Security Issues on Industrial Internet of Things: Overview and Challenges
Abstract
:1. Introduction
- The potential problems that may be exploited by attackers to threaten IIoT security and the introduced weak links in each layer are described in detail using the four basic layers of IIoT architecture as a foundation.
- Intrusion threat detection methods and defense measures, which are utilized to enable the real-time monitoring and detection of internal and external security threats in IIoT networks and to identify and handle potential threats for multiple security threats in a timely manner, are summarized.
- Based on the analysis of security threats, intrusion detection, and threat prevention, the main security challenges in the future development of the IIoT are identified, and several potential directions are suggested.
2. The Security Problems in the IIoT
3. The Solutions to Security Protection of IIoT
3.1. Intrusion Detection
3.1.1. Intrusion Detection Based on Data Mining
Algorithm 1 Algorithm of Apriori |
Input: D, Output: I 1: { 2: 3: for do 4: 5: for all transactions do 6: 7: for all candidates do 8: c.count++; 9: end for 10: end for 11: 12: end for 13: gen-rules(I[l]); 14: }; 15: function apriori-gen(I[l−1]); 16: { 17: insert into ; 18: select cp[1], cp[2], …, cp[l−2], cp[L−1], cq[l−1] 19: from 20: where cp[1] = cq[1], cp[2] = cq[2], …, cp[k−2] = cq[l−2], cp[l−1] < cq[l−1]; 21: if (l−1)-subsets c of c[l], cL[l−1] then delete c from c[l] then 22: return c[l] 23: end if 24: } 25: return Outputs |
3.1.2. Intrusion Detection Based on a Neural Network
3.1.3. Intrusion Detection Based on Machine Learning
3.1.4. Summary
3.2. Threat Defense
3.2.1. Active Defense of IIoT Abnormal Data Based on Neural Networks
3.2.2. Security Defense System
3.2.3. Immune Network
Algorithm 2 Algorithm of clones |
|
3.2.4. Blockchain
3.2.5. Summary
4. Challenges
4.1. Imperfect Back Door Protection of Equipment
4.2. Hidden Trouble in Data Code
4.3. Hidden Trouble in Communication Protocol
4.4. PLC System in IIoT
4.5. Summary
5. Conclusions
- Threats to the IIoT. The equipment in the IIoT connected by the device layer is vulnerable to external attacks. Device exposure also greatly threatens the IIoT and industrial control system security.
- Attack detections. Due to the open communication protocol in the application layer, the IIoT is vulnerable to third-party intrusion attacks. The transmission layer and the processing layer are also very vulnerable to attackers during data transmission, with these attacks resulting in the leakage of a large amount of private and confidential information and irreversibly damaging the IIoT.
- Defenses against attacks. Many secure strategies have been developed to handle various malicious attacks from different perspectives. However, the deep integration of cyberspace and physical plants causes such defense or protection methods to only partially protect the IIoT.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Alenazi, M.J.; AlSowaygh, N.A.; Humayed, A.A.; Alablani, I.A. Cyber resilience in industrial networks: A state of the art, challenges, and future directions. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 101781. [Google Scholar]
- Zhang, N.; Liu, L.; Tian, Z.; Wu, Y. Progress and trend of industrial Internet security. J. Guangzhou Univ. (Nat. Sci. Ed.) 2019, 18, 68–76. [Google Scholar]
- Alrawi, O.; Lever, C.; Antonakakis, M.; Monrose, F. SoK: Security Evaluation of Home-Based IoT Deployments. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2019; pp. 1362–1380. [Google Scholar]
- Yan, H.; Li, D. Industrial Internet Security Risk Analysis and Countermeasure Research. Cyberspace Secur. 2020, 11, 81–87. [Google Scholar]
- Guo, X.; Liu, J.; Yu, Z.; Zhang, H.; Di, X. Prospect of Industrial Information Security Situation in 2019. China Inf. Secur. 2019, 6, 51–52. [Google Scholar]
