Skip to main content

2019 | OriginalPaper | Buchkapitel

Towards a Secure Industrial Internet of Things

verfasst von : Georgios Spathoulas, Sokratis Katsikas

Erschienen in: Security and Privacy Trends in the Industrial Internet of Things

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Industrial Internet of Things (IIoT), being one of the underlying and enabling technologies of the Industry 4.0 initiative, brings about expectations for unprecedented value creation opportunities in industry. Unfortunately, these do not come without a price; in this case the price to pay is the increased vulnerabilities, the increased threats and the increased attack surface that result when industrial systems originally designed with little or no cybersecurity in mind connect to the Internet. Consequently, the cybersecurity of the IIoT becomes of paramount importance. Research has started focusing on this area, as well as on the related areas of cyber-physical systems security and industrial network security, but a multitude of issues still remain to be addressed. In this chapter, we review recent research results in the area of IIoT security, with an eye towards identifying trends on one hand and areas where research seems to lag behind on the other, by classifying research results using the security lifecycle model of the National Institute of Standards and Technology (NIST) framework for improving the cybersecurity of critical infrastructures.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alcaraz C (2017) Resilient industrial control systems based on multiple redundancy. Int J Crit Infrastruct (IJCIS) 13(2/3):278–2951CrossRef Alcaraz C (2017) Resilient industrial control systems based on multiple redundancy. Int J Crit Infrastruct (IJCIS) 13(2/3):278–2951CrossRef
2.
Zurück zum Zitat Alcaraz C (2018) Cloud-assisted dynamic resilience for cyber-physical control systems. IEEE Wirel Commun 25(1):76–82CrossRef Alcaraz C (2018) Cloud-assisted dynamic resilience for cyber-physical control systems. IEEE Wirel Commun 25(1):76–82CrossRef
3.
Zurück zum Zitat Alcaraz C, Lopez J (2017) Secure interoperability in cyber-physical systems. In: Ferrag MA, Ahmim A (eds) Security solutions and applied cryptography in smart grid communications. IGI Global, Hershey, pp 137–158 Alcaraz C, Lopez J (2017) Secure interoperability in cyber-physical systems. In: Ferrag MA, Ahmim A (eds) Security solutions and applied cryptography in smart grid communications. IGI Global, Hershey, pp 137–158
4.
Zurück zum Zitat Alcaraz C, Lopez J (2018) A cyber-physical systems-based checkpoint model for structural controllability. IEEE Syst J 12:1–12CrossRef Alcaraz C, Lopez J (2018) A cyber-physical systems-based checkpoint model for structural controllability. IEEE Syst J 12:1–12CrossRef
5.
Zurück zum Zitat Alcaraz C, Roman R, Najera P, Lopez J (2013) Security of industrial sensor network-based remote substations in the context of the Internet of Things. Ad Hoc Netw 11(3):1091–1104CrossRef Alcaraz C, Roman R, Najera P, Lopez J (2013) Security of industrial sensor network-based remote substations in the context of the Internet of Things. Ad Hoc Netw 11(3):1091–1104CrossRef
6.
Zurück zum Zitat Bakhshi Z, Balador A, Mustafa J (2018) Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models. In: 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Apr 2018. IEEE, pp 173–178 Bakhshi Z, Balador A, Mustafa J (2018) Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models. In: 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Apr 2018. IEEE, pp 173–178
7.
Zurück zum Zitat Barrett MP (2018) Framework for improving critical infrastructure cybersecurity version 1.1. Technical report Barrett MP (2018) Framework for improving critical infrastructure cybersecurity version 1.1. Technical report
8.
Zurück zum Zitat Caselli M, Zambon E, Kargl F (2015) Sequence-aware intrusion detection in industrial control systems. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security – CPSS’15. ACM Press, New York, pp 13–24 Caselli M, Zambon E, Kargl F (2015) Sequence-aware intrusion detection in industrial control systems. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security – CPSS’15. ACM Press, New York, pp 13–24
9.
Zurück zum Zitat Choi J, Shin Y, Cho S (2018) Study on information security sharing system among the industrial IoT service and product provider. In: 2018 International Conference on Information Networking (ICOIN), Jan 2018. IEEE, pp 551–555 Choi J, Shin Y, Cho S (2018) Study on information security sharing system among the industrial IoT service and product provider. In: 2018 International Conference on Information Networking (ICOIN), Jan 2018. IEEE, pp 551–555
10.
