Cyber Security and Privacy Issues in Industrial Internet of Things

被引:18
作者
Jhanjhi, N. Z. [1 ]
Humayun, Mamoona [2 ]
Almuayqil, Saleh N. [2 ]
机构
[1] Taylors Univ, Sch Comp Sci & Engn SCE, Subang Jaya, Selangor, Malaysia
[2] Jouf Univ, Coll Comp & Informat Sci, Dept Informat Syst, Al Jouf, Saudi Arabia
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2021年 / 37卷 / 03期
关键词
Industrial Internet of things (IIoT); cybersecurity; industry; 4.0; cyber-attacks; ENERGY-EFFICIENT SCHEME; INFORMATION SECURITY; IOT; AUTHENTICATION; CHALLENGES; ATTACKS; CYBERSECURITY; PROTOCOL; SYSTEM;
D O I
10.32604/csse.2021.015206
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades. Consequently, there has been a huge paradigm shift in the manufacturing and production sectors. However, this poses a challenge for cybersecurity and highlights the need to address the possible threats targeting (various pillars of) industry 4.0. However, before providing a concrete solution certain aspect need to be researched, for instance, cybersecurity threats and privacy issues in the industry. To fill this gap, this paper discusses potential solutions to cybersecurity targeting this industry and highlights the consequences of possible attacks and countermeasures (in detail). In particular, the focus of the paper is on investigating the possible cyber-attacks targeting 4 layers of IIoT that is one of the key pillars of Industry 4.0. Based on a detailed review of existing literature, in this study, we have identified possible cyber threats, their consequences, and countermeasures. Further, we have provided a comprehensive framework based on an analysis of cybersecurity and privacy challenges. The suggested framework provides for a deeper understanding of the current state of cybersecurity and sets out directions for future research and applications.
引用
收藏
页码:361 / 380
页数:20
相关论文
共 83 条
[1]   A Taxonomy of Software Integrity Protection Techniques [J].
Ahmadvand, Mohsen ;
Pretschner, Alexander ;
Kelbert, Florian .
ADVANCES IN COMPUTERS, VOL 112, 2019, 112 :413-486
[2]   Proposing a Secure RPL based Internet of Things Routing Protocol: A Review [J].
Almusaylim, Zahrah A. ;
Alhumam, Abdulaziz ;
Jhanjhi, N. Z. .
AD HOC NETWORKS, 2020, 101
[3]   Internet of Things: Evolution and technologies from a security perspective [J].
Ande, Ruth ;
Adebisi, Bamidele ;
Hammoudeh, Mohammad ;
Saleem, Jibran .
SUSTAINABLE CITIES AND SOCIETY, 2020, 54
[4]   Requirements for Testing and Validating the Industrial Internet of Things [J].
Antao, Liliana ;
Pinto, Rui ;
Reis, Joao ;
Goncalves, Gil .
2018 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), 2018, :110-115
[5]   Cyber physical systems security: Analysis, challenges and solutions [J].
Ashibani, Yosef ;
Mahmoud, Qusay H. .
COMPUTERS & SECURITY, 2017, 68 :81-97
[6]   A Central Intrusion Detection System for RPL-Based Industrial Internet of Things [J].
Aydogan, Emre ;
Yilmaz, Selim ;
Sen, Sevil ;
Butun, Ismail ;
Forsstrom, Stefan ;
Gidlund, Mikael .
2019 15TH IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS (WFCS), 2019,
[7]   Site-substitution effect on skyrmion phases of Cd2+-Cu2OSeO3nanocrystallites [J].
Babu, S. ;
Singh, B. K. ;
Mishra, S. K. .
MATERIALS RESEARCH EXPRESS, 2020, 7 (10)
[8]  
Benias N, 2017, 2017 SOUTH EASTERN EUROPEAN DESIGN AUTOMATION, COMPUTER ENGINEERING, COMPUTER NETWORKS AND SOCIAL MEDIA CONFERENCE (SEEDA-CECNSM), P76
[9]   Cyber-physical systems: Extending pervasive sensing from control theory to the Internet of Things [J].
Bordel, Borja ;
Alcarria, Ramon ;
Robles, Tomas ;
Martin, Diego .
PERVASIVE AND MOBILE COMPUTING, 2017, 40 :156-184
[10]   The industrial internet of things (IIoT): An analysis framework [J].
Boyes, Hugh ;
Hallaq, Bit ;
Cunningham, Joe ;
Watson, Tim .
COMPUTERS IN INDUSTRY, 2018, 101 :1-12