Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2020

01-12-2020

A Technique for Safely Transforming the Infrastructure of Industrial Control Systems to the Industrial Internet of Things

Authors: A. D. Dakhnovich, D. A. Moskvin, D. V. Ivanov

Published in: Automatic Control and Computer Sciences | Issue 8/2020

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract—

This article describes the transformation of an enterprise en route from the conventional construction according to the Industrial Control Systems (ICS) architecture to the architecture of the Industrial Internet of Things (IIoT). The main cybersecurity threats that must be taken into account in the digital transformation are considered. The distinct features of each of the phases are described.
Literature
1.
go back to reference Schrecker, S., Soroush, H., and Molina, J., Industrial Internet of Things Volume G4: Security Framework, 2016. http://www.iiconsortium.org/pdf/IIC_PUB_G4_V1.00_PB-3.pdf. Accessed February 19, 2019. Schrecker, S., Soroush, H., and Molina, J., Industrial Internet of Things Volume G4: Security Framework, 2016. http://​www.​iiconsortium.​org/​pdf/​IIC_​PUB_​G4_​V1.​00_​PB-3.​pdf.​ Accessed February 19, 2019.
2.
go back to reference Zegzhda, D.P., Kalinin, M.O., and Levykin, M.V., Actual vulnerabilities of industrial automation protocols of an open platform communications series, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 972–979.CrossRef Zegzhda, D.P., Kalinin, M.O., and Levykin, M.V., Actual vulnerabilities of industrial automation protocols of an open platform communications series, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 972–979.CrossRef
3.
go back to reference Didler, P., Macias, F., and Harstad, J., Converged Plantwide Ethernet (CPwE) Design and Implementation Guide, 2011. https://literature.rockwellautomation.com/idc/groups/literature/documents/td/enet-td001_-en-p.pdf. Accessed August 11, 2019. Didler, P., Macias, F., and Harstad, J., Converged Plantwide Ethernet (CPwE) Design and Implementation Guide, 2011. https://​literature.​rockwellautomati​on.​com/​idc/​groups/​literature/​documents/​td/​enet-td001_​-en-p.​pdf.​ Accessed August 11, 2019.
4.
go back to reference Obregon, L., Secure Architecture for Industrial Control Systems, 2014. https://www.sans.org/reading-room/whitepapers/ICS/secure-architecture-industrial-control-systems-36327. Accessed September 29, 2019. Obregon, L., Secure Architecture for Industrial Control Systems, 2014. https://​www.​sans.​org/​reading-room/​whitepapers/​ICS/​secure-architecture-industrial-control-systems-36327.​ Accessed September 29, 2019.
5.
go back to reference Stouffer, K., Pillitteri, V., and Lightman, S., Guide to Industrial Control Systems (ICS) Security, SP 800-82 Rev. 2, 2015. Stouffer, K., Pillitteri, V., and Lightman, S., Guide to Industrial Control Systems (ICS) Security, SP 800-82 Rev. 2, 2015.
7.
go back to reference Time-Sensitive Networking: A Technical Introduction, Cisco Public White Paper, 2017. https://www.cisco.com/ c/dam/en/us/solutions/collateral/industry-solutions/white-paper-c11-738950.pdf. Accessed March 12, 2019. Time-Sensitive Networking: A Technical Introduction, Cisco Public White Paper, 2017. https://​www.​cisco.​com/​ c/dam/en/us/solutions/collateral/industry-solutions/white-paper-c11-738950.pdf. Accessed March 12, 2019.
8.
go back to reference Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673–681.CrossRef Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673–681.CrossRef
9.
go back to reference Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81–87. Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81–87.
10.
go back to reference Ross, M., Hannes, T., and Jara, A., Baseline Security Recommendations for IoT in the Context of Critical Information Infrastructures, 2017. https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot/at_download/fullReport. Accessed January 21, 2019. Ross, M., Hannes, T., and Jara, A., Baseline Security Recommendations for IoT in the Context of Critical Information Infrastructures, 2017. https://​www.​enisa.​europa.​eu/​publications/​baseline-security-recommendations-for-iot/​at_​download/​fullReport.​ Accessed January 21, 2019.
11.
go back to reference Mussomeli, A., Doug, G., and Laaper, S., The Rise of the Digital Supply Network, Deloitte Univ. Press, 2016, vol. 1. Mussomeli, A., Doug, G., and Laaper, S., The Rise of the Digital Supply Network, Deloitte Univ. Press, 2016, vol. 1.
12.
go back to reference Lin, S., Crawford, M., and Mellor, S., The Industrial Internet of Things Volume G1: Reference Architecture, 2017. https://www.iiconsortium.org/IIC_PUB_G1_V1.80_2017-01-31.pdf. Accessed February 19, 2019. Lin, S., Crawford, M., and Mellor, S., The Industrial Internet of Things Volume G1: Reference Architecture, 2017. https://​www.​iiconsortium.​org/​IIC_​PUB_​G1_​V1.​80_​2017-01-31.​pdf.​ Accessed February 19, 2019.
13.
go back to reference Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Analysis of the information security threats in the digital production networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1071–1075.CrossRef Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Analysis of the information security threats in the digital production networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1071–1075.CrossRef
14.
go back to reference Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Therm. Eng., 2016, vol. 63, no. 13, pp. 948–956.CrossRef Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Therm. Eng., 2016, vol. 63, no. 13, pp. 948–956.CrossRef
15.
go back to reference Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Computer Network Security: International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS-2010), 2010, pp. 337–344. Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Computer Network Security: International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS-2010), 2010, pp. 337–344.
18.
go back to reference Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60–64. Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60–64.
Metadata
Title
A Technique for Safely Transforming the Infrastructure of Industrial Control Systems to the Industrial Internet of Things
Authors
A. D. Dakhnovich
D. A. Moskvin
D. V. Ivanov
Publication date
01-12-2020
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2020
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411620080106

Other articles of this Issue 8/2020

Automatic Control and Computer Sciences 8/2020 Go to the issue