Advertisement

VR Training for Security Awareness in Industrial IoT

  • Vasiliki Liagkou
  • Chrysostomos StyliosEmail author
Conference paper
  • 297 Downloads
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 568)

Abstract

Virtual Reality technology provides new solutions and more efficient opportunities for a revolutionary new manufacturing training environment. This work focus on presenting a VR training environment on a new and promising IoT communication protocol, the Low-Power Wide-Area Networks (LPWAN). The LP-WAN have recently emerged as a standard IoT communication system that satisfies the challenges of industrial networks by enhancing their reliability and efficiency. The LPWAN is a promising response to the limitations showed by current IoT technologies. Here are exploited the possibilities of the 3D virtual world technology to create experiential learning simulations, which address IoT users’ real needs for privacy and security awareness. To this aim, a 3D role playing game is introduced and a group of master students have evaluated its ability to help them for handling the security features of LPWAN.

Keywords

Virtual Reality VR training Industry 4.0 E-learning Internet of Things LPWAN 

Notes

Acknowledgements

This work has been partially supported by the “TIPHYS 4.0- Social Network based doctoral Education on Industry 4.0” project No 2017-1-SE01-KA203-03452 funded by ERASMUS+ of the European Commission.

References

  1. 1.
    Büttner, S., et al.: The design space of augmented and virtual reality applications for assistive environments in manufacturing: a visual approach. In: International Conference on PErvasive Technologies Related to Assistive Environments, pp. 433–440 (2017)Google Scholar
  2. 2.
    Stuchlíková, L., Kósa, A., Benko, P., Juhász, P.: Virtual reality vs. reality in engineering education. In: 15th International Conference on Emerging eLearning Technologies and Applications, pp. 1–6 (2017)Google Scholar
  3. 3.
    Carruth, D.W.: Virtual reality for education and workforce training. In: 15th International Conference on Emerging eLearning Technologies and Applications, pp. 1–6 (2017)Google Scholar
  4. 4.
    Ryoo, J., Techatassanasoontorn, A., Lee, D.: Security education using second life. IEEE Secur. Priv. 7, 71–74 (2009)CrossRefGoogle Scholar
  5. 5.
    Ryoo, J., Techatassanasoontorn, A., Lee, D., Lothian, J.: Game based InfoSec education using OpenSim. In: 15th Colloquium for Information Systems Security Education (2011)Google Scholar
  6. 6.
    Camarinha-Matos, L.M., Fornasiero, R., Afsarmanesh, H.: Collaborative networks as a core enabler of industry 4.0. In: Camarinha-Matos, L.M., Afsarmanesh, H., Fornasiero, R. (eds.) PRO-VE 2017. IAICT, vol. 506, pp. 3–17. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-65151-4_1CrossRefGoogle Scholar
  7. 7.
    Ervural, B.C., Ervural, B.: Overview of cyber security in the industry 4.0 era. Industry 4.0: Managing The Digital Transformation. SSAM, pp. 267–284. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-57870-5_16CrossRefGoogle Scholar
  8. 8.
    Centenaro, M., Vangelista, L., Zanella, A., Zorzi, M.: Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios. IEEE Wirel. Commun. 23, 60–67 (2016)CrossRefGoogle Scholar
  9. 9.
    Raza, U., Kulkarni, P., Sooriyabandara, M.: Low power wide area networks: an overview. IEEE Commun. Surv. Tutor. 19, 855–873 (2017)CrossRefGoogle Scholar
  10. 10.
    Boulogeorgos, A.-A.A., Diamantoulakis, P.D., Karagiannidis, G.K.: Low power wide area networks (LPWANs) for internet of things (IoT) applications: research challenges and future trends. CoRR, vol. abs/1611.07449 (2016). http://arxiv.org/abs/1611.07449
  11. 11.
    Luvisotto, M., Tramarin, F., Vangelista, L., Vitturi, S.: On the use of LoRaWAN for indoor industrial IoT applications. Wirel. Commun. Mob. Comput. 2018, 11 (2018).  https://doi.org/10.1155/2018/3982646CrossRefGoogle Scholar
  12. 12.
    Pavlou, P.: State of the information privacy literature: where are we now and where should we go? MIS Q. 35(4), 977–988 (2011)CrossRefGoogle Scholar
  13. 13.
    Price, B.A., Adam, K., Nuseibeh, B.: Keeping ubiquitous computing to yourself: a practical model for user control of privacy. Int. J. Hum.-Comput. Stud. 63(1), 228–253 (2005)CrossRefGoogle Scholar
  14. 14.
    Kouicem, D.E., Bouabdallah, A., Lakhlef, H.: Internet of things security: a top-down survey. Comput. Netw. 141, 199–221 (2018)CrossRefGoogle Scholar
  15. 15.
    Aras, E., Ramachandran, G.S., Lawrence, P., Hughes, D.: Exploring the security vulnerabilities of LoRa. In: 3rd IEEE International Conference on Cybernetics (CYBCONF 2017), pp. 1–6 (2017)Google Scholar
  16. 16.
    Chatzigiannakis, Y., Liagkou, V., Spirakis, P.: Providing end-to-end secure communication in low-power wide area networks (LPWANs). In: 2nd International Symposium on Cyber Security Cryptography and Machine Learning (CSCML 2018) (2018)Google Scholar
  17. 17.
    Emekcan, A., Gowri, R., Piers, L., Danny, H.: Exploring the security vulnerabilities of LoRa. In: 3rd IEEE International Conference on Cybernetics (CYBCONF), vol. 06, pp. 1–6 (2017)Google Scholar
  18. 18.
    Michorius, J.: Whats mine is not yours: LoRa network and privacy of data on publishing devices. In: 25th Twente Student Conference on IT (2016)Google Scholar
  19. 19.
    Naoui, S., Elhdhili, M.E., Saidane, L.A.: Enhancing the security of the IoT LoRaWAN architecture. In: International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN 2016), pp. 1–7 (2016)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2019

Authors and Affiliations

  1. 1.Department of Informatics and TelecommunicationsUniversity of IoanninaIoanninaGreece

Personalised recommendations