skip to main content
10.1145/3444370.3444620acmotherconferencesArticle/Chapter ViewAbstractPublication PagesciatConference Proceedingsconference-collections
research-article

Towards Evolving Security Requirements of Industrial Internet: A Layered Security Architecture Solution based on Data transfer Techniques

Published: 04 January 2021 Publication History

Abstract

Industrial Internet has been incrementally established in recent years to support smart manufacturing, which involves a collection of technology and value chain organization concepts. Along with the continuous development of the industrial Internet, an increasing number of threats have been exposed. In particular, the integration of traditional industrial settings and industrial Internet platforms leads to incompatible security countermeasures, making the industrial Internet vulnerable. This article comprehensively and deeply investigates the security challenges of the current industry Internet based on relevant research studies and realistic security scenarios. In response to our identified security challenges, we propose a data security transfer architecture solution for industrial platforms. Specifically, our proposal contains seven sub-modules, which enhances the industrial cloud platform with secure data security transfer technology to protect industrial data when it is connected to the cloud platforms and industrial equipment. To evaluate the utility of our proposal, we have specialized our security architecture solution to a realistic case of the industrial Internet.

References

[1]
Hugh Boyes, Bil Hallaq, Joe Cunningham, and Tim Watson. 2018. The industrial internet of things (IIoT): An analysis framework. Computers in industry101(2018), 1--12.
[2]
Mario Hermann, Tobias Pentek, and Boris Otto. 2016. Design principles for industrie 4.0 scenarios. In2016 49th Hawaii international conference on system sciences (HICSS). IEEE, 3928--3937.
[3]
Jessica Leber. 2012. General Electric's San Ramon Software Center Takes Shape MIT Technology Review. Available: Technology review.com (2012).
[4]
David Floyer. 2013. Defining and sizing the industrial Internet. Wikibon, Marl-borough, MA, USA (2013).
[5]
Xiao Yongtian Zhang Jun. 2005. A Research and Implementation on the ViGap System Based on Memory Exchange [J]. Computer Engineering and Applications36 (2005).
[6]
Zhou Jianming, Wu Chenlong, and Dai Xinyu. 2019. Design and Implementation of Cross-Network Data Exchange System for Public Security. Public Security in China (Academic edition)02 (2019), 81--84.
[7]
Wang Bo and li Xing hua. 2019.Design and implementation of net gap system for physical isolation. Master's thesis. Xidian University.
[8]
Liu Chunyan. 2006. Elementary introduction on how to reserve and resume the data of the switch board. Journal of Chongqing University of Posts and Telecommunications (Natural Science) (2006), S1.
[9]
Gao Xiangyang, Xu Jun, Lv Ming, and Zhang Jie. 2020. safe forwarding design of U-disk ferry with physical isolation of intranet and external network. Microcontrollers & Embedded Systems1 (2020).
[10]
Wang Tongyang, Yu Pengfei, Wu Junjun, and Zhang Xinfang. 2010. Application research on data ferrying in secure portable storage. Computer Engineering and Applications46, 28 (2010), 144.
[11]
Guo Xueqing, Yang Yuanyuan, and Xiao Fei. 2010. Resolve Project of Network Information Ferry Based on Physical Isolate Technology. Chinese Medical Equipment Journal31, 6 (2010), 41--42.
[12]
Kai Zhao and Lina Ge. 2013. A survey on the internet of things security. In2013 Ninth international conference on computational intelligence and security. IEEE, 663--667.
[13]
M Waidner, M Kasper, T Henkel, C Rudolph, and O Küch. 2013. Eberbacher Gespräch zu" Sicherheit in der Industrie 4.0. In SIT.
[14]
Amin Hassanzadeh, Shimon Modi, and Shaan Mulchandani. 2015. Towards effective security control assignment in the Industrial Internet of Things. In2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 795--800.
[15]
Kevin Poulsen. 2003. Slammer worm crashed Ohio nuke plant net. The Register20 (2003).
[16]
Elias Levy. 2003. Crossover: online pests plaguing the off line world. IEEE Security & Privacy1, 6 (2003), 71--73.
[17]
Jaikumar Vijayan. 2010. Stuxnet renews power grid security concerns. Computerworld26 (2010).
[18]
Alberto Garcia Illera and Javier Vazquez Vidal. 2014. Lights off! The darkness of the smart meters. Black Hat Europe (2014).
[19]
Grant Hernandez, Orlando Arias, Daniel Buentello, and Yier Jin. 2014. Smartnest thermostat: A smart spy in your home. Black Hat USA2015 (2014).
[20]
Henning Kagermann, Wolfgang Wahlster, and Johannes Helbig. 2013. Securing the future of German manufacturing industry. Recommendations for implementing the strategic initiative INDUSTRIE4, 199 (2013), 14.
[21]
Saman Zonouz, Julian Rrushi, and Stephen McLaughlin. 2014. Detecting industrial control malware using automated PLC code analytics. IEEE Security & Privacy 12, 6 (2014), 40--47.
[22]
Sujit Rokka Chhetri, Nafiul Rashid, Sina Faezi, and Mohammad Abdullah Al Faruque. 2017. Security trends and advances in manufacturing systems in the era of industry 4.0. In2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 1039--1046
[23]
Nils Ulltveit-Moe, Henrik Nergaard, L'aszl'o Erdödi, Terje Gjøsæter, Erland Kolstad, and Pål Berg. 2016. Secure information sharing in an industrial Internet of Things. arXiv preprint arXiv:1601.04301(2016).
[24]
T Pereira, L Barreto, and A Amaral. 2017. Network and information security challenges within Industry 4.0 paradigm. Procedia manufacturing 13 (2017), 1253--1260.
[25]
Miklos Kiss, Gabor Breda, and Lajos Muha. 2019. Information security aspects of Industry 4.0 Procedia manufacturing 32 (2019), 848--855.
[26]
R Velumadhava Rao and K Selvamani. 2015. Data security challenges and its solutions in cloud computing. Procedia Computer Science 48 (2015), 204--209.
[27]
Wang Chao. 2020. Strengthening the cyber security of critical information infrastructure is an urgent task. Cyber space security 9, 6 (2020), 1.
[28]
TD Maiziere. 2014. Die lage der it-sicherheit in deutschland 2014. Bundesamtfür Sicherheit in der Information stechnik (2014).
[29]
Zhang Jianian. 2018. The Research of the Fusion between Security Intelligence and Strategic Resilience from the View of State Security: Lessons from the Stuxnet Attack against Iranian Nuclear Facilities. Journal of Intelligence 37, 2 (2018).
[30]
Eric Amankwa, Marianne Loock, and Elmarie Kritzinger. 2014. A conceptual analysis of information security education, information security training and information security awareness definitions. In The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014). IEEE, 248--252.
[31]
Jia Tongkai. 2014. Internal and external network physical isolation is mainly used in the enterprise. Network Security Technology & Application5 (2014), 122.
[32]
Alliance of Industrial Internet. 2017. White book on Industrial Internet platform. Technical Report. Beijing: China Academy of Information and Communications Technology.

