skip to main content
10.1145/3551504.3551546acmotherconferencesArticle/Chapter ViewAbstractPublication PagesceeegovConference Proceedingsconference-collections
research-article

Industry 4.0-based critical infrastructure and the NIS Directive

Authors Info & Claims
Published:25 October 2022Publication History

ABSTRACT

Industrial automatization and robotization make the manufacturing and all industrial processes more effective and robust. Industrial control systems consist of many specific computer-based elements, behaving somewhat differently than business IT. They can be used in many sectors and, from the regulatory aspect, might be controlled by more EU regulations. The NIS Directive currently has the base role of prescribing the obligation for Member States to address cybersecurity issues. However, in spite of security controls, threat actors try to compromise ICT services and infrastructure, causing confidentiality, integrity, or availability-related security incidents. These attacks may cause not only financial loss but also more complex effects may arise, as analyzed in the paper.

References

  1. F. Webster, “What information society?,” Information Society, 1994, doi: 10.1080/01972243.1994.9960154.Google ScholarGoogle ScholarCross RefCross Ref
  2. European Union, “Information society.” https://eur-lex.europa.eu/summary/glossary/information_society.html (accessed Dec. 09, 2020).Google ScholarGoogle Scholar
  3. D. T. Kuehl, “From Cyberspace to Cyberpower: Defining the Problem,” in Cyberpower and National Security, Potomac Books and National Defense Univerity, 2009, pp. 24–42. doi: 10.2307/j.ctt1djmhj1.7.Google ScholarGoogle ScholarCross RefCross Ref
  4. M. Ryba, “The role of ICT components in the functioning of critical infrastructure,” in Critical Infrastructure Security - the ICT Dimension, J. Świątkowska, Ed. Kraków: The Kosciuszko Institute, 2014, pp. 59–62.Google ScholarGoogle Scholar
  5. M. Lom and O. Pribyl, “Smart city model based on systems theory,” International Journal of Information Management, 2020, doi: 10.1016/j.ijinfomgt.2020.102092.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. V. Roblek, M. Meško, and A. Krapež, “A Complex View of Industry 4.0,” SAGE Open, vol. 6, no. 2, 2016, doi: 10.1177/2158244016653987.Google ScholarGoogle ScholarCross RefCross Ref
  7. K. Shirase and K. Nakamoto, “Simulation technologies for the development of an autonomous and intelligent machine tool,” International Journal of Automation Technology, vol. 7, no. 1, 2013, doi: 10.20965/ijat.2013.p0006.Google ScholarGoogle ScholarCross RefCross Ref
  8. K. D. Thoben, S. A. Wiesner, and T. Wuest, “‘Industrie 4.0’ and smart manufacturing-a review of research issues and application examples,” International Journal of Automation Technology, vol. 11, no. 1. 2017. doi: 10.20965/ijat.2017.p0004.Google ScholarGoogle ScholarCross RefCross Ref
  9. L. Monostori , “Cyber-physical systems in manufacturing,” CIRP Annals, vol. 65, no. 2, 2016, doi: 10.1016/j.cirp.2016.06.005.Google ScholarGoogle ScholarCross RefCross Ref
  10. P. Ackerman, Industrial Cybersecurity, no. 11. 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union. 2016, p. 1. [Online]. Available: http://data.europa.eu/eli/dir/2016/1148/ojGoogle ScholarGoogle Scholar
  12. V. Alcácer and V. Cruz-Machado, “Scanning the Industry 4.0: A Literature Review on Technologies for Manufacturing Systems,” Engineering Science and Technology, an International Journal, vol. 22, no. 3, pp. 899–919, Jun. 2019, doi: 10.1016/j.jestch.2019.01.006.Google ScholarGoogle ScholarCross RefCross Ref
