Abstract
This paper presents the issues of cybersecurity of the industrial internet of things as the main driver for the development of Enterprise 4.0, compared with the staged protection approach used in automated process control systems. Threat classes relevant to the industrial internet of things are presented. Based on the analysis, requirements are put forward for designing an architecture of the industrial internet of things resistant to network threats, as well as an approach to the implementation of this architecture based on control and communications stability.
Similar content being viewed by others
REFERENCES
Stouffer, K., Pillitteri, V., and Lightman, S., Guide to industrial control systems (ICS) security, NIST Special Publication 800–82 rev. 2, 2015.
Vasil'ev, Yu.S., Zegzhda, P.D., and Zegzhda, D.P., Ensuring the safety of automated process control systems at hydropower facilities, Izv. Ross. Akad. Nauk, Energetika, 2016, no. 3, pp. 49–61.
Voas, J., Network of “Things,” NIST Special Publication 800–183, 2016.
Zegzhda, D.P., Moskvin, D.A., and Dakhnovich, A.D., Analysis of threats to information security in digital production networks, Probl. Inf. Bezop., Komp’yut. Sist., 2017, no. 4, pp. 41–46.
Vasil'ev, Yu.S., Zegzhda, D.P., and Poltavtseva, M.A., Problems of security in digital production and its resistance to cyber threats, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1090–1100.
Ross, M., Hannes, T., and Jara, A., Baseline security recommendations for IoT in the context of Critical Information Infrastructures, 2017. https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot/at_download/fullReport. Accessed January 21, 2019.
Lin, S., Crawford, M., and Mellor, S., The Industrial Internet of Things Volume G1: Reference Architecture. https://www.iiconsortium.org/IIC_PUB_G1_V1.80_2017-01-31.pdf. Accessed February 19, 2019.
Ulltveit-Moe, N., Nergaard, H., Erdodi, L., Gjøsæter, T., Kolstad, E., and Berg, P., Secure Information Sharing in an Industrial Internet of Things, University of Agder, 2016.
Positive Research 2018. Collection of studies on practical safety. 2018. https://www.ptsecurity.com/upload/corporate/ru-ru/analytics/Positive-Research-2018-rus.pdf. Accessed January 21, 2019.
Dakhnovich, A.D., Zegzhda, D.P., and Moskvin, D.A., Applying garlic routing to guarantee secure collaboration of segments in a digital manufacturing network, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1127–1133.
Stepanova, T.V., Zegzhda, D.P., Vasil’ev, Yu.S., and Zegzhda, P.D., Ensuring the technological independence of the Russian Federation in the field of cybersecurity, Probl. Inf. Bezop., Komp’yut. Sist., 2014, no. 4, pp. 17–29.
Aleksandrova, E.B., Methods of group authentication for low-resource vehicle and flying self-organizing networks, Autom. Control Comput. Sci., 2017, no. 51, pp. 947–958.
Niedermayer, H., Architecture and Components of Secure and Anonymous Peer-to-Peer Systems, Technical University Munich, 2010.
Kalinin, M.O. and Zubkov, E.A., Prevention of attacks against dynamic routing in self-organizing peer-to-peer networks using swarm intelligence, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 1, pp. 89–96.
Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673–681.
Zegzhda, D.P., Vasil’ev, Yu.S., Poltavtseva, M.A., Kefeli, I.F., and Borovkov, A.I., Cybersecurity of progressive production technologies in the era of digital transformation, Vopr. Kiberbezop., 2018, no. 2, pp. 2–15.
Funding
The reported study was funded by the grant from the President of the Russian Federation for state support of the leading scientific schools of the Russian Federation NSh-2992.2018.9 (agreement no. 075-15-2019-1066).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by A. Kolemesin
About this article
Cite this article
Dakhnovich, A.D., Moskvin, D.A. & Zegzhda, D.P. An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things. Aut. Control Comp. Sci. 53, 948–953 (2019). https://doi.org/10.3103/S0146411619080078
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411619080078