- Wurm, J.; Hoang, K.; Arias, O.; Sadeghi, A.R.; Jin, Y. Security analysis on consumer and industrial IoT devices. In Proceedings of the 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Macao, China, 25–28 January 2016; pp. 519–524. [Google Scholar]
- Sadeghi, A.R.; Wachsmann, C.; Waidner, M. Security and privacy challenges in industrial internet of things. In Proceedings of the 52nd Annual Design Automation Conference, San Francisco, CA, USA, 7 June 2015; pp. 1–6. [Google Scholar]
- Sisinni, E.; Saifullah, A.; Han, S.; Jennehag, U.; Gidlund, M. Industrial internet of things: Challenges, opportunities, and directions. IEEE Trans. Ind. Inform. 2018, 14, 4724–4734. [Google Scholar] [CrossRef]
- Serror, M.; Hack, S.; Henze, M.; Schuba, M.; Wehrle, K. Challenges and Opportunities in Securing the Industrial Internet of Things. IEEE Trans. Ind. Inform. 2021, 17, 2985–2996. [Google Scholar] [CrossRef]
- Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J. Netw. Comput. Appl. 2017, 88, 10–28. [Google Scholar] [CrossRef]
- Atzori, L.; Iera, A.; Morabito, G. The internet of things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
- Bahtiyar, Ş.; Çağlayan, M.U. Extracting trust information from security system of a service. J. Netw. Comput. Appl. 2012, 35, 480–490. [Google Scholar] [CrossRef]
- De Donno, M.; Dragoni, N.; Giaretta, A.; Spognardi, A. Analysis of DDoS-capable IoT malwares. In Proceedings of the 2017 Federated Conference on Computer Science and Information Systems (FedCSIS), Prague, Czech Republic, 3–6 September 2017; pp. 807–816. [Google Scholar]
- Chaudhary, S.; Mishra, P.K. DDoS attacks in Industrial IoT: A survey. Comput. Netw. 2023, 236, 110015. [Google Scholar] [CrossRef]
- Zhan, Y. Security Research and Practice of Industrial Internet. Comput. Knowl. Technol. 2022, 18, 34–35. [Google Scholar]
- Ji, S.; Wang, H. Discussion on Industrial Internet of Things and Industrial Big Data Security. Autom. Panor. 2021, 38, 10–14. [Google Scholar]
- Weber, R.H. Internet of Things—New security and privacy challenges. Comput. Law Secur. Rev. Int. J. Technol. Pract. 2010, 26, 23–30. [Google Scholar] [CrossRef]
- Miorandi, D.; Sicari, S.S.; Pellegrini, F.D.; Chlamtac, I. Internet of Things: Vision, applications and research challenges. In Proceedings of the Ad Hoc Networks, Trento, Italy, 17–25 February 2012; Volume 10, pp. 1497–1516. [Google Scholar]
- Ziegeldorf, J.H.; Morchon, O.G.; Wehrle, K. Privacy in the Internet of Things: Threats and challenges. Secur. Commun. Netw. 2014, 7, 2728–2742. [Google Scholar] [CrossRef]
- Kai, Z.; Ge, L. A Survey on the Internet of Things Security. In Proceedings of the International Conference on Computational Intelligence and Security, Emeishan, China, 14–15 December 2013; pp. 663–667. [Google Scholar]
- Xiao, R.; Zhang, Y.; Cui, X.H.; Zhang, F.; Wang, H.H. A Hybrid Task Crash Recovery Solution for Edge Computing in IoT-Based Manufacturing. IEEE Access 2021, 9, 106220–106231. [Google Scholar] [CrossRef]
- Lins, R.G.; Givigi, S.N. Cooperative Robotics and Machine Learning for Smart Manufacturing: Platform Design and Trends within the Context of Industrial Internet of Things. IEEE Access 2021, 9, 95444–95455. [Google Scholar] [CrossRef]
- Latif, S.; Driss, M.; Boulila, W.; Huma, Z.E.; Jamal, S.S.; Idrees, Z.; Ahmad, J. Deep learning for the industrial internet of things (iiot): A comprehensive survey of techniques, implementation frameworks, potential applications, and future directions. Sensors 2021, 21, 7518. [Google Scholar] [CrossRef] [PubMed]
- Qi, J.; Vasilakos, A.V.; Wan, J.; Lu, J.; Qiu, D. Security of the Internet of Things: Perspectives and challenges. Wirel. Netw. 2014, 20, 2481–2501. [Google Scholar]
- Fremantle, P.; Scott, P. A Security Survey of Middleware for the Internet of Things. Peerj Comput. Sci. 2017, 3, e114. [Google Scholar] [CrossRef]
