Japan Will Use AI To Secure Critical Infrastructure

A new Japanese project focuses on improving the security of critical infrastructure using Artificial Intelligence (AI). The non-profit organisation IOTA Foundation is building new protocols for the connected world and is working with the Japanese government and the New Energy and Industrial Technology Development Organisation (NEDO), which is Japan’s national research and development agency.  

The aim of the work is to create technology that can strengthen the security, longevity and durability of Japan’s critical infrastructure.

The aim will be fulfilled by adding AI and distributed ledger technology to Risk Based Maintenance (RBM) Systems deployed in power plants, energy plants, industrial plants, petrochemical and oil refining plants. This type of predictive maintenance system shares industry data using a distributed database is set to be the first of its kind in the world. 

While damage prediction assessment based on the current RBM standards exists, most processes are still left up to field workers to do manually. 

To further optimise these systems, maintenance data will be digitised and processed by an AI system to predict when and which parts of a plant are going to require maintenance. This will reduce unplanned outages, improve plant availability and lower costs by reducing unnecessary inspections and repairs. Furthermore, this AI system means that information can be captured, shared, and acted upon by distributed teams across the world.

This work will create a cloud-based SaaS software and will be based on a decentralised database using IOTA’s distributed ledger technology. 

Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time. Unlike traditional databases, distributed ledgers have no central data store or administration functionality. Blockchains are one form of distributed ledger technology. 

Centralised databases are vulnerable to accidents, tampering and leakage. By building an RBM using IOTA, maintenance companies are able to provide a solution to infrastructure partners that is resistant to cyber attacks while protecting sensitive data.

IOTA:      Smart-Energy:    I-HLS:     BusinessWire:

You Might Also Read: 

Japan's New AI Cyber Defence System:

 

« Leveraging Data Privacy For Artificial Intelligence
A Snapshot Of Cyber Security In Britain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Protective Intelligence

Protective Intelligence

Protective Intelligence brings together a group of information security specialists with a passion for delivering high-quality solutions.

Talend

Talend

Talend is a leader in cloud and big data integration software. Applications include Risk and Compliance management.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

MAD Security

MAD Security

MAD Security is a premier provider of information and cybersecurity solutions that combine technology, managed security services, support and training.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

Valid Network

Valid Network

Valid Network DSP is blending traditional cyber security methodologies with blockchain transactions to achieve trust, internal and federated between organizations and stake holders.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

White Cloud Security

White Cloud Security

White Cloud is a cloud-based Application Trust-Listing security service that prevents unauthorized programs from running on your computers.

Sikich

Sikich

Sikich LLP is a leading professional services firm specializing in accounting, advisory, technology and managed services.

Oxford Internet Institute - University of Oxford

Oxford Internet Institute - University of Oxford

The Oxford Internet Institute is a multidisciplinary research and teaching department of the University of Oxford, dedicated to the social science of the Internet.

Netox

Netox

Netox is a comprehensive IT service provider that combines IT support services, IT solutions and specialist services; specializing in cybersecurity solutions.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

BTQ Technologies

BTQ Technologies

BTQ is a global quantum technology company focused on securing mission critical networks.

Everfox

Everfox

Everfox, formerly Forcepoint Federal, has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.

InfoTrust

InfoTrust

InfoTrust is a leading specialised cybersecurity practice that combines a customer-first consulting approach with next-generation security solutions.