Zurück zum Zitat Esfahani A, Mantas G, Matischek R, Saghezchi FB, Rodriguez J, Bicaku A, Maksuti S, Tauber M, Schmittner C, Bastos J (2017) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J 6(1):288–296CrossRef Esfahani A, Mantas G, Matischek R, Saghezchi FB, Rodriguez J, Bicaku A, Maksuti S, Tauber M, Schmittner C, Bastos J (2017) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J 6(1):288–296CrossRef
11.
Zurück zum Zitat Gill H (2008) From vision to reality: cyber-physical systems. In: HCSS national workshop on new research directions for high confidence transportation CPS: automotive, aviation, and rail Gill H (2008) From vision to reality: cyber-physical systems. In: HCSS national workshop on new research directions for high confidence transportation CPS: automotive, aviation, and rail
12.
Zurück zum Zitat Hassanzadeh A, Modi S, Mulchandani S (2015) Towards effective security control assignment in the industrial Internet of things. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Dec 2015. IEEE, pp 795–800 Hassanzadeh A, Modi S, Mulchandani S (2015) Towards effective security control assignment in the industrial Internet of things. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Dec 2015. IEEE, pp 795–800
13.
Zurück zum Zitat He D, Ma M, Zeadall S, Kumar N, Liang K (2017) Certificateless public key authenticated encryption with keyword search for industrial Internet of Things. IEEE Trans Ind Inf 14(8):3618–3627CrossRef He D, Ma M, Zeadall S, Kumar N, Liang K (2017) Certificateless public key authenticated encryption with keyword search for industrial Internet of Things. IEEE Trans Ind Inf 14(8):3618–3627CrossRef
14.
Zurück zum Zitat Jeschke S, Brecher C, Meisen T, Özdemir D, Eschert T (2017) Industrial Internet of things and cyber manufacturing systems. In: Jeschke S, Brecher C, Song H, Rawat D (eds) Industrial Internet of Things. Springer, Cham, pp 3–19CrossRef Jeschke S, Brecher C, Meisen T, Özdemir D, Eschert T (2017) Industrial Internet of things and cyber manufacturing systems. In: Jeschke S, Brecher C, Song H, Rawat D (eds) Industrial Internet of Things. Springer, Cham, pp 3–19CrossRef
15.
Zurück zum Zitat Kalpakjian S, Schmid S (2006) Manufacturing engineering and technology, 5th edn. Prentice Hall, Upper Saddle River Kalpakjian S, Schmid S (2006) Manufacturing engineering and technology, 5th edn. Prentice Hall, Upper Saddle River
16.
Zurück zum Zitat Katsikeas S, Fysarakis K, Miaoudakis A, Van Bemten A, Askoxylakis I, Papaefstathiou I, Plemenos A (2017) Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol. In: 2017 IEEE Symposium on Computers and Communications (ISCC), July 2017. IEEE, pp 1193–1200 Katsikeas S, Fysarakis K, Miaoudakis A, Van Bemten A, Askoxylakis I, Papaefstathiou I, Plemenos A (2017) Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol. In: 2017 IEEE Symposium on Computers and Communications (ISCC), July 2017. IEEE, pp 1193–1200
17.
Zurück zum Zitat Khalili A, Sami A (2015) SysDetect: a systematic approach to critical state determination for industrial intrusion detection systems using Apriori algorithm. J Process Control 32:154–160CrossRef Khalili A, Sami A (2015) SysDetect: a systematic approach to critical state determination for industrial intrusion detection systems using Apriori algorithm. J Process Control 32:154–160CrossRef
18.
Zurück zum Zitat Kim D, Yang H, Chung M, Cho S (2017) Squeezed convolutional variational autoEncoder for unsupervised anomaly detection in edge device industrial Internet of Things, Dec 2017. arXiv:1712.06343v1 Kim D, Yang H, Chung M, Cho S (2017) Squeezed convolutional variational autoEncoder for unsupervised anomaly detection in edge device industrial Internet of Things, Dec 2017. arXiv:1712.06343v1
19.
Zurück zum Zitat Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur Priv Mag 9(3):49–51CrossRef Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur Priv Mag 9(3):49–51CrossRef
20.
Zurück zum Zitat Lee S-Y, Chung T-M (2017) A study on the fast system recovery: selecting the number of surrogate nodes for fast recovery in industrial IoT environment. In: 2017 International Conference on Information and Communications (ICIC), June 2017. IEEE, pp 205–207 Lee S-Y, Chung T-M (2017) A study on the fast system recovery: selecting the number of surrogate nodes for fast recovery in industrial IoT environment. In: 2017 International Conference on Information and Communications (ICIC), June 2017. IEEE, pp 205–207
21.