  13. Y. Lu, “Industry 4.0: A survey on technologies, applications and open research issues,” J Ind Inf Integr, vol. 6, pp. 1–10, Jun. 2017, doi: 10.1016/j.jii.2017.04.005.Google ScholarGoogle ScholarCross RefCross Ref
  14. A. Ustundag and E. Cevikcan, Industry 4.0: Managing The Digital Transformation. Cham: Springer International Publishing, 2018. doi: 10.1007/978-3-319-57870-5.Google ScholarGoogle ScholarCross RefCross Ref
  15. D. P. Perales, F. A. Valero, and A. B. García, “Industry 4.0: A Classification Scheme,” 2018, pp. 343–350. doi: 10.1007/978-3-319-58409-6_38.Google ScholarGoogle ScholarCross RefCross Ref
  16. T. Usländer and C. Thomalla, “Risks of industrie 4.0 - An information technology perspective,” 2016.Google ScholarGoogle Scholar
  17. Y. Lu, “Industry 4.0: A survey on technologies, applications and open research issues,” Journal of Industrial Information Integration, vol. 6. 2017. doi: 10.1016/j.jii.2017.04.005.Google ScholarGoogle ScholarCross RefCross Ref
  18. E. Knapp, Industrial network security: Securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems. 2011. doi: 10.1016/B978-1-59749-645-2.00024-0.Google ScholarGoogle ScholarCross RefCross Ref
  19. A. K. Majumdar, Optical wireless communications for broadband global internet connectivity: Fundamentals and potential applications. 2018. doi: 10.1016/C2016-0-02116-2.Google ScholarGoogle ScholarCross RefCross Ref
  20. H. Boyes, B. Hallaq, J. Cunningham, and T. Watson, “The industrial internet of things (IIoT): An analysis framework,” Computers in Industry, vol. 101, 2018, doi: 10.1016/j.compind.2018.04.015.Google ScholarGoogle ScholarCross RefCross Ref
  21. M. Resman, M. Pipan, M. Šimic, and N. Herakovič, “A new architecture model for smart manufacturing: A performance analysis and comparison with the RAMI 4.0 reference model,” Advances in Production Engineering And Management, vol. 14, no. 2, 2019, doi: 10.14743/apem2019.2.318.Google ScholarGoogle ScholarCross RefCross Ref
  22. B. Lydon, “RAMI 4.0 reference architectural model for Industrie 4.0,” InTech, vol. 66, no. 2, 2019.Google ScholarGoogle Scholar
  23. B. Karabacak, S. O. Yildirim, and N. Baykal, “A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness,” International Journal of Critical Infrastructure Protection, vol. 15, 2016, doi: 10.1016/j.ijcip.2016.10.001.Google ScholarGoogle ScholarCross RefCross Ref
  24. Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. 2008, p. 75. [Online]. Available: http://data.europa.eu/eli/dir/2008/114/ojGoogle ScholarGoogle Scholar
  25. S. Kumar, A. K. Singh, and M. A. Kalam, “Intelligent electronic device functionality and interfacing: An experimental examination of smart grid,” International Journal of Recent Technology and Engineering, vol. 8, no. 2 Special Issue 11, 2019, doi: 10.35940/ijrte.B1523.0982S1119.Google ScholarGoogle ScholarCross RefCross Ref
  26. M. Ghobakhloo and M. Fathi, “Industry 4.0 and opportunities for energy sustainability,” Journal of Cleaner Production, vol. 295, 2021, doi: 10.1016/j.jclepro.2021.126427.Google ScholarGoogle ScholarCross RefCross Ref
  27. M. O. Alabi, A. Telukdarie, and N. J. van Rensburg, “Water 4.0: An Integrated Business Model from an Industry 4.0 Approach,” 2019. doi: 10.1109/IEEM44572.2019.8978859.Google ScholarGoogle ScholarCross RefCross Ref
  28. L. Barreto, A. Amaral, and T. Pereira, “Industry 4.0 implications in logistics: an overview,” Procedia Manufacturing, vol. 13, 2017, doi: 10.1016/j.promfg.2017.09.045.Google ScholarGoogle ScholarCross RefCross Ref
