skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Assessing the Benefits and Implementations of Secure Embedded Intelligence

Abstract

This is a poster submission, so we do not have a formal abstract; however, we have included a couple of the main points of the poster. Motivation Current ICS/IIoT reference architectures are ill-suited to continue to meet industry demands. Architectures such as the Purdue Model and ISA-95 split cyber-physical systems into distinct levels; however, business needs and cybersecurity requirements constantly require cross-cutting solutions. Further, newly defined IIoT architectures are better suited for Industry 4.0 systems, but they leave out the feedback seen in Purdue and ISA-95. This underscores a need for new architectures, without which IT and OT boundaries will continue to grow. Secure embedded intelligence (SEI) should drive the creation of these new architectures. Secure Embedded Intelligence Advances in sensing, computation, and automated analysis have opened new possibilities for increased security, performance, and cost savings. SEI enables advanced technology to be utilized to drive new reference architectures to achieve these possibilities while integrating trust and risk.

Authors:
 [1];  [1];  [1];  [1]
  1. Idaho National Laboratory
Publication Date:
Research Org.:
Idaho National Lab. (INL), Idaho Falls, ID (United States)
Sponsoring Org.:
USDOE Office of Environment, Health, Safety and Security (AU), Office of Nuclear Safety (AU-30)
OSTI Identifier:
1546727
Report Number(s):
INL/EXP-19-55131-Rev000
DOE Contract Number:  
AC07-05ID14517
Resource Type:
Conference
Resource Relation:
Conference: INL Intern Poster Session, INL in town site, 08/08/2019 - 08/08/2019
Country of Publication:
United States
Language:
English
Subject:
99 - GENERAL AND MISCELLANEOUS; Secured Embedded Intelligence; Hyper-Layered State Awareness; Multi-Layered Control; Specialized Hybrid Models; Metric Quantification; Automated Reasoning; Decision Making

Citation Formats

Marie Wolf, Shaya Paige, Cooley, Rafer Scott, Klebba, Joseph James, and Lube, Maxon Joseph. Assessing the Benefits and Implementations of Secure Embedded Intelligence. United States: N. p., 2019. Web.
Marie Wolf, Shaya Paige, Cooley, Rafer Scott, Klebba, Joseph James, & Lube, Maxon Joseph. Assessing the Benefits and Implementations of Secure Embedded Intelligence. United States.
Marie Wolf, Shaya Paige, Cooley, Rafer Scott, Klebba, Joseph James, and Lube, Maxon Joseph. Wed . "Assessing the Benefits and Implementations of Secure Embedded Intelligence". United States. https://www.osti.gov/servlets/purl/1546727.
@article{osti_1546727,
title = {Assessing the Benefits and Implementations of Secure Embedded Intelligence},
author = {Marie Wolf, Shaya Paige and Cooley, Rafer Scott and Klebba, Joseph James and Lube, Maxon Joseph},
abstractNote = {This is a poster submission, so we do not have a formal abstract; however, we have included a couple of the main points of the poster. Motivation Current ICS/IIoT reference architectures are ill-suited to continue to meet industry demands. Architectures such as the Purdue Model and ISA-95 split cyber-physical systems into distinct levels; however, business needs and cybersecurity requirements constantly require cross-cutting solutions. Further, newly defined IIoT architectures are better suited for Industry 4.0 systems, but they leave out the feedback seen in Purdue and ISA-95. This underscores a need for new architectures, without which IT and OT boundaries will continue to grow. Secure embedded intelligence (SEI) should drive the creation of these new architectures. Secure Embedded Intelligence Advances in sensing, computation, and automated analysis have opened new possibilities for increased security, performance, and cost savings. SEI enables advanced technology to be utilized to drive new reference architectures to achieve these possibilities while integrating trust and risk.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2019},
month = {7}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share: