A Critical Overview of Industrial Internet of Things Security and Privacy Issues Using a Layer-Based Hacking Scenario

被引:13
作者
Eyeleko, Anselme Herman [1 ]
Feng, Tao [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp Commun, Lanzhou 730050, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchain; cybersecurity; hacking scenarios; Industrial Internet of Things (IIoT); security and privacy; INJECTION ATTACKS; IOT; RELIABILITY; PREVENTION;
D O I
10.1109/JIOT.2023.3308195
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We have witnessed significant technological advancement over the past few years, including the Internet of Things (IoT). The IoT's ability to connect consumer appliances to the Internet has changed the way we live. As a result of the significant benefits that IoT has brought to household usage, it has become a topic of discussion for research departments, leading to its expansion into industrial sectors, commonly known as the Industrial IoT (IIoT). IIoT enables automation and the use of intelligent machines to improve product manufacturing processes and enhance our lives as customers. However, as IIoT-enabling technology and applications continue to grow, security issues and privacy protection challenges become harder to manage, which frequently results in data breaches and sensitive information disclosures. This article first explains what the reader needs to know about the IIoT system architecture in Industry 4.0 to make it easier for them to understand. Second, a hacking scenario is utilized as a methodology to conduct an in-depth analysis of various security issues, as well as their impacts and countermeasures, for each level of the IIoT architecture. Additionally, our hacking scenarios present a variety of targets from which malicious actors can launch their assaults. Third, we provide a thorough review of the various blockchain solutions currently being employed to protect IIoT systems. Finally, this article draws to a close by outlining certain gaps and potential solutions that could be investigated in subsequent studies to strengthen security and enhance privacy for IIoT systems.
引用
收藏
页码:21917 / 21941
页数:25
相关论文
共 185 条
[1]  
Abaimov S., 2020, Cyber Arms: Security in Cyberspace
[2]  
Abdel Ouahab Ikram B., 2022, Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science), V15, P1026
[3]   Federated Threat-Hunting Approach for Microservice-Based Industrial Cyber-Physical System [J].
Abdel-Basset, Mohamed ;
Hawash, Hossam ;
Sallam, Karam .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (03) :1905-1917
[4]  
Abdulkarim S., 2022, OIRT J Inf. Technol., V2, P1
[5]  
Abdulmalik Y., 2021, Ini. J Innov. Comput, VII, P53
[6]   Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective [J].
Abu-Alhaija, Mwaffaq ;
Turab, Nidal M. ;
Hamza, AbdelRahman .
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (01) :225-240
[7]   A multi-attack resilient lightweight IoT authentication scheme [J].
Adeel, Adil ;
Ali, Mazhar ;
Khan, Abdul Nasir ;
Khalid, Tauqeer ;
Rehman, Faisal ;
Jararweh, Yaser ;
Shuja, Junaid .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
[8]  
Ahsan MAM, 2020, INT J PARALLEL PROG, V48, P470, DOI 10.1007/s10766-018-0584-8
[9]   DDoS attacks in IoT networks: a comprehensive systematic literature review [J].
Al-Hadhrami, Yahya ;
Hussain, Farookh Khadeer .
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (03) :971-1001
[10]  
Alahmad M, 2022, J ENG SCI TECHNOL, V17, P75