Thanks to rapid technological developments, new innovative solutions and practical applications of the Industrial Internet of Things (IIoT) are being created, upgrading the structures of many industrial enterprises. IIoT brings the physical and digital environment together with minimal human intervention and profoundly transforms the economy and modern business. Data flowing through IIoT feed artificial intelligence tools, which perform intelligent functions such as performance tuning of interconnected machines, error correction, and preventive maintenance. However, IIoT deployments are vulnerable to sophisticated security threats at various levels of the connectivity and communications infrastructure they incorporate. The complex and often heterogeneous nature of chaotic IIoT infrastructures means that availability, confidentiality and integrity are difficult to guarantee. This can lead to potential mistrust of network operations, concerns about privacy breaches or loss of vital personal data and sensitive information of network end-users. This paper examines the privacy requirements of an IIoT ecosystem in industry standards. Specifically, it describes the industry privacy dimensions of the protection of natural persons through the processing of personal data by competent authorities for the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties. In addition, it presents an overview of the state-of-the-art methodologies and solutions for industrial privacy threats. Finally, it analyses the privacy requirements and suggestions for an ideal secure and private IIoT environment.
翻译:由于技术的迅猛发展,正在创造新的创新解决办法,并实际应用 " 物业工业因特网 " (IIOT),使许多工业企业的结构升级。IIOT将有形和数字环境与最低限度的人力干预结合起来,并深刻地改变了经济和现代商业。通过IIOT提供人工情报工具的数据流动,这些工具可发挥智能功能,如相互连接的机器的性能调整、错误纠正和预防性维护。然而,IIOT的部署在它们所包括的连通和通信基础设施的各个层面很容易受到复杂的安全威胁。杂乱的IIOT基础设施复杂而且往往多种多样,这意味着难以保证其供应、保密性和完整性。这可能导致对网络运作的潜在不信任、对重要个人资料和网络终端用户敏感资料的破坏或丢失的关切。本文审查了II生态系统在工业标准方面的隐私要求。具体地说,它描述了通过主管当局处理个人数据来保护自然人的隐私层面,以防止、调查、侦查或起诉刑事犯罪或实施刑事处罚。此外,它还概述了关于私人隐私威胁的状态要求和解决办法。最后,对二号隐私威胁的保密方法和解决办法。