Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures

被引:7
作者
Matsumoto, Noritaka [1 ]
Fujita, Junya [1 ]
Endoh, Hiromichi [1 ]
Yamada, Tsutomu [2 ]
Sawada, Kenji [3 ]
Kaneko, Osamu [3 ]
机构
[1] Hitachi Ltd, Res & Dev Grp, 7-1-1 Omika Cho, Hitachi, Ibaraki 3191292, Japan
[2] Hitachi Ltd, Serv & Platform Business Unit, 5-2-1 Omika Cho, Hitachi, Ibaraki 3121293, Japan
[3] Univ Electrocommun, Dept Mech & Intelligent Syst Engn, 1-5-1 Chofugaoka, Chofu, Tokyo 1020076, Japan
关键词
control system security; IIoT; asset management; SCAP; SysML;
D O I
10.3390/info12110460
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-security countermeasures are important for IIoT (industrial Internet of things) systems in which IT (information technology) and OT (operational technology) are integrated. The appropriate asset management is the key to creating strong security systems to protect from various cyber threats. However, the timely and coherent asset management methods used for conventional IT systems are difficult to be implemented for IIoT systems. This is because these systems are composed of various network protocols, various devices, and open technologies. Besides, it is necessary to guarantee reliable and real-time control and save CPU and memory usage for legacy OT devices. In this study, therefore, (1) we model various asset configurations for IIoT systems and design a data structure based on SCAP (Security Content Automation Protocol). (2) We design the functions to automatically acquire the detailed information from edge devices by "asset configuration management agent ", which ensures a low processing load. (3) We implement the proposed asset management system to real edge devices and evaluate the functions. Our contribution is to automate the asset management method that is valid for the cyber security countermeasures in the IIoT systems.
引用
收藏
页数:16
相关论文
共 25 条
[1]  
[Anonymous], 2013, IET C CONTROL AUTOMA, DOI DOI 10.1049/CP.2013.0001
[2]  
[Anonymous], 2019, IEC611581
[3]  
[Anonymous], 2019, IEC617841
[4]  
[Anonymous], press release
[5]  
[Anonymous], 2019, Security for Industrial Automation and Control Systems: Technical Security Requirements for IACS Components
[6]  
Bartoli A, 2015, WOODH PUB SER ELECT, V69, P207, DOI 10.1016/B978-1-78242-102-3.00012-5
[7]  
Chegini H., 2019, Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion, P157, DOI [DOI 10.1145/3368235, 10.1145/3368235.3368848.UCC'19Companion]
[8]   Process Automation in an IoT-Fog-Cloud Ecosystem: A Survey and Taxonomy [J].
Chegini, Hossein ;
Naha, Ranesh Kumar ;
Mahanti, Aniket ;
Thulasiraman, Parimala .
IOT, 2021, 2 (01) :92-118
[9]   Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap [J].
Dhirani, Lubna Luxmi ;
Armstrong, Eddie ;
Newe, Thomas .
SENSORS, 2021, 21 (11)
[10]  
Dolezilek D., 2020, P 15 INT C DEV POW S, DOI [10.1049/cp.2020.0016, DOI 10.1049/CP.2020.0016]