9]  Aditya Ashok,et al.  Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.

[10]  Soo Dong Kim,et al.  A Service-Based Approach to Designing Cyber Physical Systems , 2010, 2010 IEEE/ACIS 9th International Conference on Computer and Information Science.

[11]  Tobias Wagner,et al.  Mental Strain as Field of Action in the 4th Industrial Revolution , 2014 .

[12]  Sadie Creese,et al.  Security Risk Assessment in Internet of Things Systems , 2017, IT Professional.

[13]  Petar Radanliev A conceptual framework for supply : supply chain systems architecture and integration design based on practice and theory in the North Wales slate mining industry , 2014 .

[14]  Katerina Pramatari,et al.  Implementation of collaborative e-supply-chain initiatives: an initial challenging and final success case from grocery retailing , 2009, J. Inf. Technol..

[15]  N. Jazdi,et al.  Cyber physical systems in the context of Industry 4.0 , 2014, 2014 IEEE International Conference on Automation, Quality and Testing, Robotics.

[16]  Gaetano Cascini,et al.  An algorithm for supply chain integration based on OTSM- TRIZ , 2013 .

[17]  Sang Hyuk Son,et al.  RDDS: A Real-Time Data Distribution Service for Cyber-Physical Systems , 2012, IEEE Transactions on Industrial Informatics.

[18]  Gary W. Anderson The Economic Impact of Technology Infrastructure for Additive Manufacturing , 2016 .

[19]  Detlef Zühlke,et al.  Lean Automation enabled by Industry 4.0 Technologies , 2015 .

[20]  Barnaby Craggs,et al.  Smart cyber-physical systems: beyond usable security to security ergonomics by design , 2017 .

[21]  R. Kaplan,et al.  Using the balanced scorecard as a strategic management system , 1996 .

[22]  Petar Radanliev,et al.  Architectures for Green-Field Supply Chain Integration: Supply Chain Integration Design , 2015 .

[23]  Elena Gatti,et al.  „Made in China 2025“ , 2019, Digitales China.

[24]  Zachary A. Collier,et al.  Systems engineering framework for cyber physical security and resilience , 2015, Environment Systems and Decisions.

[25]  Peter Burnap,et al.  Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies , 2019, ArXiv.

[26]  Syed Hassan Ahmed,et al.  Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).

[27]  Petar Radanliev,et al.  Supply Chain Systems Architecture and Engineering Design: Green-Field Supply Chain Integration , 2015 .

[28]  Shanchieh Jay Yang,et al.  Forecasting cyberattacks with incomplete, imbalanced, and insignificant data , 2018, Cybersecur..

[29]  Fatima Hussain Internet of Everything , 2017 .

[30]  Jan Olhager,et al.  Supply chain integration and performance: The effects of long-term relationships, information technology and sharing, and logistics integration , 2012 .

[31]  Albert Benveniste,et al.  A unifying view of loosely time-triggered architectures , 2010, EMSOFT '10.

[32]  Jun Zhao,et al.  X-Ray Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps , 2018, CHI.

[33]  Abdullah S. Al-Mudimigh,et al.  Extending the concept of supply chain:: The effective management of value chains , 2004 .

[34]  David De Roure,et al.  Cyber Risk in IoT Systems , 2019 .

[35]  David De Roure,et al.  Integration of Cyber Security Frameworks‚ Models and Approaches for Building Design Principles for the Internet−of−Things in Industry 4.0 , 2018, IoT 2018.

[36]  Clemens Faller,et al.  Industry 4.0 Learning Factory for regional SMEs , 2015 .

[37]  Keyun Ruan,et al.  Introducing cybernomics: A unifying economic framework for measuring cyber risk , 2017, Comput. Secur..

[38]  M. Frohlich,et al.  Arcs of integration: an international study of supply chain strategies , 2001 .

[39]  Lihui Wang,et al.  Current status and advancement of cyber-physical systems in manufacturing , 2015 .

[40]  Didier Stricker,et al.  Visual Computing as a Key Enabling Technology for Industrie 4.0 and Industrial Internet , 2015, IEEE Computer Graphics and Applications.

