Browsing by Author "Badikyan, Hasmik"
Now showing 1 - 4 of 4
Results Per Page
Sort Options
- Analysis of the workforce Skills for the factories of the futurePublication . Leitão, Paulo; Geraldes, Carla A.S.; Fernandes, Florbela P.; Badikyan, HasmikIndustry 4.0 is promoting the digitisation of manufacturing sector towards smart and more efficient factories, seen worldwide as the fourth industrial revolution. However, its complete adoption strongly depends on the skills that existing workforce and future professionals can have in the different dimensions of this multidisciplinary vision, contributing to increase the digital maturity level of companies from the industrial sector. Additionally, new job profiles are emerging to face the implementation of these innovative approaches, which implies the need for the re-qualification and up-skilling of existing workforce, particularly focusing the digital skills. In this context, this paper analyses the gap and impact in the non-technical and technical skills required for the successful transition into digitisation, particularly across six manufacturing areas covering the collaborative robotics (cobots), additive manufacturing, mechatronics and machine automation, data analytics, cybersecurity and humanmachine interface.
- Multi-factor graphical user authentication for web applicationsPublication . Badikyan, Hasmik; Pedrosa, Tiago; Lopes, Rui PedroNowadays, there is a current trend that leads people to use web applications, requiring additional concerns for the protection of their accounts with strong authentication methods. In this sense, this work researches the problems and solutions related with the authentication, specially concerning textual and graphical passwords. One common authentication problem is the difficulty users have in remembering textual passwords, especially when they are long and random-looking. In alternative, graphical passwords are easier to remember, because of their visual aspect. This work proposes a recognition and recall based graphical authentication methods that can be used in the challenge phase of user authentication. A security analysis is made to check the correctness of the proposed solution and how it minimizes the vulnerabilities of the authentication process. These analyses will enable us to implement these challenges in future work as an extension to authentication, authorization and accounting services, supporting a multi-factor authentication and combining these challenges with others already available. The idea is to extend an authentication method on Apache Shiro to provide developers with a common framework to develop secure web application with strong authentication, authorization and accounting.
- Secure data exchange in Industrial Internet of ThingsPublication . Sukiasyan, Anna; Badikyan, Hasmik; Pedrosa, Tiago; Leitão, PauloThe use of the Industrial Internet of Things (IoT) is widespread, working as an enabler to implement large, scalable, reliable, and secure industrial environments. Although existing deployments do not meet security standards and have limited resources for each component which leads to several security breaches, such as trust between components, partner factories, or remote-control. These security failures can lead to critical outcomes, from theft of production information to forced production stoppages, accidents, including physical and others. The combination of blockchain-based solutions with IIoT environments is gaining momentum due to their resilience and security properties. However, chain-structured classic blockchain solutions are very resource-intensive and are not suitable for power-constrained IoT devices. To mitigate the mentioned security concerns, a secure architecture is proposed using a structured asynchronous blockchain DAG (Directed Acyclic Graph) that simultaneously provides security and transaction efficiency for the solution. The solution was modelled with special details in the use cases and sequence diagrams. Security concerns were integrated from the start, and a threat model was created using the STRIDE approach to test the security of the proposed solution. As a result, a flexible solution was been developed that significantly reduces the attack vectors in IIoT environments. The proposed architecture is versatile and flexible, is supported by an extensive security assessment, which allows it to be deployed in a variety of customizable industrial environments and scenarios, as well as to include future hardware and software extensions.
- Towards a secure data exchange in IIoTPublication . Sukiasyan, Anna; Badikyan, Hasmik; Pedrosa, Tiago; Leitão, PauloIndustrial Internet of Things (IIoT) plays a central role in the Fourth Industrial Revolution, with many specialists working towards implementing large scalable, reliable and secure industrial environments. However, existing environments are lacking security standards and have limited resources per component which results in various security breaches, e.g., trust in between the components, partner factories or remote control units with the system. Due to the resilience and its security properties, combining blockchain-based solutions with IIoT environments is gaining popularity. Despite that, chain-structured classic blockchain solutions are extremely resource-intensive and are not suitable for power-constrained IoT devices. To mitigate the referred security challenges, a secure architecture is proposed by using a DAG-structured asynchronous blockchain that can provide system security and transactions efficiency at the same time. Use-cases and sequence diagrams were created to model the solution. The achieved results are robust, supported by an extensive security evaluation, which foster future developments over the proposed architecture. Therefore, as the proposed architecture is generic and flexible, its deployment in diverse customized industrial environments and scenarios, as well as the incorporation of future hardware and software, is possible.