scholarly journals Analysis of Security Issues and Countermeasures for the Industrial Internet of Things

2021 ◽  
Vol 11 (20) ◽  
pp. 9393
Author(s):  
Shantanu Pal ◽  
Zahra Jadidi

Industrial Internet of Things (IIoT) can be seen as an extension of the Internet of Things (IoT) services and applications to industry with the inclusion of Industry 4.0 that provides automation, reliability, and control in production and manufacturing. IIoT has tremendous potential to accelerate industry automation in many areas, including transportation, manufacturing, automobile, marketing, to name a few places. When the benefits of IIoT are visible, the development of large-scale IIoT systems faces various security challenges resulting in many large-scale cyber-attacks, including fraudulent transactions or damage to critical infrastructure. Moreover, a large number of connected devices over the Internet and resource limitations of the devices (e.g., battery, memory, and processing capability) further pose challenges to the system. The IIoT inherits the insecurities of the traditional communication and networking technologies; however, the IIoT requires further effort to customize the available security solutions with more focus on critical industrial control systems. Several proposals discuss the issue of security, privacy, and trust in IIoT systems, but comprehensive literature considering the several aspects (e.g., users, devices, applications, cascading services, or the emergence of resources) of an IIoT system is missing in the present state of the art IIoT research. In other words, the need for considering a vision for securing an IIoT system with broader security analysis and its potential countermeasures is missing in recent times. To address this issue, in this paper, we provide a comparative analysis of the available security issues present in an IIoT system. We identify a list of security issues comprising logical, technological, and architectural points of view and consider the different IIoT security requirements. We also discuss the available IIoT architectures to examine these security concerns in a systematic way. We show how the functioning of different layers of an IIoT architecture is affected by various security issues and report a list of potential countermeasures against them. This study also presents a list of future research directions towards the development of a large-scale, secure, and trustworthy IIoT system. The study helps understand the various security issues by indicating various threats and attacks present in an IIoT system.

Sensors ◽  
2020 ◽  
Vol 20 (24) ◽  
pp. 7160
Author(s):  
Imanol Mugarza ◽  
Jose Luis Flores ◽  
Jose Luis Montero

New generation Industrial Automation and Control Systems (IACS) are providing advanced connectivity features, enabling new automation applications, services and business models in the Industrial Internet of Things (IIoT) era. Nevertheless, due to the extended attack surface and increasing number of cyber-attacks against industrial equipment, security concerns arise. Hence, these systems should provide enough protection and resiliency against cyber-attacks throughout their entire lifespan, which, in the case of industrial systems, may last several decades. A sound and complete management of security issues and software updates is fundamental to achieve such goal, since leading-edge security countermeasures implemented in the development phase may eventually become out-of-date. In this article, a review of the IEC 62443 industrial security standard concerning the security maintenance of IIoT systems and components is given, along with guidelines for the implementation of such processes. As concluded, the security issues and software updates management shall jointly be addressed by the asset owner, service providers and product suppliers. These security processes should also be compatible with the safety procedures established by safety standards.


Sensors ◽  
2021 ◽  
Vol 21 (19) ◽  
pp. 6647
Author(s):  
Soo Fun Tan ◽  
Azman Samsudin

The inherent complexities of Industrial Internet of Things (IIoT) architecture make its security and privacy issues becoming critically challenging. Numerous surveys have been published to review IoT security issues and challenges. The studies gave a general overview of IIoT security threats or a detailed analysis that explicitly focuses on specific technologies. However, recent studies fail to analyze the gap between security requirements of these technologies and their deployed countermeasure in the industry recently. Whether recent industry countermeasure is still adequate to address the security challenges of IIoT environment are questionable. This article presents a comprehensive survey of IIoT security and provides insight into today’s industry countermeasure, current research proposals and ongoing challenges. We classify IIoT technologies into the four-layer security architecture, examine the deployed countermeasure based on CIA+ security requirements, report the deficiencies of today’s countermeasure, and highlight the remaining open issues and challenges. As no single solution can fix the entire IIoT ecosystem, IIoT security architecture with a higher abstraction level using the bottom-up approach is needed. Moving towards a data-centric approach that assures data protection whenever and wherever it goes could potentially solve the challenges of industry deployment.


Author(s):  
Ricardo Raimundo ◽  
Albérico Travassos Rosário

Nowadays, people live amidst the smart home domain, business opportunities in the industrial smart city and health care, though, along with concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limited in what comes to machine resources. In this way, traditional security does not fit in IoT systems. In this vein, the issue of cyber security has become paramount to the Internet of Things (IoT) and Industrial Internet of Things (IIoT) in mitigating cyber security risk for organizations and end users. New cyber security technologies / applications present improvements for IoT security management. Nevertheless, there is a gap on the effectiveness of IoT cyber risk solutions. This review article discusses the, trends around opportunities and threats in cyber security for IIoT.


Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5166 ◽  
Author(s):  
Karanjeet Choudhary ◽  
Gurjot Singh Gaba ◽  
Ismail Butun ◽  
Pardeep Kumar

Continuous development of the Industrial Internet of Things (IIoT) has opened up enormous opportunities for the engineers to enhance the efficiency of the machines. Despite the development, many industry administrators still fear to use Internet for operating their machines due to untrusted nature of the communication channel. The utilization of internet for managing industrial operations can be widespread adopted if the authentication of the entities are performed and trust is ensured. The traditional schemes with their inherent security issues and other complexities, cannot be directly deployed to resource constrained network devices. Therefore, we have proposed a strong mutual authentication and secret key exchange protocol to address the vulnerabilities of the existing schemes. We have used various cryptography operations such as hashing, ciphering, and so forth, for providing secure mutual authentication and secret key exchange between different entities to restrict unauthorized access. Performance and security analysis clearly demonstrates that the proposed work is energy efficient (computation and communication inexpensive) and more robust against the attacks in comparison to the traditional schemes.


2020 ◽  
Vol 19 (2) ◽  
pp. 358-382 ◽  
Author(s):  
Georgi Tsochev ◽  
Radoslav Yoshinov ◽  
Nataly Zhukova

An issue of the Internet of Things security which does not belong to the traditional problem of cybersecurity, as it is a local or distributed monitoring and/or monitoring of physical systems state connected via the Internet, is considered. An architecture of Supervisory Control and Data Acquisition system (SCADA) was considered in previous authors studies. Due to SCADA systems implementation, vulnerabilities and various options of cyberattacks on them were analyzed. As an example, a case study based on trees was considered, and the obtained results were summarized and visualized. The purpose of the paper is to compare new industrial technology of the Internet of things (Industrial Internet of Things) with the previously studied traditional SCADA systems. The Industrial Internet of Things is a network of devices which are connected through communication technologies. Some of the most common security issues for the Industrial Internet of Things are presented in this paper. A brief overview of the structure of the Industrial Internet of things is presented, basic principles of security and the main problems that can arise with devices of the Internet of things are described. Based on research and analysis of the risk of threats in the field of the Industrial Internet of things, a specific case of destructive impact based on a tree analysis is considered as the main approach. A description of an attack tree leaf node value creation and an analysis of results are provided. Analysis of the electronic record change scenario to increase the infusion rate of an overflow pump using a complexity index is performed. The consequences compared to a previous study of SCADA systems are analyzed, and respective conclusion is made.


Author(s):  
Sema Kayapınar Kaya

Industrial Internet of Things (IIoT) refers to the extension of the Internet of Things and It is used for industrial purposes such as manufacturing, supply chain.IIoT can be connected with billions of industrial devices and machines that supported machine learning and big data technology. Because of its potential to authorize faster and better decision making, the IIoT becomes essential for supply chain processes. The IIoT is set to revolutionize the supply chain with both operational efficiencies and revenue opportunities made possible with just this type of transparency. This study attempts to fill this gap by developing a conceptual framework for predicting the advantage of the IIoT and supply chain performance. This chapter synthesizes existing literature reviews and making bibliometric analysis on the IIoT and supply chain. Additionally, It also outlines avenues and opportunities for future research aiming at the contribution of the IIoT to Supply Chain processes.


Work ◽  
2021 ◽  
pp. 1-11
Author(s):  
Duan Pingli ◽  
Bala Anand Muthu ◽  
Seifedine Nimer Kadry

BACKGROUND: The manufacturing industry undergoes a new age, with significant changes taking place on several fronts. Companies devoted to digital transformation take their future plants inspired by the Internet of Things (IoT). The IoT is a worldwide network of interrelated physical devices, which is an essential component of the internet, including sensors, actuators, smart apps, computers, mechanical machines, and people. The effective allocation of the computing resources and the carrier is critical in the industrial internet of Things (IIoT) for smart production systems. Indeed, the existing assignment method in the smart production system cannot guarantee that resources meet the inherently complex and volatile requirements of the user are timely. Many research results on resource allocations in auction formats which have been implemented to consider the demand and real-time supply for smart development resources, but safety privacy and trust estimation issues related to these outcomes are not actively discussed. OBJECTIVES: The paper proposes a Hierarchical Trustful Resource Assignment (HTRA) and Trust Computing Algorithm (TCA) based on Vickrey Clarke-Groves (VGCs) in the computer carriers necessary resources to communicate wirelessly among IIoT devices and gateways, and the allocation of CPU resources for processing information at the CPC. RESULTS: Finally, experimental findings demonstrate that when the IIoT equipment and gateways are valid, the utilities of each participant are improved. CONCLUSION: This is an easy and powerful method to guarantee that intelligent manufacturing components genuinely work for their purposes, which want to integrate each element into a system without interactions with each other.


2020 ◽  
Author(s):  
Nugroho Ridhwan ◽  
Edi Purwanto

The purpose of this article is to build a conceptual framework based on literature review that will be tested in future research related to Digital Business. The results of the literature review allow for the construction of hypotheses into a conceptual framework. Furthermore, the study assesses the influence of performance expectations, efforts expectations and social influence on behavioral intention and usage behavior by modifying Hofstede’s cultural dimensions. The conceptual framework will be tested among Industrial Internet of Things (IIoT) users for future research in Indonesia. Keywords: performance expectancy, effort expectancy, social influence, behavioral intention, use behavior, UTAUT, Hofstede’s cultural dimensions, Industrial IoT


Sign in / Sign up

Export Citation Format

Share Document