- Granjal, J.; Monteiro, E.; Silva, J.S. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues. IEEE Commun. Surv. Tutor. 2015, 17, 1294–1312. [Google Scholar] [CrossRef]
- Nguyen, K.T.; Laurent, M.; Oualha, N. Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw. 2015, 32, 17–31. [Google Scholar] [CrossRef]
- Airehrour, D.; Gutierrez, J.; Ray, S.K. Secure routing for internet of things: A survey. J. Netw. Comput. Appl. 2016, 66, 198–213. [Google Scholar] [CrossRef]
- Qin, Y.; Sheng, Q.Z.; Falkner, N.J.; Dustdar, S.; Wang, H.; Vasilakos, A.V. When things matter: A survey on data-centric internet of things. J. Netw. Comput. Appl. 2016, 64, 137–153. [Google Scholar] [CrossRef]
- Zhang, X.; Wang, T. Elastic and Reliable Bandwidth Reservation Based on Distributed Traffic Monitoring and Control. IEEE Trans. Parallel Distrib. Syst. 2022, 33, 4563–4580. [Google Scholar] [CrossRef]
- Zhang, X.; Wang, Y.; Yang, M.; Geng, G. Toward Concurrent Video Multicast Orchestration for Caching-Assisted Mobile Networks. IEEE Trans. Veh. Technol. 2021, 70, 13205–13220. [Google Scholar] [CrossRef]
- Loi, F.; Sivanathan, A.; Gharakheili, H.H.; Radford, A.; Sivaraman, V. Systematically evaluating security and privacy for consumer IoT devices. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, Dallas, TX, USA, 3 November 2017; pp. 1–6. [Google Scholar]
- Fernández-Caramés, T.M.; Fraga-Lamas, P. A Review on the Use of Blockchain for the Internet of Things. IEEE Access 2018, 6, 32979–33001. [Google Scholar] [CrossRef]
- Teslya, N.; Ryabchikov, I. Blockchain-based platform architecture for industrial IoT. In Proceedings of the 2017 21st Conference of Open Innovations Association (FRUCT), Helsinki, Finland, 6–10 November 2017; pp. 321–329. [Google Scholar]
- Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]
- Celik, Z.B.; Fernandes, E.; Pauley, E.; Tan, G.; McDaniel, P. Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities. ACM Comput. Surv. (CSUR) 2019, 52, 74. [Google Scholar] [CrossRef]
- Tabrizi, F.M.; Pattabiraman, K. Design-level and code-level security analysis of IoT devices. ACM Trans. Embed. Comput. Syst. (TECS) 2019, 18, 20. [Google Scholar] [CrossRef]
- Fun, T.S.; Samsudin, A. A survey of homomorphic encryption for outsourced big data computation. KSII Trans. Internet Inf. Syst. (TIIS) 2016, 10, 3826–3851. [Google Scholar]
- Liang, X.; Zhao, J.; Shetty, S.; Li, D. Towards data assurance and resilience in IoT using blockchain. In Proceedings of the MILCOM 2017—2017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, USA, 23–25 October 2017; pp. 261–266. [Google Scholar]
- Farhan, L.; Kharel, R.; Kaiwartya, O.; Quiroz-Castellanos, M.; Alissa, A.; Abdulsalam, M. A concise review on Internet of Things (IoT)-problems, challenges and opportunities. In Proceedings of the 2018 11th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), Budapest, Hungary, 18–20 July 2018; pp. 1–6. [Google Scholar]
- Anitha, T.; Manimurugan, S.; Sridhar, S.; Mathupriya, S.; Latha, G.C.P. A Review on Communication Protocols of Industrial Internet of Things. In Proceedings of the 2022 2nd International Conference on Computing and Information Technology (ICCIT), Tabuk, Saudi Arabia, 25–27 January 2022; pp. 418–423. [Google Scholar]
- Tan, S.F.; Samsudin, A. Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey. Sensors 2021, 21, 6647. [Google Scholar] [CrossRef]
- Huo, G. Research on Industrial Internet Security under the Trend of IT and OT Integration. Digit. Users 2019, 25, 51–52. [Google Scholar]
- Igure, V.M.; Laughter, S.A.; Williams, R.D. Security issues in SCADA networks. Comput. Secur. 2006, 25, 498–506. [Google Scholar] [CrossRef]
- Wang, Q.; Wu, G.; Wei, D. Research on the Development Situation and Path of Industrial Internet Security Industr. China Eng. Sci. 2021, 23, 10. [Google Scholar]
