{"title":"工业物联网:网络安全视角研究","authors":"Fahad Al-Zahrani, Nadeem Hassan","doi":"10.1109/ICAISC56366.2023.10085080","DOIUrl":null,"url":null,"abstract":"The IIoT arose as a result of the increased automation, dependability, and management that Industry 4.0 introduced to the manufacturing and production sectors. The Internet of Things has the potential to speed up the process of automating several industries, including the automotive, transportation, production, and advertising sectors. Large-scale IIoT systems will have security difficulties when its benefits become clear, leading to repeated large-scale attacks that damage key infrastructure or fraudulent transactions. The system is additionally challenged by the vast quantity of connected devices and the consequent constraints on available resources (such as their battery life, memory, and processing power). Traditional communication and networking flaws are also present in the IIoT, but it takes more work to tailor security solutions to secure critical industrial control systems. These flaws are carried over to the IIoT. While there is some literature on the topics of security, privacy, and trust in IIoT systems, a more thorough examination of the many moving parts that make up an IIoT system is lacking. This study compares IoT security vulnerabilities to solve the problem. We explore several IIoT security difficulties and criteria. We also explore available IIoT designs to rigorously investigate these security threats. We describe viable countermeasures and explain how security weaknesses at any layer of an IIoT architecture affect its functionality. This report proposes future research on trustworthy, large-scale, and secure IIoT systems. The report highlights the multiple IIoT system threats and attacks to improve security awareness.","PeriodicalId":422888,"journal":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Industrial Internet of Things: A Cyber Security Perspective Investigation\",\"authors\":\"Fahad Al-Zahrani, Nadeem Hassan\",\"doi\":\"10.1109/ICAISC56366.2023.10085080\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The IIoT arose as a result of the increased automation, dependability, and management that Industry 4.0 introduced to the manufacturing and production sectors. The Internet of Things has the potential to speed up the process of automating several industries, including the automotive, transportation, production, and advertising sectors. Large-scale IIoT systems will have security difficulties when its benefits become clear, leading to repeated large-scale attacks that damage key infrastructure or fraudulent transactions. The system is additionally challenged by the vast quantity of connected devices and the consequent constraints on available resources (such as their battery life, memory, and processing power). Traditional communication and networking flaws are also present in the IIoT, but it takes more work to tailor security solutions to secure critical industrial control systems. These flaws are carried over to the IIoT. While there is some literature on the topics of security, privacy, and trust in IIoT systems, a more thorough examination of the many moving parts that make up an IIoT system is lacking. This study compares IoT security vulnerabilities to solve the problem. We explore several IIoT security difficulties and criteria. We also explore available IIoT designs to rigorously investigate these security threats. We describe viable countermeasures and explain how security weaknesses at any layer of an IIoT architecture affect its functionality. This report proposes future research on trustworthy, large-scale, and secure IIoT systems. The report highlights the multiple IIoT system threats and attacks to improve security awareness.\",\"PeriodicalId\":422888,\"journal\":{\"name\":\"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)\",\"volume\":\"51 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAISC56366.2023.10085080\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAISC56366.2023.10085080","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Industrial Internet of Things: A Cyber Security Perspective Investigation
The IIoT arose as a result of the increased automation, dependability, and management that Industry 4.0 introduced to the manufacturing and production sectors. The Internet of Things has the potential to speed up the process of automating several industries, including the automotive, transportation, production, and advertising sectors. Large-scale IIoT systems will have security difficulties when its benefits become clear, leading to repeated large-scale attacks that damage key infrastructure or fraudulent transactions. The system is additionally challenged by the vast quantity of connected devices and the consequent constraints on available resources (such as their battery life, memory, and processing power). Traditional communication and networking flaws are also present in the IIoT, but it takes more work to tailor security solutions to secure critical industrial control systems. These flaws are carried over to the IIoT. While there is some literature on the topics of security, privacy, and trust in IIoT systems, a more thorough examination of the many moving parts that make up an IIoT system is lacking. This study compares IoT security vulnerabilities to solve the problem. We explore several IIoT security difficulties and criteria. We also explore available IIoT designs to rigorously investigate these security threats. We describe viable countermeasures and explain how security weaknesses at any layer of an IIoT architecture affect its functionality. This report proposes future research on trustworthy, large-scale, and secure IIoT systems. The report highlights the multiple IIoT system threats and attacks to improve security awareness.