Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures

被引:74
作者
Tsiknas, Konstantinos [1 ]
Taketzis, Dimitrios [2 ]
Demertzis, Konstantinos [3 ]
Skianis, Charalabos [4 ]
机构
[1] Democritus Univ Thrace, Dept Elect & Comp Engn, Xanthi 67100, Greece
[2] Hellen Natl Def Gen Staff, Athens 15561, Greece
[3] Int Hellen Univ, Fac Sci, Dept Phys, Lab Complex Syst, Kavala Campus, St Loukas 65404, Greece
[4] Univ Aegean, Dept Informat & Commun Syst Engn, Samos 83200, Greece
来源
IOT | 2021年 / 2卷 / 01期
关键词
IIoT; IoT; Industry; 4.0; protocols; cyber threats; attacks; security; ANOMALY DETECTION; INTERNET; SECURITY; THINGS; RANSOMWARE; PRIVACY; ISSUES; SYSTEM;
D O I
10.3390/iot2010009
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In today's Industrial Internet of Things (IIoT) environment, where different systems interact with the physical world, the state proposed by the Industry 4.0 standards can lead to escalating vulnerabilities, especially when these systems receive data streams from multiple intermediaries, requiring multilevel security approaches, in addition to link encryption. At the same time taking into account the heterogeneity of the systems included in the IIoT ecosystem and the non-institutionalized interoperability in terms of hardware and software, serious issues arise as to how to secure these systems. In this framework, given that the protection of industrial equipment is a requirement inextricably linked to technological developments and the use of the IoT, it is important to identify the major vulnerabilities and the associated risks and threats and to suggest the most appropriate countermeasures. In this context, this study provides a description of the attacks against IIoT systems, as well as a thorough analysis of the solutions for these attacks, as they have been proposed in the most recent literature.
引用
收藏
页码:163 / 186
页数:24
相关论文
共 111 条
[1]  
Adnan AH, 2015, INT CONF ADV ELECTR, P165, DOI 10.1109/ICAEE.2015.7506822
[2]   IPv6 Neighbor Discovery Protocol Specifications, Threats and Countermeasures: A Survey [J].
Ahmed, Amjed Sid Ahmed Mohamed Sid ;
Hassan, Rosilah ;
Othman, Nor Effendy .
IEEE ACCESS, 2017, 5 :18187-18210
[3]  
Ajlouni M.I.A., 2013, J. Inf. Eng. Appl, V3, P6
[4]   Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment [J].
Al-Hawawreh, Muna ;
Sitnikova, Elena .
2019 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS), 2019,
[5]   Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things [J].
Al-Hawawreh, Muna ;
den Hartog, Frank ;
Sitnikova, Elena .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) :7137-7151
[6]  
Al-Rabiaah S, 2018, 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), DOI 10.1109/NCG.2018.8593143
[7]  
Alhawi OMK, 2018, ADV INFORM SECUR, V70, P93, DOI 10.1007/978-3-319-73951-9_5
[8]   A Multi-Classifier Network-Based Crypto Ransomware Detection System: A Case Study of Locky Ransomware [J].
Almashhadani, Ahmad O. ;
Kaiiali, Mustafa ;
Sezer, Sakir ;
O'Kane, Philip .
IEEE ACCESS, 2019, 7 :47053-47067
[9]   Denial of Service and Man-in-the-Middle Attacks against IoT Devices in a GPS-based Monitoring Software for Intelligent Transportation Systems [J].
Andreica, Gheorghe Romeo ;
Bozga, Liviu ;
Zinca, Daniel ;
Dobrota, Virgil .
2020 19TH ROEDUNET CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2020,
[10]  
Andy S, 2017, 2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), P571