Abstract
The Industrial Internet of Things (IIoT), being one of the underlying and enabling technologies of the Industry 4.0 initiative, brings about expectations for unprecedented value creation opportunities in industry. Unfortunately, these do not come without a price; in this case the price to pay is the increased vulnerabilities, the increased threats and the increased attack surface that result when industrial systems originally designed with little or no cybersecurity in mind connect to the Internet. Consequently, the cybersecurity of the IIoT becomes of paramount importance. Research has started focusing on this area, as well as on the related areas of cyber-physical systems security and industrial network security, but a multitude of issues still remain to be addressed. In this chapter, we review recent research results in the area of IIoT security, with an eye towards identifying trends on one hand and areas where research seems to lag behind on the other, by classifying research results using the security lifecycle model of the National Institute of Standards and Technology (NIST) framework for improving the cybersecurity of critical infrastructures.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Alcaraz C (2017) Resilient industrial control systems based on multiple redundancy. Int J Crit Infrastruct (IJCIS) 13(2/3):278–2951
Alcaraz C (2018) Cloud-assisted dynamic resilience for cyber-physical control systems. IEEE Wirel Commun 25(1):76–82
Alcaraz C, Lopez J (2017) Secure interoperability in cyber-physical systems. In: Ferrag MA, Ahmim A (eds) Security solutions and applied cryptography in smart grid communications. IGI Global, Hershey, pp 137–158
Alcaraz C, Lopez J (2018) A cyber-physical systems-based checkpoint model for structural controllability. IEEE Syst J 12:1–12
Alcaraz C, Roman R, Najera P, Lopez J (2013) Security of industrial sensor network-based remote substations in the context of the Internet of Things. Ad Hoc Netw 11(3):1091–1104
Bakhshi Z, Balador A, Mustafa J (2018) Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models. In: 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Apr 2018. IEEE, pp 173–178
Barrett MP (2018) Framework for improving critical infrastructure cybersecurity version 1.1. Technical report
Caselli M, Zambon E, Kargl F (2015) Sequence-aware intrusion detection in industrial control systems. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security – CPSS’15. ACM Press, New York, pp 13–24
Choi J, Shin Y, Cho S (2018) Study on information security sharing system among the industrial IoT service and product provider. In: 2018 International Conference on Information Networking (ICOIN), Jan 2018. IEEE, pp 551–555
Esfahani A, Mantas G, Matischek R, Saghezchi FB, Rodriguez J, Bicaku A, Maksuti S, Tauber M, Schmittner C, Bastos J (2017) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J 6(1):288–296
Gill H (2008) From vision to reality: cyber-physical systems. In: HCSS national workshop on new research directions for high confidence transportation CPS: automotive, aviation, and rail
Hassanzadeh A, Modi S, Mulchandani S (2015) Towards effective security control assignment in the industrial Internet of things. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Dec 2015. IEEE, pp 795–800
He D, Ma M, Zeadall S, Kumar N, Liang K (2017) Certificateless public key authenticated encryption with keyword search for industrial Internet of Things. IEEE Trans Ind Inf 14(8):3618–3627
Jeschke S, Brecher C, Meisen T, Özdemir D, Eschert T (2017) Industrial Internet of things and cyber manufacturing systems. In: Jeschke S, Brecher C, Song H, Rawat D (eds) Industrial Internet of Things. Springer, Cham, pp 3–19
Kalpakjian S, Schmid S (2006) Manufacturing engineering and technology, 5th edn. Prentice Hall, Upper Saddle River
Katsikeas S, Fysarakis K, Miaoudakis A, Van Bemten A, Askoxylakis I, Papaefstathiou I, Plemenos A (2017) Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol. In: 2017 IEEE Symposium on Computers and Communications (ISCC), July 2017. IEEE, pp 1193–1200
Khalili A, Sami A (2015) SysDetect: a systematic approach to critical state determination for industrial intrusion detection systems using Apriori algorithm. J Process Control 32:154–160
Kim D, Yang H, Chung M, Cho S (2017) Squeezed convolutional variational autoEncoder for unsupervised anomaly detection in edge device industrial Internet of Things, Dec 2017. arXiv:1712.06343v1
Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur Priv Mag 9(3):49–51