- Ferst, M.K.; de Figueiredo, H.F.M.; Denardin, G.; Lopes, J. Implementation of Secure Communication with Modbus and Transport Layer Security protocols. In Proceedings of the 2018 13th IEEE International Conference on Industry Applications (INDUSCON), Sao Paulo, Brazil, 12–14 November 2018; pp. 155–162. [Google Scholar]
- Amoretti, M.; Pecori, R.; Protskaya, Y.; Veltri, L.; Zanichelli, F. A Scalable and Secure Publish/Subscribe-Based Framework for Industrial IoT. IEEE Trans. Ind. Inform. 2021, 17, 3815–3825. [Google Scholar] [CrossRef]
- Hong, X.; Cai, D. Convergence of OT and IT for Internet Plus. Strateg. Study CAE 2020, 22, 18–23. [Google Scholar] [CrossRef]
- Bian, K.; Park, J.M. MAC-layer misbehaviors in multi-hop cognitive radio networks. In Proceedings of the 2006 US-Korea Conference on Science, Technology, and Entrepreneurship (UKC2006), Teaneck, NJ, USA, 10–13 August 2006; pp. 228–248. [Google Scholar]
- Shang, S.; Li, X.; Gu, K.; Li, L.; Zhang, X.; Pandi, V. A Robust Privacy-Preserving Data Aggregation Scheme for Edge-Supported IIoT. IEEE Trans. Ind. Inform. 2023, 1–12. [Google Scholar] [CrossRef]
- Li, Q. Research on Industrial Internet Intrusion Detection Method Based on Data Mining. Ph.D. Thesis, University of Electronic Science and Technology of China, Chengdu, China, 2020. [Google Scholar]
- Denning, D.E. An Intrusion-Detection Model. In Proceedings of the An Intrusion-Detection Model, Oakland, CA, USA, 7–9 April 1986; pp. 118–131. [Google Scholar]
- Lee, W.; Stolfo, S.J.; Mok, K.W. A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No. 99CB36344), Oakland, CA, USA, 14 May 1999; pp. 120–132. [Google Scholar]
- Lee, W. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems (Computer Security, Network Security). Ph.D. Thesis, Columbia University, New York, NY, USA, 1999. [Google Scholar]
- Shao, L. Research on Intrusion Detection Method of Industrial Internet Based on Neural Network. Master’s Thesis, Harbin Normal University, Harbin, China, 2021. [Google Scholar]
- Wang, J.; Wang, J.; Liu, G. Application of Self-organized Neural Network in Intrusion Detection System. Comput. Mod. 2004, 88–91. [Google Scholar]
- Lin, L.; Shang, W.; Yao, J.; Zhao, J.; Peng, Z. Overview of one-class support vector machine in intrusion detection of industrial control system. Appl. Res. Comput. 2016, 33, 7–11. [Google Scholar]
- Gauthama Raman, M.R.; Somu, N.; Jagarapu, S.; Manghnani, T.; Selvam, T.; Krithivasan, K.; Shankar Sriram, V.S. An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm. Artif. Intell. Rev. 2020, 53, 3255–3286. [Google Scholar] [CrossRef]
- Keliris, A.; Salehghaffari, H.; Cairl, B.; Krishnamurthy, P.; Maniatakos, M.; Khorrami, F. Machine learning-based defense against process-aware attacks on Industrial Control Systems. In Proceedings of the 2016 IEEE International Test Conference (ITC), Worth, TX, USA, 15–17 November 2016; pp. 1–10. [Google Scholar]
- Ahmed, C.M.; Zhou, J.; Mathur, A.P. Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate Sensors in CPS. In Proceedings of the Association for Computing Machinery, Number 16 in ACSAC’18, San Juan, PR, USA, 3 December 2018; pp. 566–581. [Google Scholar]
- Nader, P.; Honeine, P.; Beauseroy, P. lp-norms in One-Class Classification for Intrusion Detection in SCADA Systems. IEEE Trans. Ind. Inform. 2014, 10, 2308–2317. [Google Scholar] [CrossRef]
- Leahy, K.; Hu, R.L.; Konstantakopoulos, I.C.; Spanos, C.J.; Agogino, A.M. Diagnosing wind turbine faults using machine learning techniques applied to operational data. In Proceedings of the 2016 IEEE International Conference on Prognostics and Health Management (ICPHM), Ottawa, ON, Canada, 20–22 June 2016; pp. 1–8. [Google Scholar]
- Lin, Q.; Adepu, S.; Verwer, S.; Mathur, A. TABOR: A Graphical Model-Based Approach for Anomaly Detection in Industrial Control Systems. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security, ASIACCS’18, Incheon, Republic of Korea, 29 May 2018; pp. 525–536. [Google Scholar]