[41]  Eve D. Rosenzweig,et al.  The influence of an integration strategy on competitive capabilities and business performance: An exploratory study of consumer products manufacturers , 2003 .

[42]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[43]  Matthew David,et al.  Science in Society , 2005 .

[44]  Nathalie Mitton,et al.  Cyber-Physical Objects as Key Elements for a Smart Cyber-City , 2016, Management of Cyber Physical Objects in the Future Internet of Things.

[45]  M. Easterby-Smith,et al.  Management Research: An Introduction , 1991 .

[46]  K. Eisenhardt Building theories from case study research , 1989, STUDI ORGANIZZATIVI.

[47]  T. Leonard,et al.  Richard H. Thaler, Cass R. Sunstein, Nudge: Improving decisions about health, wealth, and happiness , 2008 .

[48]  Shanchieh Jay Yang,et al.  ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense , 2019, Cybersecur..

[49]  Julie A. McCann,et al.  Failures from the Environment, a Report on the First FAILSAFE workshop , 2018, CCRV.

[50]  Brian Paltridge,et al.  Peer Review in Academic Settings , 2017 .

[51]  Tim Watson,et al.  Motivation and opportunity based model to reduce information security insider threats in organisations , 2018, J. Inf. Secur. Appl..

[52]  Scott J. Shackelford Protecting Intellectual Property and Privacy in the Digital Age: The Use of National Cybersecurity Strategies to Mitigate Cyber Risk , 2015 .

[53]  Jay Lee,et al.  A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .

[54]  Edward A. Lee,et al.  A model-based design methodology for cyber-physical systems , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[55]  Luís Fernando Ascenção Guedes,et al.  Technology roadmapping: A methodological proposition to refine Delphi results , 2018 .

[56]  Jiafu Wan,et al.  Industrie 4.0: Enabling technologies , 2015, Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things.

[57]  K. Charmaz,et al.  Constructing Grounded Theory: A practical guide through qualitative analysis Kathy Charmaz Constructing Grounded Theory: A practical guide through qualitative analysis Sage 224 £19.99 0761973532 0761973532 [Formula: see text]. , 2006, Nurse researcher.

[58]  R. Thaler,et al.  Nudge: Improving Decisions About Health, Wealth, and Happiness , 2008 .

[59]  Jiafu Wan,et al.  A survey of Cyber-Physical Systems , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).

[60]  Carsten Maple,et al.  A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape , 2019, Living in the Internet of Things (IoT 2019).

[61]  R. Yusoff,et al.  The Study of Supply Chain Management Strategy and Practices on Supply Chain Performance , 2012 .

[62]  Peter Burnap,et al.  Cyber Risk Management for the Internet of Things , 2019 .

[63]  Peter Burnap,et al.  Pulse: an adaptive intrusion detection for the internet of things , 2018, IoT 2018.

[64]  Carsten Maple,et al.  Future developments in standardisation of cyber risk in the Internet of Things (IoT) , 2019 .

[65]  Kaijun Leng,et al.  A Genetic Algorithm Approach for TOC-based Supply Chain Coordination , 2012 .

[66]  Peter I. Corke,et al.  Transforming Agriculture through Pervasive Wireless Sensor Networks , 2007, IEEE Pervasive Computing.

[67]  Sadie Creese,et al.  If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems , 2018, IoT 2018.

[68]  Lihui Wang,et al.  A cloud-based approach for WEEE remanufacturing , 2014 .

[69]  Keith Kirkpatrick,et al.  Software-defined networking , 2013, CACM.

[70]  Ali Farhoomand,et al.  Constructing an e-Supply Chain at Eastman Chemical Company , 2004, J. Inf. Technol..

[71]  George Q. Huang,et al.  Optimal configuration of assembly supply chains using analytical target cascading , 2010 .

[72]  Wei Wu,et al.  From proof-of-concept to exploitable , 2019, Cybersecur..

[73]  Max Van Kleek,et al.  Complex coupling in cyber−physical systems and the threats of fake data , 2019 .

