The concept of a Hardware-Software System for Protecting IIoT Devices

Viktor Lobyzov, V. Shevtsov
{"title":"The concept of a Hardware-Software System for Protecting IIoT Devices","authors":"Viktor Lobyzov, V. Shevtsov","doi":"10.15688/nbit.jvolsu.2021.2.3","DOIUrl":null,"url":null,"abstract":"The Internet of Things is a new trend in the development of information technologies, actively spreading as interconnected functional nodes that by default have the means to ensure interaction directly with each other, or with the external environment. The development of such networks is a phenomenon that can radically change the world economy, as well as social processes. As a result of the application of this layer of information technologies, the need for direct human control over actions and operations will be eliminated. One of the most common household examples is a “smart home” – a computer network of interconnected devices using various data transfer protocols with the ability to access this network from an external network. So, thanks to IoT, it is possible to configure devices in the house by remote access. The paper deals with the main security methods against attacks and threats of IIoT devices. The information infrastructure was analyzed, an idea of the architecture of IIoT systems was obtained, and the information transmission path was identified. An analysis of the IIoT regulatory framework governing security, architecture and data exchange in IIoT systems has been carried out, documents governing the Industrial Internet of Things have been identified. The best communication protocol has been identified. Subsequently, the threats of the protocol were selected, and possible means and methods of protection were identified. For IIoT gateways, the concept of a hardware-software complex was presented as a prototype, and a comparison was made with existing solutions.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"NBI Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15688/nbit.jvolsu.2021.2.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things is a new trend in the development of information technologies, actively spreading as interconnected functional nodes that by default have the means to ensure interaction directly with each other, or with the external environment. The development of such networks is a phenomenon that can radically change the world economy, as well as social processes. As a result of the application of this layer of information technologies, the need for direct human control over actions and operations will be eliminated. One of the most common household examples is a “smart home” – a computer network of interconnected devices using various data transfer protocols with the ability to access this network from an external network. So, thanks to IoT, it is possible to configure devices in the house by remote access. The paper deals with the main security methods against attacks and threats of IIoT devices. The information infrastructure was analyzed, an idea of the architecture of IIoT systems was obtained, and the information transmission path was identified. An analysis of the IIoT regulatory framework governing security, architecture and data exchange in IIoT systems has been carried out, documents governing the Industrial Internet of Things have been identified. The best communication protocol has been identified. Subsequently, the threats of the protocol were selected, and possible means and methods of protection were identified. For IIoT gateways, the concept of a hardware-software complex was presented as a prototype, and a comparison was made with existing solutions.
保护工业物联网设备的软硬件系统概念
物联网是信息技术发展的新趋势,作为相互连接的功能节点,在默认情况下具有确保彼此直接交互或与外部环境交互的手段,正在积极传播。这种网络的发展是一种可以从根本上改变世界经济和社会进程的现象。由于这一层信息技术的应用,人类对行动和操作的直接控制将被消除。最常见的家庭例子之一是“智能家居”——一个由相互连接的设备组成的计算机网络,使用各种数据传输协议,能够从外部网络访问该网络。因此,由于物联网,可以通过远程访问配置房屋中的设备。本文讨论了针对工业物联网设备的攻击和威胁的主要安全方法。分析了信息基础设施,提出了工业物联网系统的体系结构思路,确定了信息传输路径。对IIoT系统中管理安全性、架构和数据交换的IIoT监管框架进行了分析,并确定了管理工业物联网的文件。最好的通信协议已经确定。随后,对协议的威胁进行了选择,并确定了可能的保护手段和方法。对于工业物联网网关,提出了软硬件综合体的概念作为原型,并与现有解决方案进行了比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信