- Zhou, C.; Huang, S.; Xiong, N.; Yang, S.H.; Li, H.; Qin, Y.; Li, X. Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation. IEEE Trans. Syst. Man Cybern. Syst. 2015, 45, 1345–1360. [Google Scholar] [CrossRef]
- Caselli, M.; Zambon, E.; Kargl, F. Sequence-Aware Intrusion Detection in Industrial Control Systems. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, CPSS’15, Singapore, 14 April 2015; pp. 13–24. [Google Scholar]
- Caselli, M.; Zambon, E.; Petit, J.; Kargl, F. Modeling message sequences for intrusion detection in industrial control systems. In Proceedings of the Critical Infrastructure Protection IX, Arlington, VA, USA, 21 November 2015; pp. 49–71. [Google Scholar]
- Luo, Y. Research and Design of Intrusion Detection Method for Industrial Control System. Ph.D. Thesis, Zhejiang University, Hangzhou, China, 2013. [Google Scholar]
- Huang, K.; Zhou, C.; Tian, Y.C.; Yang, S.; Qin, Y. Assessing the Physical Impact of Cyberattacks on Industrial Cyber-Physical Systems. IEEE Trans. Ind. Electron. 2018, 65, 8153–8162. [Google Scholar] [CrossRef]
- Stefanidis, K.; Voyiatzis, A.G. An HMM-Based Anomaly Detection Approach for SCADA Systems. In Proceedings of the Information Security Theory and Practice, Crete, Greece, 26–27 September 2016; pp. 85–99. [Google Scholar]
- Zheng, Z.; Wang, C. Research on Active Defense of Industrial Internet Abnormal Data Based on BP Neural Network. Autom. Technol. Appl. 2022, 41, 79–82. [Google Scholar]
- An, Q.; Zheng, T. Research on the Security Defense Technology of IT/OT Integration in the Industrial Internet Environment. China New Commun. 2022, 24, 131–133. [Google Scholar]
- Tang, L.; Hou, Z.; Cheng, S.; Zhang, D.; Liu, Z.; Gui, H. Research on Security Situation Awareness Technology of Industrial Internet. Technol. Iot AI 2021, 53, 42–46. [Google Scholar]
- Yang, J.; Chen, K.; Cao, K.; Guo, X. The core technology analysis of industrial Internet security situational awareness. Inf. Secur. Technol. 2019, 10, 61–66. [Google Scholar]
- Zhang, F. Research on network security and defense technology under the background of “Internet +”. Digit. Commun. World 2021, 135–136. [Google Scholar]
- Lu, Y. The blockchain: State-of-the-art and research challenges. J. Ind. Inf. Integr. 2019, 15, 80–90. [Google Scholar] [CrossRef]
- Crosby, M.; Pattanayak, P.; Verma, S.; Kalyanaraman, V. Blockchain technology: Beyond bitcoin. Appl. Innov. 2016, 2, 71. [Google Scholar]
- Conoscenti, M.; Vetro, A.; De Martin, J.C. Blockchain for the Internet of Things: A systematic literature review. In Proceedings of the 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 29 November–2 December 2016; pp. 1–6. [Google Scholar]
- Lu, Y. Blockchain and the related issues: A review of current research topics. J. Manag. Anal. 2018, 5, 231–255. [Google Scholar] [CrossRef]
- Narayanan, A.; Bonneau, J.; Felten, E.; Miller, A.; Goldfeder, S. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction; Princeton University Press: Princeton, NJ, USA, 2016. [Google Scholar]
- Lu, Y. Blockchain: A survey on functions, applications and open issues. J. Ind. Integr. Manag. 2018, 3, 1850015. [Google Scholar] [CrossRef]
- Swan, M. Blockchain: Blueprint for a New Economy; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2015. [Google Scholar]
- Gatteschi, V.; Lamberti, F.; Demartini, C.; Pranteda, C.; Santamaria, V. To blockchain or not to blockchain: That is the question. Professional 2018, 20, 62–74. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 2008, 21260. [Google Scholar]
- Luu, L.; Chu, D.H.; Olickel, H.; Saxena, P.; Hobor, A. Making smart contracts smarter. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24 October 2016; pp. 254–269. [Google Scholar]
- Christidis, K.; Devetsikiotis, M. Blockchains and smart contracts for the internet of things. IEEE Access 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