Lee S-Y, Chung T-M (2017) A study on the fast system recovery: selecting the number of surrogate nodes for fast recovery in industrial IoT environment. In: 2017 International Conference on Information and Communications (ICIC), June 2017. IEEE, pp 205–207
Lesjak C, Hein D, Winter J (2015) Hardware-security technologies for industrial IoT: TrustZone and security controller. In: IECON 2015 – 41st Annual Conference of the IEEE Industrial Electronics Society, Nov 2015. IEEE, pp 002589–002595
Lesjak C, Druml N, Matischek R, Ruprechter T, Holweg G (2016) Security in industrial IoT – quo vadis? e & i Elektrotechnik und Informationstechnik 133(7):324–329
Manzoor A (2016) Securing device connectivity in the industrial Internet of Things (IoT). Springer, Cham, pp 3–22
Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classifying RFID attacks and defenses. Inf Syst Front 12(5):491–505
Mouratidis H, Diamantopoulou V (2018) A security analysis method for industrial Internet of Things. IEEE Trans Ind Inf 14(9):4093–4100
Pinto S, Gomes T, Pereira J, Cabral J, Tavares A (2017) IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput 21(1):40–47
Pohl F, Schotten HD (2017) Secure and scalable remote access tunnels for the IIoT: an assessment of openVPN and IPsec performance. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), LNCS, vol 10465. Springer, Cham, pp 83–90
Ponomarev S, Atkison T (2016) Industrial control system network intrusion detection by telemetry analysis. IEEE Trans Dependable Secure Comput 13(2):252–260
Quarta D, Pogliani M, Polino M, Maggi F, Zanchettin AM, Zanero S (2017) An experimental security analysis of an industrial robot controller. In: 2017 IEEE Symposium on Security and Privacy (SP), May 2017. IEEE, pp 268–286
Sadeghi A-R, Wachsmann C, Waidner M (2015) Security and privacy challenges in industrial Internet of Things. In: Proceedings of the 52nd Annual Design Automation Conference on – DAC’15. ACM Press, New York, pp 1–6
Sharmeen S, Huda S, Abawajy JH, Ismail WN, Hassan MM (2018) Malware threats and detection for industrial mobile-IoT networks. IEEE Access 6:15941–15957
Skwarek V (2017) Blockchains as security-enabler for industrial IoT-applications. Asia Pac J Innov Entrepreneurship 11(3):301–311
Szymanski TH (2017) Strengthening security and privacy in an ultra-dense green 5G radio access network for the industrial and tactile Internet of Things. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), June 2017. IEEE, pp 415–422
Thames L, Schaefer D (2017) Cybersecurity for industry 4.0. Springer, Cham
Ulltveit-Moe N, Nergaard H, Erdödi L, Gjøsæter T, Kolstad E, Berg P (2016) Secure information sharing in an industrial Internet of Things, Jan 2016
Ulz T, Pieber T, Steger C, Haas S, Matischek R, Bock H (2017) Hardware-secured configuration and two-layer attestation architecture for smart sensors. In: 2017 Euromicro Conference on Digital System Design (DSD), Aug 2017. IEEE, pp 229–236
Urquhart L, McAuley D (2018) Avoiding the Internet of insecure industrial things. Comput Law Secur Rev 34(3):450–466
US Office of Technology Assessment (1984) Computerized manufacturing automation: employment, education, and the workplace. Washington, DC: U.S. Congress, Office of Technology Assessment, OTACIT-235
van Lier B (2017) The industrial Internet of Things and cyber security: an ecological and systemic perspective on security in digital industrial ecosystems. In: 2017 21st International Conference on System Theory, Control and Computing (ICSTCC), Oct 2017. IEEE, pp 641–647
Wurm J, Hoang K, Arias O, Sadeghi A-R, Jin Y (2016) Security analysis on consumer and industrial IoT devices. In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Jan 2016. IEEE, pp 519–524
Xie C, Deng S-T (2017) Research and application of security and privacy in industrial Internet of Things based on fingerprint encryption. Springer, Cham, pp 102–110
Yan Q, Huang W, Luo X, Gong Q, Richard Yu F (2018) A multi-level DDoS mitigation framework for the industrial Internet of Things. IEEE Commun Mag 56(2):30–36
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Spathoulas, G., Katsikas, S. (2019). Towards a Secure Industrial Internet of Things. In: Alcaraz, C. (eds) Security and Privacy Trends in the Industrial Internet of Things. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-12330-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-12330-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12329-1
Online ISBN: 978-3-030-12330-7
eBook Packages: Computer ScienceComputer Science (R0)