IIC Journal of Innovation 9th Edition | Page 136
The Resilience Model Supporting IIoT System Trustworthiness
adversity; the period during which
the system does not satisfy the set of
essential requirements because of
adversity, and the time period during
which the system is capable of
restoring its functioning during
and/or after adversity. These metrics
are formalized and can further be
evaluated. This method of evaluation
require additional research.
2. Resilience
approaches
and
techniques which can be used to
increase the system’s resilience to
attacks may be classified according
to the factor which they consider and
influence. This is quite helpful in
identifying
the
applicable
approaches for a particular case.
3. The risks connected to the use of the
IT and IIoT services determine much
of the strategies applied to increase
the resilience of these services. The
comparative examples demonstrate
how the resilience strategies may
vary significantly even for similar
technologies. Currently, the process
of identification is based on the
expertise of the system architect.
However, the method of semi-
automated analysis may comprise a
scope of further research.
Return to the beginning of this article
Return to the Table of Contents
The views expressed in the IIC Journal of Innovation are the contributing authors’ views and do
not necessarily represent the views of their respective employers nor those of the Industrial
Internet Consortium.
© 2018 The Industrial Internet Consortium logo is a registered trademark of Object Management
Group®. Other logos, products and company names referenced in this publication are property
of their respective companies.
- 131 -
IIC Journal of Innovation