- Merkle, R.C. Protocols for public key cryptosystems. In Secure Communications and Asymmetric Cryptosystems; Routledge: London, UK, 2019; pp. 73–104. [Google Scholar]
- Tschorsch, F.; Scheuermann, B. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 2016, 18, 2084–2123. [Google Scholar] [CrossRef]
- Alphand, O.; Amoretti, M.; Claeys, T.; Dall’Asta, S.; Duda, A.; Ferrari, G.; Rousseau, F.; Tourancheau, B.; Veltri, L.; Zanichelli, F. IoTChain: A blockchain security architecture for the Internet of Things. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; pp. 1–6. [Google Scholar]
- Orman, H. Blockchain: The emperors new PKI? IEEE Internet Comput. 2018, 22, 23–28. [Google Scholar] [CrossRef]
- Saghiri, A.M.; Vahdati, M.; Gholizadeh, K.; Meybodi, M.R.; Dehghan, M.; Rashidi, H. A framework for cognitive Internet of Things based on blockchain. In Proceedings of the 2018 4th International Conference on Web Research (ICWR), Tehran, Iran, 25–26 April 2018; pp. 138–143. [Google Scholar]
- Eyal, I.; Sirer, E.G. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 2018, 61, 95–102. [Google Scholar] [CrossRef]
- Pilkington, M. Blockchain technology: Principles and applications. In Research Handbook on Digital Transformations; Edward Elgar Publishing: Cheltenham, UK, 2016. [Google Scholar]
- Xu, L.D.; Xu, E.L.; Li, L. Industry 4.0: State of the art and future trends. Int. J. Prod. Res. 2018, 56, 2941–2962. [Google Scholar] [CrossRef]
- Lu, Y. Industry 4.0: A survey on technologies, applications and open research issues. J. Ind. Inf. Integr. 2017, 6, 1–10. [Google Scholar] [CrossRef]
- Hameed, K.; Barika, M.; Garg, S.; Amin, M.B.; Kang, B. A taxonomy study on securing Blockchain-based Industrial applications: An overview, application perspectives, requirements, attacks, countermeasures, and open issues. J. Ind. Inf. Integr. 2022, 26, 100312. [Google Scholar] [CrossRef]
- He, W.; Da Xu, L. Integration of distributed enterprise applications: A survey. IEEE Trans. Ind. Inform. 2012, 10, 35–42. [Google Scholar] [CrossRef]
- Li, L. China’s manufacturing locus in 2025: With a comparison of “Made-in-China 2025” and “Industry 4.0”. Technol. Forecast. Soc. Chang. 2018, 135, 66–74. [Google Scholar] [CrossRef]
- Xie, Y.; Feng, D.; Tan, Z.; Zhou, J. Design and Evaluation of a Provenance-Based Rebuild Framework. IEEE Trans. Magn. 2013, 49, 2805–2811. [Google Scholar] [CrossRef]
- Widom, J. Trio: A System for Integrated Management of Data, Accuracy, and Lineage. In Proceedings of the Second Biennial Conference on Innovative Data Systems Research, CIDR 2005, Asilomar, CA, USA, 4–7 January 2005. [Google Scholar]
- Ikeda, R.; Widom, J. Panda: A System for Provenance and Data. IEEE Data Eng. Bull. 2010, 33, 42–49. [Google Scholar]
- Qian, W.; Shao, Q.; Zhu, Y.; Jin, C.; Zhou, A. Research problems and methods in blockchain and trusted data management. J. Softw. 2018, 29, 10. [Google Scholar]
- Chang, X.; Zhao, Y. Scaling bitcoin:the state of development and future trend. Comput. Appl. Softw. 2019, 36, 8. [Google Scholar]
- Zeng, S.; Yuan, Y.; Ni, X.; Wang, F. Scaling blockchain towards bitcoin: Key technologies, constraints and related issues. Acta Autom. Sin. 2019, 45, 1015–1030. [Google Scholar]
- Yu, H.; Zhang, Z.; Liu, J. Research on scaling technology of bitcoin blockchain. Comput. Res. Dev. 2017, 54, 14. [Google Scholar]
- Li, F.; Li, Z.; Zhao, H. Research on the progress in cross-chain technology of blockchains. J. Softw. 2019, 30, 12. [Google Scholar]
- Worley, C.; Skjellum, A. Blockchain Tradeoffs and Challenges for Current and Emerging Applications: Generalization, Fragmentation, Sidechains, and Scalability. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1582–1587. [Google Scholar]
