Security Development Path for Industrial Internet Supply Chain

Peiru Fan, Jun Li, Chonghua Wang, Xueying Zhang, Zhiqiang Hao

Strategic Study of CAE ›› 2021, Vol. 23 ›› Issue (2) : 56-64.

PDF(544 KB)
PDF(544 KB)
Strategic Study of CAE ›› 2021, Vol. 23 ›› Issue (2) : 56-64. DOI: 10.15302/J-SSCAE-2021.02.008
Development Strategy of New Generation of Industrial Internet Security Technology
Orginal Article

Security Development Path for Industrial Internet Supply Chain

Author information +
History +

Abstract

Industrial Internet security is crucial for strengthening the manufacturing and network sectors of China. Deep learning, owing to its strong expression ability, good adaptability, and high portability, can support the establishment of an intelligent and autonomous industrial Internet security system and method. Therefore, it is of great value to promote the integrated innovation of deep learning and industrial Internet security. In this study, we analyze the development demand for industrial Internet security from the perspective of macro industrial environment, security technology, and deep learning system, and summarize the application status of deep learning to industrial Internet security in terms of device, control, network, application, and data layers. The security challenges faced by deep learning application to industrial Internet primarily lie in model training and prediction. Furthermore, we identify key research directions including interpretability of deep neural networks, cost control of sample collection and calculation, imbalance of sample sets, reliability of model results, and tradeoff between availability and security. Finally, some suggestions are proposed: A dynamic defense system in depth should be established in terms of overall security strategy; an application-driven and frontier exploration integrated method should be adopted to achieve breakthroughs regarding key technologies; and resources input should be raised for such interdisciplinary fields to establish an industry–university–research institute joint research ecosystem.

Keywords

industrial Internet / supply chain / network security / development path

Cite this article

Download citation ▾
Peiru Fan, Jun Li, Chonghua Wang, Xueying Zhang, Zhiqiang Hao. Security Development Path for Industrial Internet Supply Chain. Strategic Study of CAE, 2021, 23(2): 56‒64 https://doi.org/10.15302/J-SSCAE-2021.02.008

References

[1]
何伟, 张伟东, 王超贤. 面向数字化转型的“互联网+”战略升级 研究 [J]. 中国工程科学, 2020, 22(4): 10–17. He W, Zhang W D, Wang C X. Strategic updating of Internet plus considering digital transformation [J]. Strategic Study of CAE, 2020, 22(4): 10–17.
[2]
何熙巽, 张玉清, 刘奇旭. 软件供应链安全综述 [J]. 信息安全学 报, 2020, 5(1): 57–73. HE X X, Zhang Y Q, Liu Q X. Survey of software supply chain security [J]. Journal of Cyber Security, 2020, 5(1): 57–73.
[3]
祝国邦, 陈洁. 软件供应链安全现状与对策建议 [J]. 中国信息 安全, 2018 (11): 44–47. Zhu G B, Chen J. The status and countermeasure suggestion of software supply chain security [J]. China Information Security, 2018 (11): 44–47.
[4]
Luszcz J. How maverick developers can create risk in the software and IoT supply chain [J]. Network Security, 2017, 2017(8): 5–7.
[5]
高青松, 刘惠玲. 全球供应链深度互嵌下芯片产业关键节点的 产业链安全研究 [J]. 经济论坛, 2020 (3): 11–21. Gao Q S, Liu H L. Research on industrial chain security of key nodes in the chip industry with deeply interconnected global supply chain [J]. Economic Tribune, 2020 (3): 11–21.
[6]
谢劲松, 符兴斌, 赵文辉. 面向信息产业发展的基础软硬件生态 研究 [J]. 信息技术与网络安全, 2020 (9): 1–5. Xie J S, Fu X B, Zhao W H. Research on the basic software and hardware ecology for development of information industry [J]. Information Technology and Network Security, 2020 (9): 1–5.
[7]
王晨, 宋亮, 李少昆. 工业互联网平台: 发展趋势与挑战 [J]. 中 国工程科学, 2018, 20(2): 15–19. Wang C, Song L, Li S K. The industrial Internet platform: Trend and challenges [J]. Strategic Study of CAE, 2018, 20(2): 15–19.
[8]
宁振波. 力筑工业之基 重铸智造灵魂 [J]. 软件导刊, 2021, 20(1):1–5. Ning Z B. Build the foundation of industry, recast the soul of intelligent manufacturing [J]. Software Guide, 2021, 20(1): 1–5.
AI Summary AI Mindmap
PDF(544 KB)

Accesses

Citations

Detail

Sections
Recommended

/