Analysis of Security Issues and Countermeasures for the Industrial Internet of Things

被引:26
作者
Pal, Shantanu [1 ]
Jadidi, Zahra [2 ]
机构
[1] Queensland Univ Technol, Fac Sci, Sch Comp Sci, Brisbane, Qld 4000, Australia
[2] Queensland Univ Technol, Cyber Secur Cooperat Res Ctr, Brisbane, Qld 4000, Australia
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 20期
关键词
Industrial Internet of Things; security; architecture; threats; attacks; countermeasures; TRUST MANAGEMENT; ACCESS-CONTROL; PRIVACY; FUTURE; SCHEME; AUTHENTICATION; ARCHITECTURE; CHALLENGES; ATTACKS; DESIGN;
D O I
10.3390/app11209393
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Industrial Internet of Things (IIoT) can be seen as an extension of the Internet of Things (IoT) services and applications to industry with the inclusion of Industry 4.0 that provides automation, reliability, and control in production and manufacturing. IIoT has tremendous potential to accelerate industry automation in many areas, including transportation, manufacturing, automobile, marketing, to name a few places. When the benefits of IIoT are visible, the development of large-scale IIoT systems faces various security challenges resulting in many large-scale cyber-attacks, including fraudulent transactions or damage to critical infrastructure. Moreover, a large number of connected devices over the Internet and resource limitations of the devices (e.g., battery, memory, and processing capability) further pose challenges to the system. The IIoT inherits the insecurities of the traditional communication and networking technologies; however, the IIoT requires further effort to customize the available security solutions with more focus on critical industrial control systems. Several proposals discuss the issue of security, privacy, and trust in IIoT systems, but comprehensive literature considering the several aspects (e.g., users, devices, applications, cascading services, or the emergence of resources) of an IIoT system is missing in the present state of the art IIoT research. In other words, the need for considering a vision for securing an IIoT system with broader security analysis and its potential countermeasures is missing in recent times. To address this issue, in this paper, we provide a comparative analysis of the available security issues present in an IIoT system. We identify a list of security issues comprising logical, technological, and architectural points of view and consider the different IIoT security requirements. We also discuss the available IIoT architectures to examine these security concerns in a systematic way. We show how the functioning of different layers of an IIoT architecture is affected by various security issues and report a list of potential countermeasures against them. This study also presents a list of future research directions towards the development of a large-scale, secure, and trustworthy IIoT system. The study helps understand the various security issues by indicating various threats and attacks present in an IIoT system.
引用
收藏
页数:33
相关论文
共 192 条
[1]   A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT [J].
Aboelwafa, Mariam M. N. ;
Seddik, Karim G. ;
Eldefrawy, Mohamed H. ;
Gadallah, Yasser ;
Gidlund, Mikael .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09) :8462-8471
[2]   Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications [J].
Abosata, Nasr ;
Al-Rubaye, Saba ;
Inalhan, Gokhan ;
Emmanouilidis, Christos .
SENSORS, 2021, 21 (11)
[3]  
Abowd G. D., 2000, ACM Transactions on Computer-Human Interaction, V7, P29, DOI 10.1145/344949.344988
[4]   Desynchronization attack on RAPP ultralightweight authentication protocol [J].
Ahmadian, Zahra ;
Salmasizadeh, Mahmoud ;
Aref, Mohammad Reza .
INFORMATION PROCESSING LETTERS, 2013, 113 (07) :205-209
[5]  
Ahmed M., 2020, Industrial IoT: Challenges, Design Principles, Applications, and Security, P191, DOI [10.1007/978-3-030-42500-55, DOI 10.1007/978-3-030-42500-55]
[6]   A Comprehensive Survey of Industry 4.0, IIoT and Areas of Implementation [J].
Ainsworth, Tyler ;
Brake, Jeremy ;
Gonzalez, Peter ;
Toma, David ;
Browne, Aidan F. .
SOUTHEASTCON 2021, 2021, :584-589
[7]   Secure routing for internet of things: A survey [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :198-213
[8]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[9]  
Al-Qaseemi SA, 2016, PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC), P731, DOI 10.1109/FTC.2016.7821686
[10]   A Survey on Optical Technologies for IoT, Smart Industry, and Smart Infrastructures [J].
Aleksic, Slavisa .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (03)