[74]  Malte Brettel,et al.  Enablers for Self-optimizing Production Systems in the Context of Industrie 4.0 , 2016 .

[75]  Madeline Carr,et al.  Emerging risks in the IoT ecosystem: Who's afraid of the big bad smart fridge? , 2018, IoT 2018.

[76]  Philipp Reinecke,et al.  Challenges and performance metrics for security operations center analysts: a systematic review , 2020 .

[77]  Paul Schönsleben,et al.  A decomposition-based approach for the development of a supply chain strategy , 2007 .

[78]  Wendy L. Currie,et al.  Financialization and information technology: A multi-paradigmatic view of IT and finance – Part II , 2018, J. Inf. Technol..

[79]  Michael Engel,et al.  Cyber-Physical Systems: Opportunities, Challenges and (Some) Solutions , 2016, Management of Cyber Physical Objects in the Future Internet of Things.

[80]  Paul Kearney,et al.  Cyber security of smart homes: development of a reference architecture for attack surface analysis , 2018, IoT 2018.

[81]  Cesar Sanin,et al.  Virtual Engineering Object / Virtual Engineering Process: A specialized form of Cyber Physical System for Industrie 4.0 , 2015, KES.

[82]  Alberto L. Sangiovanni-Vincentelli,et al.  Taming Dr. Frankenstein: Contract-Based Design for Cyber-Physical Systems , 2012, Eur. J. Control.

[83]  Petar Radanliev,et al.  Economic impact of IoT cyber risk - Analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance , 2018, IoT 2018.

[84]  G. Seliger,et al.  Opportunities of Sustainable Manufacturing in Industry 4.0 , 2016 .

[85]  Boris Otto,et al.  Design Principles for Industrie 4.0 Scenarios , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[86]  Michael Huth,et al.  Cyber Risk impact Assessment - Assessing the Risk from the IoT to the Digital Economy , 2019 .

[87]  Albert Benveniste,et al.  Loosely Time-Triggered Architectures for Cyber-Physical Systems , 2010, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010).

[88]  Nikil D. Dutt,et al.  Models, abstractions, and architectures: The missing links in cyber-physical systems , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[89]  Ruzanna Chitchyan,et al.  Privacy Requirements: Present & Future , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering in Society Track (ICSE-SEIS).

[90]  James A. Hendler,et al.  Towards a Cyberphysical Web Science: A Social Machines Perspective on Pokémon GO! , 2019, WebSci.

[91]  Keah Choon Tan,et al.  Supply chain integration with third-party logistics providers , 2010 .

[92]  Felisa M. Córdova,et al.  A Proposal of Logistic Services Innovation Strategy for a Mining Company , 2012 .

[93]  Hwaiyu Geng THE INDUSTRIAL INTERNET OF THINGS (IIoT) , 2017 .

[94]  K. Voigt,et al.  Fortune favors the prepared: How SMEs approach business model innovations in Industry 4.0 , 2018, Technological Forecasting and Social Change.

[95]  Feng Xia,et al.  From machine-to-machine communications towards cyber-physical systems , 2013, Comput. Sci. Inf. Syst..

[96]  Dmitry Ivanov,et al.  Integrated scheduling of material flows and information services in industry 4.0 supply networks , 2015 .

[97]  KarnouskosStamatis,et al.  Human Factors in Industrial Automation based on Cyber Physical Systems Technologies , 2016 .

[98]  Mark de Reuver,et al.  The digital platform: a research agenda , 2018, J. Inf. Technol..

[99]  Vipin Kumar,et al.  Trends in big data analytics , 2014, J. Parallel Distributed Comput..

[100]  Hsi-Peng Lu,et al.  Smart manufacturing technology, market maturity analysis and technology roadmap in the computer and electronic product manufacturing industry , 2018, Technological Forecasting and Social Change.

[101]  T. V. D. Vaart,et al.  A critical review of survey-based research in supply chain integration , 2008 .

[102]  Yacov Y. Haimes,et al.  A holistic roadmap for survivable infrastructure systems , 2002, IEEE Trans. Syst. Man Cybern. Part A.