Zurück zum Zitat Lesjak C, Hein D, Winter J (2015) Hardware-security technologies for industrial IoT: TrustZone and security controller. In: IECON 2015 – 41st Annual Conference of the IEEE Industrial Electronics Society, Nov 2015. IEEE, pp 002589–002595 Lesjak C, Hein D, Winter J (2015) Hardware-security technologies for industrial IoT: TrustZone and security controller. In: IECON 2015 – 41st Annual Conference of the IEEE Industrial Electronics Society, Nov 2015. IEEE, pp 002589–002595
22.
Zurück zum Zitat Lesjak C, Druml N, Matischek R, Ruprechter T, Holweg G (2016) Security in industrial IoT – quo vadis? e & i Elektrotechnik und Informationstechnik 133(7):324–329CrossRef Lesjak C, Druml N, Matischek R, Ruprechter T, Holweg G (2016) Security in industrial IoT – quo vadis? e & i Elektrotechnik und Informationstechnik 133(7):324–329CrossRef
23.
Zurück zum Zitat Manzoor A (2016) Securing device connectivity in the industrial Internet of Things (IoT). Springer, Cham, pp 3–22 Manzoor A (2016) Securing device connectivity in the industrial Internet of Things (IoT). Springer, Cham, pp 3–22
24.
Zurück zum Zitat Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classifying RFID attacks and defenses. Inf Syst Front 12(5):491–505CrossRef Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classifying RFID attacks and defenses. Inf Syst Front 12(5):491–505CrossRef
25.
Zurück zum Zitat Mouratidis H, Diamantopoulou V (2018) A security analysis method for industrial Internet of Things. IEEE Trans Ind Inf 14(9):4093–4100CrossRef Mouratidis H, Diamantopoulou V (2018) A security analysis method for industrial Internet of Things. IEEE Trans Ind Inf 14(9):4093–4100CrossRef
26.
Zurück zum Zitat Pinto S, Gomes T, Pereira J, Cabral J, Tavares A (2017) IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput 21(1):40–47CrossRef Pinto S, Gomes T, Pereira J, Cabral J, Tavares A (2017) IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput 21(1):40–47CrossRef
27.
Zurück zum Zitat Pohl F, Schotten HD (2017) Secure and scalable remote access tunnels for the IIoT: an assessment of openVPN and IPsec performance. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), LNCS, vol 10465. Springer, Cham, pp 83–90 Pohl F, Schotten HD (2017) Secure and scalable remote access tunnels for the IIoT: an assessment of openVPN and IPsec performance. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), LNCS, vol 10465. Springer, Cham, pp 83–90
28.
Zurück zum Zitat Ponomarev S, Atkison T (2016) Industrial control system network intrusion detection by telemetry analysis. IEEE Trans Dependable Secure Comput 13(2):252–260CrossRef Ponomarev S, Atkison T (2016) Industrial control system network intrusion detection by telemetry analysis. IEEE Trans Dependable Secure Comput 13(2):252–260CrossRef
29.
Zurück zum Zitat Quarta D, Pogliani M, Polino M, Maggi F, Zanchettin AM, Zanero S (2017) An experimental security analysis of an industrial robot controller. In: 2017 IEEE Symposium on Security and Privacy (SP), May 2017. IEEE, pp 268–286 Quarta D, Pogliani M, Polino M, Maggi F, Zanchettin AM, Zanero S (2017) An experimental security analysis of an industrial robot controller. In: 2017 IEEE Symposium on Security and Privacy (SP), May 2017. IEEE, pp 268–286
30.
Zurück zum Zitat Sadeghi A-R, Wachsmann C, Waidner M (2015) Security and privacy challenges in industrial Internet of Things. In: Proceedings of the 52nd Annual Design Automation Conference on – DAC’15. ACM Press, New York, pp 1–6 Sadeghi A-R, Wachsmann C, Waidner M (2015) Security and privacy challenges in industrial Internet of Things. In: Proceedings of the 52nd Annual Design Automation Conference on – DAC’15. ACM Press, New York, pp 1–6
31.
Zurück zum Zitat Sharmeen S, Huda S, Abawajy JH, Ismail WN, Hassan MM (2018) Malware threats and detection for industrial mobile-IoT networks. IEEE Access 6:15941–15957CrossRef Sharmeen S, Huda S, Abawajy JH, Ismail WN, Hassan MM (2018) Malware threats and detection for industrial mobile-IoT networks. IEEE Access 6:15941–15957CrossRef
32.