Cited By

View all
  • (2022)Machine Learning Algorithms and Frameworks in Ransomware DetectionIEEE Access10.1109/ACCESS.2022.321877910(117597-117610)Online publication date: 2022
  • (2021)NSGA-II-Based Granularity-Adaptive Control-Flow AttestationSecurity and Communication Networks10.1155/2021/29141922021Online publication date: 1-Jan-2021

Index Terms

  1. Towards Evolving Security Requirements of Industrial Internet: A Layered Security Architecture Solution based on Data transfer Techniques

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CIAT 2020: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
    December 2020
    597 pages
    ISBN:9781450387828
    DOI:10.1145/3444370
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Sun Yat-Sen University
    • CARLETON UNIVERSITY: INSTITUTE FOR INTERDISCIPLINARY STUDIES
    • Beijing University of Posts and Telecommunications
    • Guangdong University of Technology: Guangdong University of Technology
    • Deakin University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 January 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Industrial Internet
    2. Industrial data security
    3. Industrial safety issues

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CIAT 2020

    Acceptance Rates

    CIAT 2020 Paper Acceptance Rate 94 of 232 submissions, 41%;
    Overall Acceptance Rate 94 of 232 submissions, 41%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)27
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Machine Learning Algorithms and Frameworks in Ransomware DetectionIEEE Access10.1109/ACCESS.2022.321877910(117597-117610)Online publication date: 2022
    • (2021)NSGA-II-Based Granularity-Adaptive Control-Flow AttestationSecurity and Communication Networks10.1155/2021/29141922021Online publication date: 1-Jan-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media