[103]  Jorge Posada,et al.  9th International Conference on Knowledge Based and Intelligent Information and Engineering Systems a Perspective on Knowledge Based and Intelligent Systems Implementation in Industrie 4.0 , 2022 .

[104]  Michael C. Kettelhut Using JAD for Strategic Initiatives , 1997, Inf. Syst. Manag..

[105]  Joachim Blatter,et al.  Designing Case Studies , 2012 .

[106]  Martin Eling,et al.  Insurability of Cyber Risk , 2014 .

[107]  Kim P. Bryceson,et al.  Alignment of performance metrics in a multi-enterprise agribusiness: Achieving integrated autonomy? , 2010 .

[108]  Ying Tan,et al.  A prototype architecture for cyber-physical systems , 2008, SIGBED.

[109]  Joseph Lindley,et al.  Internet of Things: realising the potential of a trusted smart world , 2018 .

[110]  Pete Burnap,et al.  A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.

[111]  Günther Pernul,et al.  Graph-based visual analytics for cyber threat intelligence , 2018, Cybersecurity.

[112]  Quanyan Zhu,et al.  A hierarchical security architecture for cyber-physical systems , 2011, 2011 4th International Symposium on Resilient Control Systems.

[113]  F. Schiavone,et al.  Understanding business model in the Internet of Things industry , 2018, Technological Forecasting and Social Change.

[114]  Wendy Hall,et al.  Network Analysis Literacy , 2015, Lecture Notes in Social Networks.

[115]  Paul Coulton,et al.  Value creation for IoT: challenges and opportunities within the design and development process , 2019, Living in the Internet of Things (IoT 2019).

[116]  M. Dotoli,et al.  A multi-level approach for network design of integrated supply chains , 2005 .

[117]  David De Roure,et al.  Observing Social Machines Part 2: How to Observe? , 2015, WebSci.

[118]  Yong Wang,et al.  SDF: software-defined flash for web-scale internet storage systems , 2014, ASPLOS.

[119]  Kleanthis Thramboulidis,et al.  A cyber-physical system-based approach for industrial automation systems , 2014, Comput. Ind..

[120]  A. Strauss,et al.  The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .

[121]  Carsten Maple,et al.  A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis , 2019, Applied Sciences.

[122]  G. Rodewald. Aligning information security investments with a firm's risk tolerance , 2005, InfoSecCD '05.

[123]  Lihui Wang,et al.  Machine availability monitoring and machining process planning towards Cloud manufacturing , 2013 .

[124]  Jay Lee,et al.  Service Innovation and Smart Analytics for Industry 4.0 and Big Data Environment , 2014 .

[125]  P. Eriksson,et al.  Qualitative Methods in Business Research , 2008 .

[126]  Michael Huth,et al.  Mapping the values of IoT , 2018, J. Inf. Technol..

[127]  Madeline Carr,et al.  Standardising a moving target: The development and evolution of IoT security standards , 2018, IoT 2018.

[128]  C. Fung,et al.  Value analysis of cyber security based on attack types , 2015 .

[129]  R. Narasimhan,et al.  Supply chain design: issues, challenges, frameworks and solutions , 2014 .

[130]  Insup Lee,et al.  Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.

[131]  Bo Chen,et al.  Ensuring data confidentiality via plausibly deniable encryption and secure deletion – a survey , 2018, Cybersecur..

[132]  R. Perez-Franco Rethinking your supply chain strategy: A Brief Guide , 2016 .

[133]  Karen Scarfone,et al.  Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.

[134]  Steve New,et al.  Cyber risk assessment in cloud provider environments: Current models and future needs , 2019, Comput. Secur..

[135]  Mathias Schmitt,et al.  Towards Industry 4.0 - Standardization as the crucial challenge for highly modular, multi-vendor production systems , 2015 .

[136]  S. Vickery,et al.  The effects of an integrative supply chain strategy on customer service and financial performance: an analysis of direct versus indirect relationships , 2003 .

[137]  Lawrence A. Gordon,et al.  The economics of information security investment , 2002, TSEC.