Zurück zum Zitat Skwarek V (2017) Blockchains as security-enabler for industrial IoT-applications. Asia Pac J Innov Entrepreneurship 11(3):301–311CrossRef Skwarek V (2017) Blockchains as security-enabler for industrial IoT-applications. Asia Pac J Innov Entrepreneurship 11(3):301–311CrossRef
33.
Zurück zum Zitat Szymanski TH (2017) Strengthening security and privacy in an ultra-dense green 5G radio access network for the industrial and tactile Internet of Things. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), June 2017. IEEE, pp 415–422 Szymanski TH (2017) Strengthening security and privacy in an ultra-dense green 5G radio access network for the industrial and tactile Internet of Things. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), June 2017. IEEE, pp 415–422
34.
Zurück zum Zitat Thames L, Schaefer D (2017) Cybersecurity for industry 4.0. Springer, Cham Thames L, Schaefer D (2017) Cybersecurity for industry 4.0. Springer, Cham
35.
Zurück zum Zitat Ulltveit-Moe N, Nergaard H, Erdödi L, Gjøsæter T, Kolstad E, Berg P (2016) Secure information sharing in an industrial Internet of Things, Jan 2016 Ulltveit-Moe N, Nergaard H, Erdödi L, Gjøsæter T, Kolstad E, Berg P (2016) Secure information sharing in an industrial Internet of Things, Jan 2016
36.
Zurück zum Zitat Ulz T, Pieber T, Steger C, Haas S, Matischek R, Bock H (2017) Hardware-secured configuration and two-layer attestation architecture for smart sensors. In: 2017 Euromicro Conference on Digital System Design (DSD), Aug 2017. IEEE, pp 229–236 Ulz T, Pieber T, Steger C, Haas S, Matischek R, Bock H (2017) Hardware-secured configuration and two-layer attestation architecture for smart sensors. In: 2017 Euromicro Conference on Digital System Design (DSD), Aug 2017. IEEE, pp 229–236
37.
Zurück zum Zitat Urquhart L, McAuley D (2018) Avoiding the Internet of insecure industrial things. Comput Law Secur Rev 34(3):450–466CrossRef Urquhart L, McAuley D (2018) Avoiding the Internet of insecure industrial things. Comput Law Secur Rev 34(3):450–466CrossRef
38.
Zurück zum Zitat US Office of Technology Assessment (1984) Computerized manufacturing automation: employment, education, and the workplace. Washington, DC: U.S. Congress, Office of Technology Assessment, OTACIT-235 US Office of Technology Assessment (1984) Computerized manufacturing automation: employment, education, and the workplace. Washington, DC: U.S. Congress, Office of Technology Assessment, OTACIT-235
39.
Zurück zum Zitat van Lier B (2017) The industrial Internet of Things and cyber security: an ecological and systemic perspective on security in digital industrial ecosystems. In: 2017 21st International Conference on System Theory, Control and Computing (ICSTCC), Oct 2017. IEEE, pp 641–647 van Lier B (2017) The industrial Internet of Things and cyber security: an ecological and systemic perspective on security in digital industrial ecosystems. In: 2017 21st International Conference on System Theory, Control and Computing (ICSTCC), Oct 2017. IEEE, pp 641–647
40.
Zurück zum Zitat Wurm J, Hoang K, Arias O, Sadeghi A-R, Jin Y (2016) Security analysis on consumer and industrial IoT devices. In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Jan 2016. IEEE, pp 519–524 Wurm J, Hoang K, Arias O, Sadeghi A-R, Jin Y (2016) Security analysis on consumer and industrial IoT devices. In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Jan 2016. IEEE, pp 519–524
41.
Zurück zum Zitat Xie C, Deng S-T (2017) Research and application of security and privacy in industrial Internet of Things based on fingerprint encryption. Springer, Cham, pp 102–110 Xie C, Deng S-T (2017) Research and application of security and privacy in industrial Internet of Things based on fingerprint encryption. Springer, Cham, pp 102–110
42.
Zurück zum Zitat Yan Q, Huang W, Luo X, Gong Q, Richard Yu F (2018) A multi-level DDoS mitigation framework for the industrial Internet of Things. IEEE Commun Mag 56(2):30–36CrossRef Yan Q, Huang W, Luo X, Gong Q, Richard Yu F (2018) A multi-level DDoS mitigation framework for the industrial Internet of Things. IEEE Commun Mag 56(2):30–36CrossRef
Metadaten
Titel
Towards a Secure Industrial Internet of Things
verfasst von
Georgios Spathoulas
Sokratis Katsikas
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-12330-7_2