ac

Cybersecurity Integration in Enterprise Architecture for IoT Infrastructure in Steel Manufacturing

Authors

  • Djarot Hindarto Informatika, Fakultas Teknologi Komunikasi dan Informatika, Universitas Nasional

DOI:

10.47709/cnahpc.v6i3.4415

Keywords:

Cybersecurity, Internet of Things, Mitigation Risk, Steel Manufacture, Threats

Dimension Badge Record



Abstract

As a result of the widespread adoption of Internet of Things technology in the steel manufacturing industry, there is an urgent requirement for the implementation of robust cybersecurity measures. The proliferation of IoT devices has caused a data explosion, which in turn has increased the risk of cyberattacks. The purpose of this research is to develop an enterprise architecture model that is capable of effectively managing cybersecurity risks on Internet of Things infrastructure in the steel manufacturing industry. This is a response to the urgent challenge that has been presented. The methodology utilized in this study is a rigorous qualitative approach, which involves the collection and analysis of data through interviews and literature reviews related to the topic. Following an in-depth analysis of the findings of the research, several important goals have been established. These goals include the identification of potential dangers, the reduction of potential risks, and the effective implementation of security controls. Within the context of the steel manufacturing industry, this research makes a significant contribution to the improvement of cybersecurity in Internet of Things infrastructure. In addition to identifying potential dangers and mitigating risks, the architecture model that has been proposed is about more than that. It offers a comprehensive and well-coordinated safety strategy, which guarantees a strong defense against cyber threats.

Downloads

Download data is not yet available.
Google Scholar Cite Analysis
Abstract viewed = 76 times

References

Abawajy, J., Darem, A., & Alhashmi, A. A. (2021). Feature subset selection for malware detection in smart iot platforms. Sensors (Switzerland), 21(4), 1–19. https://doi.org/10.3390/s21041374

Alwi, M. N., Hindarto, D., & Marina, A. (2023). Efficiency and Effectiveness?: Enterprise Architecture Strategies for Healthcare Service. 3(December), 386–397.

Babu, T., Roopa, H., Kumar, A., David, D. S., Jayadatta, S., & Rajesh, A. S. (2022). Internet of things-based automation design and organizational innovation of manufacturing enterprises. Materials Today?: Proceedings, 56, 1769–1775. https://doi.org/10.1016/j.matpr.2021.10.459

Bachute, M. R., & Subhedar, J. M. (2021). Autonomous Driving Architectures: Insights of Machine Learning and Deep Learning Algorithms. Machine Learning with Applications, 6(March), 100164. https://doi.org/10.1016/j.mlwa.2021.100164

Brandín, R., & Abrishami, S. (2024). IoT-BIM and blockchain integration for enhanced data traceability in offsite manufacturing. Automation in Construction, 159(January). https://doi.org/10.1016/j.autcon.2024.105266

Hindarto, D., Indrajit, R. E., & Dazki, E. (2021). Sustainability of Implementing Enterprise Architecture in the Solar Power Generation Manufacturing Industry. Sinkron, 6(1), 13–24. https://doi.org/10.33395/sinkron.v6i1.11115

Judijanto, L., & Hindarto, D. (2023). Edge of Enterprise Architecture in Addressing Cyber Security Threats and Business Risks. 3(December), 386–396.

Karthick, M. K., Kiruthiga, G., Ms Saraswathi, P., Dhiyanesh, B., & Radha, R. (2022). A Subset Scaling Recursive Feature Collection Based DDoS Detection Using Behavioural Based Ideal Neural Network For Security In A Cloud Environment. Procedia Computer Science, 215, 509–518. https://doi.org/10.1016/j.procs.2022.12.053

Korhonen, J. J., & Poutanen, J. (2013). Tripartite Approach to Enterprise Architecture. JOURNAL OF ENTERPRISE ARCHITECTURE, 9(1), 28–38.

Lapalme, J. (2011). 3 Schools of Enterprise Architecture. IT Professional. https://doi.org/10.1109/MITP.2011.109

Lee, I. (2021). Internet of Things The Internet of Things for enterprises?: An ecosystem, architecture, and IoT service business model. Internet of Things, 7(2019). https://doi.org/10.1016/j.iot.2019.100078

Matthes, D. (2011). Enterprise Architecture Frameworks Kompendium. Springer.

Mittal, A., Gupta, M. P., Chaturvedi, M., Chansarkar, S. R., & Gupta, S. (2021). Cybersecurity Enhancement through Blockchain Training (CEBT) – A serious game approach. International Journal of Information Management Data Insights, 1(1). https://doi.org/10.1016/j.jjimei.2020.100001

Mostofa, K. Z., & Islam, M. A. (2023). ScienceDirect Creation of an Internet of Things ( IoT ) system for the live and remote monitoring of solar photovoltaic facilities. Energy Reports, 9, 422–427. https://doi.org/10.1016/j.egyr.2023.09.060

Rani, S., & Srivastava, G. (2024). Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme. Expert Systems With Applications, 235(August 2023). https://doi.org/10.1016/j.eswa.2023.121180

Unal, D., Al-ali, A., Catak, F. O., & Hammoudeh, M. (2025). A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based. Future Generation Computer Systems, 125(2021), 433–445. https://doi.org/10.1016/j.future.2021.06.050

Downloads

ARTICLE Published HISTORY

Submitted Date: 2024-07-28
Accepted Date: 2024-07-28
Published Date: 2024-07-31

How to Cite

Hindarto, D. (2024). Cybersecurity Integration in Enterprise Architecture for IoT Infrastructure in Steel Manufacturing. Journal of Computer Networks, Architecture and High Performance Computing, 6(3), 1451-1459. https://doi.org/10.47709/cnahpc.v6i3.4415