[138]  Zach G. Zacharia,et al.  DEFINING SUPPLY CHAIN MANAGEMENT , 2001 .

[139]  Mumbai,et al.  Internet of Things (IoT): A Literature Review , 2015 .

[140]  Jose Barata,et al.  An agent-based interaction-oriented shop floor to support emergent diagnosis , 2010, 2010 8th IEEE International Conference on Industrial Informatics.

[141]  Joe Cunningham,et al.  The industrial internet of things (IIoT): An analysis framework , 2018, Comput. Ind..

[142]  Michael Huth,et al.  Cyber Security Framework for the Internet-of-Things in Industry 4.0 , 2019 .

[143]  Ivan Stojmenovic,et al.  Machine-to-Machine Communications With In-Network Data Aggregation, Processing, and Actuation for Large-Scale Cyber-Physical Systems , 2014, IEEE Internet of Things Journal.

[144]  Jiafu Wan,et al.  Implementing Smart Factory of Industrie 4.0: An Outlook , 2016, Int. J. Distributed Sens. Networks.

[145]  Valerie Botta-Genoulaz,et al.  An ontological approach for strategic alignment: a supply chain operations reference case study , 2011, Int. J. Comput. Integr. Manuf..

[146]  Sadie Creese,et al.  Sonification in security operations centres: what do security practitioners think? , 2018, ArXiv.

[147]  Neil Gershenfeld,et al.  When things start to think , 1999 .

[148]  Andrea Vinci,et al.  A Smart Platform for Large-Scale Cyber-Physical Systems , 2016, Management of Cyber Physical Objects in the Future Internet of Things.

[149]  Michael J. Shaw,et al.  Business-to-business electronic commerce and convergent assembly supply chain management , 1999, J. Inf. Technol..

[150]  Edward Toomer,et al.  Qualitative Methods in Management Research , 1989 .

[151]  Michael Huth,et al.  Future Developments in Cyber Risk Assessment for the Internet of Things , 2018, Comput. Ind..

[152]  Petar Radanliev,et al.  Engineering Design Methodology for Green-Field Supply Chain Architectures Taxonomic Scheme , 2015 .

[153]  Bernhard Rumpe,et al.  MontiArcAutomaton: Architecture and Behavior Modeling of Cyber-Physical Systems with MontiArcAutomaton , 2015, Aachener Informatik-Berichte, Software Engineering.

[154]  Christina Goulding Grounded Theory: A Practical Guide for Management, Business and Market Researchers , 2002 .

[155]  Sebastian Mosbach,et al.  Applying Industry 4.0 to the Jurong Island Eco-industrial Park , 2015 .

[156]  L. Li China's manufacturing locus in 2025: With a comparison of “Made-in-China 2025” and “Industry 4.0” , 2017, Technological Forecasting and Social Change.

[157]  Abby Ghobadian,et al.  e-Leadership through strategic alignment: an empirical study of small- and medium-sized enterprises in the digital age , 2016, J. Inf. Technol..

[158]  Tharam S. Dillon,et al.  Web‐of‐things framework for cyber–physical systems , 2011, Concurr. Comput. Pract. Exp..

[159]  Christopher P. Holland,et al.  The viable systems model applied to a smart network: the case of the UK electricity market , 2004, J. Inf. Technol..

[160]  Haibo Chen,et al.  DTrace: fine-grained and efficient data integrity checking with hardware instruction tracing , 2019, Cybersecur..

[161]  A. Huberman,et al.  Qualitative Data Analysis: A Methods Sourcebook , 1994 .

[162]  Luís Almeida,et al.  Structuring Communications for Mobile Cyber-Physical Systems , 2016, Management of Cyber Physical Objects in the Future Internet of Things.

[163]  Michael Huth,et al.  Analysing IoT Cyber Risk for Estimating IoT Cyber Insurance , 2019 .

[164]  Petar Radanliev,et al.  Digital Supply Chains for Industry 4.0 - Taxonomy of Approaches , 2019 .

[165]  Wendy Hall,et al.  A Storm in an IoT Cup: The Emergence of Cyber-Physical Social Machines , 2018, ArXiv.