- Cavalieri, S.; Chiacchio, F. Analysis of OPC UA performances. Comput. Stand. Interfaces 2013, 36, 165–177. [Google Scholar] [CrossRef]
- Mellado, J.; Núñez, F. Design of an IoT-PLC: A containerized programmable logical controller for the industry 4.0. J. Ind. Inf. Integr. 2022, 25, 100250. [Google Scholar] [CrossRef]
- Roy, N. The architectue of PLC in the 4.0 industry: Challenges, trends and solutions. Qutlook Electron. Technol. 2016, 23, 24+27–28. [Google Scholar]
Number | Key Contributions |
---|---|
1 | Demonstrates the four-layer IIoT architecture |
2 | Describes potential issues that an attacker could exploit to threaten IIoT security, as well as weaknesses introduced in each layer |
3 | Summarizes intrusion threat detection methods and defense measures |
4 | Identifies the main security challenges and potential directions for the future development of the IIoT |
Author | Comparison |
---|---|
Zhao and Ge [20] | Divided the IoT architecture into three layers |
Tan et al. [42] | Proposed a new IIoT four-tier architecture. |
Xiao R. et al. [21] | Proposed a five-layer framework for hybrid Internet of Things (H-IoT) platforms |
Romulo Gonçalves Lins et al. [22] | Created a decentralized network with a six-tier architecture for manufacturing systems |
Shahid Latif et al. [23] | Demonstrated a seven-layer IIoT framework |
Weber [17] | Outlined security issues existing in the IoT |
Atzori et al. [11] | Described the main challenges and potential issues of IoT security |
Zigeldorf et al. [19] | Investigated the privacy threats and challenges faced by the IoT in detail |
Fremantle and Scott [25] | Analyzed the impact of middleware on the security of the IoT |
Berkay et al. [36] | Analyzed the security of IoT devices from the perspective of the programming platform and code level |
Joao et al. [39] | Reviewed the threat model and attack path of the IoT in general |
Reference | Comparison |
---|---|
[57] | The OCSVM unsupervised learning method was proposed. |
[58,59,60,61,62] | A supervised learning algorithm was proposed for an SVM with a higher learning efficiency. |
[67] | An SVM intrusion detection method based on multiclassification was proposed. |
[68] | Cyber attacks were predicted using Bayesian network-based models. |
[69] | A detection model based on the hidden Markov model (HMM) was proposed. |
Characteristic Parameters | Meaning |
---|---|
A finite set of hidden states | |
A finite set of observation symbols | |
A state transition probability matrix | |
The alerts generated from three detection components | |
An observation probability matri | |
An initial state distribution vector | |
N | State number |
r | The length of the sliding window of observations |
The forward variables, respectively | |
The backward variables, respectively | |
The predefined threshold |
Characteristic Parameters | Meaning |
---|---|
Total number of clones of cells | |
Parameter factor | |
M | Number of memory cells |
a | Antibody |
Antibody d captured antigen | |
i | The i-th cell |
F | Freeform collection |
y | Binary string |
t | Binary representation of antigen length |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, M.; Sun, Y.; Sun, H.; Zhang, B. Security Issues on Industrial Internet of Things: Overview and Challenges. Computers 2023, 12, 256. https://doi.org/10.3390/computers12120256
Wang M, Sun Y, Sun H, Zhang B. Security Issues on Industrial Internet of Things: Overview and Challenges. Computers. 2023; 12(12):256. https://doi.org/10.3390/computers12120256
Chicago/Turabian StyleWang, Maoli, Yu Sun, Hongtao Sun, and Bowen Zhang. 2023. "Security Issues on Industrial Internet of Things: Overview and Challenges" Computers 12, no. 12: 256. https://doi.org/10.3390/computers12120256
APA StyleWang, M., Sun, Y., Sun, H., & Zhang, B. (2023). Security Issues on Industrial Internet of Things: Overview and Challenges. Computers, 12(12), 256. https://doi.org/10.3390/computers12120256