Japan Will Use AI To Secure Critical Infrastructure

A new Japanese project focuses on improving the security of critical infrastructure using Artificial Intelligence (AI). The non-profit organisation IOTA Foundation is building new protocols for the connected world and is working with the Japanese government and the New Energy and Industrial Technology Development Organisation (NEDO), which is Japan’s national research and development agency.  

The aim of the work is to create technology that can strengthen the security, longevity and durability of Japan’s critical infrastructure.

The aim will be fulfilled by adding AI and distributed ledger technology to Risk Based Maintenance (RBM) Systems deployed in power plants, energy plants, industrial plants, petrochemical and oil refining plants. This type of predictive maintenance system shares industry data using a distributed database is set to be the first of its kind in the world. 

While damage prediction assessment based on the current RBM standards exists, most processes are still left up to field workers to do manually. 

To further optimise these systems, maintenance data will be digitised and processed by an AI system to predict when and which parts of a plant are going to require maintenance. This will reduce unplanned outages, improve plant availability and lower costs by reducing unnecessary inspections and repairs. Furthermore, this AI system means that information can be captured, shared, and acted upon by distributed teams across the world.

This work will create a cloud-based SaaS software and will be based on a decentralised database using IOTA’s distributed ledger technology. 

Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time. Unlike traditional databases, distributed ledgers have no central data store or administration functionality. Blockchains are one form of distributed ledger technology. 

Centralised databases are vulnerable to accidents, tampering and leakage. By building an RBM using IOTA, maintenance companies are able to provide a solution to infrastructure partners that is resistant to cyber attacks while protecting sensitive data.

IOTA:      Smart-Energy:    I-HLS:     BusinessWire:

You Might Also Read: 

Japan's New AI Cyber Defence System:

 

« Leveraging Data Privacy For Artificial Intelligence
A Snapshot Of Cyber Security In Britain »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs.

Energy Sec

Energy Sec

EnergySec is a United States 501(c)(3) non-profit corporation formed to support energy sector organizations with the security of their critical technology infrastructures.

IPVanish

IPVanish

IPVanish has its roots in over 15 years of network management, IP services, and content delivery services. Now we're bringing these finely honed skills to VPN.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

Standards Council of Canada (SCC)

Standards Council of Canada (SCC)

SCC leads and facilitates the development and use of national and international standards and accreditation services in Canada.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Zorus

Zorus

Zorus provides best-in-class cybersecurity products to MSP partners to help them grow their business and protect their clients.

Cyber Ranges

Cyber Ranges

Cyber Ranges is the next-generation cyber range for the development of cyber capabilities and the validation of cyber security skills and organizational cyber resilience.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

Elba

Elba

Employee security needs to be reinvented. SaaS security needs to involve end-user and awareness needs to be actionable. Meet elba, the 5-in-one cybersecurity hub with no compromises.

ThreatDown

ThreatDown

ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today’s most advanced threats.

Beacon Technology

Beacon Technology

Beacon Technology offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools.

Nova Microsystems

Nova Microsystems

Nova's mission is to revolutionize cybersecurity through continuous data analysis and dynamic AI-driven encryption.