  29. B. Mekinjić, “THE IMPACT OF INDUSTRY 4.0 ON THE TRANSFORMATION OF THE BANKING SECTOR,” JOURNAL OF CONTEMPORARY ECONOMICS, vol. 1, no. 1, 2019, doi: 10.7251/joce1901006m.Google ScholarGoogle ScholarCross RefCross Ref
  30. J. Al-Jaroodi, N. Mohamed, and E. Abukhousa, “Health 4.0: On the Way to Realizing the Healthcare of the Future,” IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.3038858.Google ScholarGoogle ScholarCross RefCross Ref
  31. H. Misra, “Analogue to Digital with Exchange 4.0.” https://www.hedgethink.com/analogue-digital-exchange-4-0/ (accessed Mar. 12, 2022).Google ScholarGoogle Scholar
  32. Regulation (EU) No 910/2014 of the European Parliament and the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC. 2014, p. 73. [Online]. Available: http://data.europa.eu/eli/reg/2014/910/ojGoogle ScholarGoogle Scholar
  33. Directive (EU) 2015/2366. 2015, p. 35. [Online]. Available: http://data.europa.eu/eli/dir/2015/2366/ojGoogle ScholarGoogle Scholar
  34. Regulation (EU) 2016/679. 2016, p. 1. [Online]. Available: http://data.europa.eu/eli/reg/2016/679/ojGoogle ScholarGoogle Scholar
  35. Z. Bederna and Z. Rajnai, “Analysis of the cybersecurity ecosystem in the European Union,” International Cybersecurity Law Review, vol. 3, pp. 35–49, 2022, doi: 10.1365/s43439-022-00048-9.Google ScholarGoogle ScholarCross RefCross Ref
  36. ENISA, “Industry 4.0 cybersecurity: Challanges & Recommendations,” 2019.Google ScholarGoogle Scholar
  37. C. Kohler, “The EU Cybersecurity Act and European standards: an introduction to the role of European standardization,” International Cybersecurity Law Review, vol. 1, no. 1–2, pp. 7–12, Oct. 2020, doi: 10.1365/s43439-020-00008-1.Google ScholarGoogle ScholarCross RefCross Ref
  38. D. Rehak and M. Hromada, “Failures in a Critical Infrastructure System,” in System of System Failures, 2018. doi: 10.5772/intechopen.70446.Google ScholarGoogle ScholarCross RefCross Ref
  39. S. M. Rinaldi, J. P. Peerenboom, and T. K. Kelly, “Identifying, understanding, and analyzing critical infrastructure interdependencies,” IEEE Control Systems Magazine, 2001, doi: 10.1109/37.969131.Google ScholarGoogle ScholarCross RefCross Ref
  40. R. von Roessing, “The ISACA Business Model for Information Security: An Integrative and Innovative Approach,” in ISSE 2009 Securing Electronic Business Processes, P. N., R. H., and S. W., Eds. Vieweg+Teubner, 2010. doi: 10.1007/978-3-8348-9363-5_4.Google ScholarGoogle ScholarCross RefCross Ref
  41. S. Prawesh, K. Chari, and M. Agrawal, “Industry Norms as Predictors of IT Outsourcing Behaviors,” International Journal of Information Management, 2021, doi: 10.1016/j.ijinfomgt.2020.102242.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. S. Y. Ponomarov and M. C. Holcomb, “Understanding the concept of supply chain resilience,” The International Journal of Logistics Management, 2009, doi: 10.1108/09574090910954873.Google ScholarGoogle ScholarCross RefCross Ref
  43. Z. Bederna and T. Szadeczky, “Cyber espionage through Botnets,” Security Journal, vol. 33, pp. 43–62, 2019, doi: 10.1057/s41284-019-00194-6.Google ScholarGoogle ScholarCross RefCross Ref
  44. Z. Bederna and T. Szádeczky, “Effects of botnets – a human-organisational approach,” Security and Defence Quarterly, 2021, doi: 10.35467/sdq/138588.Google ScholarGoogle ScholarCross RefCross Ref
  45. IBM, “X-Force Threat Intelligence Index 2022,” Feb. 2022. https://www.ibm.com/downloads/cas/ADLMYLAZ (accessed Mar. 12, 2022).Google ScholarGoogle Scholar
  46. Z. Bederna, Z. Rajnai, and T. Szadeczky, “Attacks against energy, water and other critical infrastructure in the EU,” 2020. doi: 10.1109/CANDO-EPE51100.2020.9337751.Google ScholarGoogle ScholarCross RefCross Ref
  47. A. Teixeira, F. Kupzog, H. Sandberg, and K. H. Johansson, “Cyber-Secure and Resilient Architectures for Industrial Control Systems,” in Smart Grid Security: Innovative Solutions for a Modernized Grid, 2015. doi: 10.1016/B978-0-12-802122-4.00006-7.Google ScholarGoogle ScholarCross RefCross Ref
  48. G. McDonald, L. O. Murchu, S. Doherty, and E. Chien, “Stuxnet 0.5: The Missing Link,” Feb. 26, 2013. https://docs.broadcom.com/doc/stuxnet-missing-link-13-en (accessed Mar. 13, 2022).Google ScholarGoogle Scholar
  49. M. F. P. Services and M. Labs, “Global Energy Cyberattacks: ‘Night Dragon,’” 2011. https://securingtomorrow.mcafee.com/wp-content/uploads/2011/02/McAfee_NightDragon_wp_draft_to_customersv1-1.pdf (accessed Oct. 02, 2019).Google ScholarGoogle Scholar
  50. W. Ashford, “Exxon, Shell, BP hacked in Night Dragon attacks,” ComputerWeekly.com, 2011.Google ScholarGoogle Scholar
  51. Symantec, “Emerging Threat: Dragonfly / Energetic Bear – APT Group,” 2013. https://www.symantec.com/connect/blogs/emerging-threat-dragonfly-energetic-bear-apt-group (accessed Oct. 03, 2019).Google ScholarGoogle Scholar
  52. E-ISAC, “Analysis of the Cyber Attack on the Ukrainian Power Grid,” 2016.Google ScholarGoogle Scholar
  53. S. Y. Pickering and P. B. Davies, “Cyber Security of Nuclear Power Plants: US and Global Perspectives,” Georgetown Journal of International Affairs, Jan. 22, 2021. https://gjia.georgetown.edu/2021/01/22/cyber-security-of-nuclear-power-plants-us-and-global-perspectives/ (accessed Jun. 01, 2022).Google ScholarGoogle Scholar
  54. N. Newman, “Cyber pirates terrorising the high seas,” E&T., Apr. 18, 2019.Google ScholarGoogle Scholar
  55. ENISA, “WannaCry Ransomware Outburst,” 2017. https://www.enisa.europa.eu/publications/info-notes/wannacry-ransomware-outburst (accessed Oct. 03, 2019).Google ScholarGoogle Scholar
  56. N. A. Office, “Investigation: WannaCry cyber attack and the NHS,” 2017. https://www.nao.org.uk/wp-content/uploads/2017/10/Investigation-WannaCry-cyber-attack-and-the-NHS.pdf (accessed Mar. 15, 2019).Google ScholarGoogle Scholar
  57. ZDNet, “First death reported following a ransomware attack on a German hospital,” Sep. 17, 2020.Google ScholarGoogle Scholar
  58. M. Antonakakis , “Understanding the Mirai Botnet,” USENIX Security, 2017, doi: 10.1016/j.religion.2008.12.001.Google ScholarGoogle ScholarCross RefCross Ref
  59. Waldrappteam, “IMPEL Water Crimes Workshop,” Accessed July, vol. 29, p. 2019, 2018, [Online]. Available: http://waldrapp.eu/science/conference-crete-2018/wp-content/uploads/2018/11/2018-Water-Crimes-Workshop-Report.pdfGoogle ScholarGoogle Scholar

Index Terms

  1. Industry 4.0-based critical infrastructure and the NIS Directive

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        CEEeGov '22: Proceedings of the Central and Eastern European eDem and eGov Days
        September 2022
        192 pages
        ISBN:9781450397667
        DOI:10.1145/3551504

        Copyright © 2022 Owner/Author

        This work is licensed under a Creative Commons Attribution International 4.0 License.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 October 2022

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format