Japan Will Use AI To Secure Critical Infrastructure

A new Japanese project focuses on improving the security of critical infrastructure using Artificial Intelligence (AI). The non-profit organisation IOTA Foundation is building new protocols for the connected world and is working with the Japanese government and the New Energy and Industrial Technology Development Organisation (NEDO), which is Japan’s national research and development agency.  

The aim of the work is to create technology that can strengthen the security, longevity and durability of Japan’s critical infrastructure.

The aim will be fulfilled by adding AI and distributed ledger technology to Risk Based Maintenance (RBM) Systems deployed in power plants, energy plants, industrial plants, petrochemical and oil refining plants. This type of predictive maintenance system shares industry data using a distributed database is set to be the first of its kind in the world. 

While damage prediction assessment based on the current RBM standards exists, most processes are still left up to field workers to do manually. 

To further optimise these systems, maintenance data will be digitised and processed by an AI system to predict when and which parts of a plant are going to require maintenance. This will reduce unplanned outages, improve plant availability and lower costs by reducing unnecessary inspections and repairs. Furthermore, this AI system means that information can be captured, shared, and acted upon by distributed teams across the world.

This work will create a cloud-based SaaS software and will be based on a decentralised database using IOTA’s distributed ledger technology. 

Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time. Unlike traditional databases, distributed ledgers have no central data store or administration functionality. Blockchains are one form of distributed ledger technology. 

Centralised databases are vulnerable to accidents, tampering and leakage. By building an RBM using IOTA, maintenance companies are able to provide a solution to infrastructure partners that is resistant to cyber attacks while protecting sensitive data.

IOTA:      Smart-Energy:    I-HLS:     BusinessWire:

You Might Also Read: 

Japan's New AI Cyber Defence System:

 

« Leveraging Data Privacy For Artificial Intelligence
A Snapshot Of Cyber Security In Britain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

FireMon

FireMon

FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Cyber Execs

Cyber Execs

Cyber Execs is a Cyber Security Consultancy & Executive Recruitment firm.

Qatar Computing Research Institute (QCRI)

Qatar Computing Research Institute (QCRI)

QCRI perform cutting-edge research in such areas as Arabic language technologies, social computing, data analytics, distributed systems, cyber security and computational science and engineering.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation Institute (CyManII)

CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.

Invest Ottawa

Invest Ottawa

The IO Accelerator Program is designed to rapidly and systematically accelerate the development and commercial success of high growth technology firms.

ZecOps

ZecOps

ZecOps is a cybersecurity automation company offering solutions for servers, endpoints, mobile devices, and custom devices.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

BreachQuest

BreachQuest

BreachQuest brings together cybersecurity experts with decades of experience identifying security flaws, penetrating networks, and responding to incidents.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

Triangle

Triangle

Triangle enable innovative business transformation by ensuring critical hybrid infrastructures are optimised, interoperable and secure.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

Data Defenders

Data Defenders

Data Defenders provide information security technology solutions that empower consumers, businesses and governments with safe and secure IT and cybersecurity infrastructures.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.