Japan Will Use AI To Secure Critical Infrastructure

A new Japanese project focuses on improving the security of critical infrastructure using Artificial Intelligence (AI). The non-profit organisation IOTA Foundation is building new protocols for the connected world and is working with the Japanese government and the New Energy and Industrial Technology Development Organisation (NEDO), which is Japan’s national research and development agency.  

The aim of the work is to create technology that can strengthen the security, longevity and durability of Japan’s critical infrastructure.

The aim will be fulfilled by adding AI and distributed ledger technology to Risk Based Maintenance (RBM) Systems deployed in power plants, energy plants, industrial plants, petrochemical and oil refining plants. This type of predictive maintenance system shares industry data using a distributed database is set to be the first of its kind in the world. 

While damage prediction assessment based on the current RBM standards exists, most processes are still left up to field workers to do manually. 

To further optimise these systems, maintenance data will be digitised and processed by an AI system to predict when and which parts of a plant are going to require maintenance. This will reduce unplanned outages, improve plant availability and lower costs by reducing unnecessary inspections and repairs. Furthermore, this AI system means that information can be captured, shared, and acted upon by distributed teams across the world.

This work will create a cloud-based SaaS software and will be based on a decentralised database using IOTA’s distributed ledger technology. 

Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time. Unlike traditional databases, distributed ledgers have no central data store or administration functionality. Blockchains are one form of distributed ledger technology. 

Centralised databases are vulnerable to accidents, tampering and leakage. By building an RBM using IOTA, maintenance companies are able to provide a solution to infrastructure partners that is resistant to cyber attacks while protecting sensitive data.

IOTA:      Smart-Energy:    I-HLS:     BusinessWire:

You Might Also Read: 

Japan's New AI Cyber Defence System:

 

« Leveraging Data Privacy For Artificial Intelligence
A Snapshot Of Cyber Security In Britain »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

Zivver

Zivver

Zivver is the effortless, secure email platform, powering the next generation of secure communications.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

ICTSecurity Portal

ICTSecurity Portal

The ICTSecurity Portal is an interministerial initiative in cooperation with the Austrian economy and acts as a central internet portal for topics related to security in the digital world.

Seconize

Seconize

Seconize empowers enterprises to proactively manage their cyber risks, prioritize remediations, optimize security spending and ensure compliance.

Swiss Cyber Think Tank (SCTT)

Swiss Cyber Think Tank (SCTT)

The Swiss Cyber Think Tank is a business network for Cyber Risk & Insurability, providing an industry-wide networking platform for insurers, technology and security firms.

GulfTalent

GulfTalent

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

Isovalent

Isovalent

Isovalent deliver the most advanced Kubernetes networking & security capabilities to the most demanding of enterprise users.

nexSecurity

nexSecurity

neXSecurity is an IT and Information security consulting company with more than 2 decades worth of software development and security experience.

Digitale Gründerinitiative Oberpfalz (DGO)

Digitale Gründerinitiative Oberpfalz (DGO)

Digital Founder Initiative Oberpfalz's goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

WithSecure

WithSecure

WithSecure (formerly F-Secure Business) is your reliable cyber security partner, providing outcome-based cyber security that protects and enables operations.

ELK Analytics

ELK Analytics

ELK Analytics is a specialized Managed Security Services Provider (MSSP) that focuses on endpoint security and monitoring & alerting for any type of structured or unstructured data.

Faddom

Faddom

Faddom is an agentless tool that visualizes your on-premises and cloud infrastructure, as well as their inter-dependencies.