Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges

被引:79
作者
Gebremichael, Teklay [1 ]
Ledwaba, Lehlogonolo P. I. [2 ]
Eldefrawy, Mohamed H. [3 ]
Hancke, Gerhard P. [2 ]
Pereira, Nuno [4 ]
Gidlund, Mikael [1 ]
Akerberg, Johan [5 ]
机构
[1] Mid Sweden Univ, Dept Informat Syst & Technol, S-85230 Sundsvall, Sweden
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
[3] Halmstad Univ, Sch Informat Technol, S-30118 Halmstad, Sweden
[4] Polytech Inst Porto, P-4200465 Porto, Portugal
[5] ABB Corp Res, S-72226 Vasteras, Sweden
关键词
Protocols; Cryptography; Standards; Privacy; Internet of Things; Peer-to-peer computing; Industrial Internet of Things; IIoT; industrial networks; security and privacy; ACCESS-CONTROL; BIG-DATA; SYSTEMS; ENERGY; COMMUNICATION; FRAMEWORK; TRUST; EDGE; COAP;
D O I
10.1109/ACCESS.2020.3016937
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is rapidly becoming an integral component of the industrial market in areas such as automation and analytics, giving rise to what is termed as the Industrial IoT (IIoT). The IIoT promises innovative business models in various industrial domains by providing ubiquitous connectivity, efficient data analytics tools, and better decision support systems for a better market competitiveness. However, IIoT deployments are vulnerable to a variety of security threats at various levels of the connectivity and communications infrastructure. The complex nature of the IIoT infrastructure means that availability, confidentiality and integrity are difficult to guarantee, leading to a potential distrust in the network operations and concerns of loss of critical infrastructure, compromised safety of network end-users and privacy breaches on sensitive information. This work attempts to look at the requirements currently specified for a secure IIoT ecosystem in industry standards, such as Industrial Internet Consortium (IIC) and OpenFog Consortium, and to what extent current IIoT connectivity protocols and platforms hold up to the standards with regard to security and privacy. The paper also discusses possible future research directions to enhance the security, privacy and safety of the IIoT.
引用
收藏
页码:152351 / 152366
页数:16
相关论文
共 103 条
[1]   A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT [J].
Aboelwafa, Mariam M. N. ;
Seddik, Karim G. ;
Eldefrawy, Mohamed H. ;
Gadallah, Yasser ;
Gidlund, Mikael .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09) :8462-8471
[2]  
Åkerberg J, 2011, IEEE INTL CONF IND I
[3]  
Alramadhan M., 2017, P 26 INT C COMP COMM, P1
[4]  
[Anonymous], 2018, Poverty and inequality Colombia Reports data
[5]  
[Anonymous], 2016, ISSCC DIG TECH PAP I
[6]  
[Anonymous], 2017, IEEE T POWER SYSTEMS, VPP, P1
[7]  
[Anonymous], 2014, CIGRE Report 596: CIGRE/CIRED Joint Working Group C4. 112
[8]  
Aras E, 2017, IEEE INT C CYBERNET, P361, DOI 10.1109/cybconf.2017.7985777
[9]  
Attridge J., 2002, OVERVIEW HARDWARE SE, V1, P1
[10]  
Bahga A., 2016, J SOFTW ENG APPL, V9, P533