Industrial Internet of Things: A Cyber Security Perspective Investigation

Fahad Al-Zahrani, Nadeem Hassan
{"title":"Industrial Internet of Things: A Cyber Security Perspective Investigation","authors":"Fahad Al-Zahrani, Nadeem Hassan","doi":"10.1109/ICAISC56366.2023.10085080","DOIUrl":null,"url":null,"abstract":"The IIoT arose as a result of the increased automation, dependability, and management that Industry 4.0 introduced to the manufacturing and production sectors. The Internet of Things has the potential to speed up the process of automating several industries, including the automotive, transportation, production, and advertising sectors. Large-scale IIoT systems will have security difficulties when its benefits become clear, leading to repeated large-scale attacks that damage key infrastructure or fraudulent transactions. The system is additionally challenged by the vast quantity of connected devices and the consequent constraints on available resources (such as their battery life, memory, and processing power). Traditional communication and networking flaws are also present in the IIoT, but it takes more work to tailor security solutions to secure critical industrial control systems. These flaws are carried over to the IIoT. While there is some literature on the topics of security, privacy, and trust in IIoT systems, a more thorough examination of the many moving parts that make up an IIoT system is lacking. This study compares IoT security vulnerabilities to solve the problem. We explore several IIoT security difficulties and criteria. We also explore available IIoT designs to rigorously investigate these security threats. We describe viable countermeasures and explain how security weaknesses at any layer of an IIoT architecture affect its functionality. This report proposes future research on trustworthy, large-scale, and secure IIoT systems. The report highlights the multiple IIoT system threats and attacks to improve security awareness.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAISC56366.2023.10085080","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The IIoT arose as a result of the increased automation, dependability, and management that Industry 4.0 introduced to the manufacturing and production sectors. The Internet of Things has the potential to speed up the process of automating several industries, including the automotive, transportation, production, and advertising sectors. Large-scale IIoT systems will have security difficulties when its benefits become clear, leading to repeated large-scale attacks that damage key infrastructure or fraudulent transactions. The system is additionally challenged by the vast quantity of connected devices and the consequent constraints on available resources (such as their battery life, memory, and processing power). Traditional communication and networking flaws are also present in the IIoT, but it takes more work to tailor security solutions to secure critical industrial control systems. These flaws are carried over to the IIoT. While there is some literature on the topics of security, privacy, and trust in IIoT systems, a more thorough examination of the many moving parts that make up an IIoT system is lacking. This study compares IoT security vulnerabilities to solve the problem. We explore several IIoT security difficulties and criteria. We also explore available IIoT designs to rigorously investigate these security threats. We describe viable countermeasures and explain how security weaknesses at any layer of an IIoT architecture affect its functionality. This report proposes future research on trustworthy, large-scale, and secure IIoT systems. The report highlights the multiple IIoT system threats and attacks to improve security awareness.
工业物联网:网络安全视角研究
工业物联网的兴起是工业4.0引入制造和生产部门的自动化、可靠性和管理水平提高的结果。物联网有可能加速多个行业的自动化进程,包括汽车、运输、生产和广告行业。当大规模工业物联网系统的好处变得清晰时,它将面临安全难题,导致反复的大规模攻击,破坏关键基础设施或欺诈交易。此外,大量连接的设备以及随之而来的对可用资源(如电池寿命、内存和处理能力)的限制也对系统提出了挑战。传统的通信和网络缺陷也存在于工业物联网中,但需要更多的工作来定制安全解决方案以保护关键的工业控制系统。这些缺陷会延续到工业物联网。虽然有一些关于工业物联网系统的安全、隐私和信任主题的文献,但缺乏对构成工业物联网系统的许多活动部件的更彻底的检查。本研究通过比较物联网安全漏洞来解决问题。我们探讨了几个工业物联网安全困难和标准。我们还探讨了可用的工业物联网设计,以严格调查这些安全威胁。我们描述了可行的对策,并解释了工业物联网架构任何层的安全漏洞如何影响其功能。本报告提出了可信赖、大规模和安全的工业物联网系统的未来研究。该报告强调了多种工业物联网系统威胁和攻击,以提高安全意识。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信