Skip to main content

Towards a Secure Industrial Internet of Things

  • Chapter
  • First Online:
Security and Privacy Trends in the Industrial Internet of Things

Abstract

The Industrial Internet of Things (IIoT), being one of the underlying and enabling technologies of the Industry 4.0 initiative, brings about expectations for unprecedented value creation opportunities in industry. Unfortunately, these do not come without a price; in this case the price to pay is the increased vulnerabilities, the increased threats and the increased attack surface that result when industrial systems originally designed with little or no cybersecurity in mind connect to the Internet. Consequently, the cybersecurity of the IIoT becomes of paramount importance. Research has started focusing on this area, as well as on the related areas of cyber-physical systems security and industrial network security, but a multitude of issues still remain to be addressed. In this chapter, we review recent research results in the area of IIoT security, with an eye towards identifying trends on one hand and areas where research seems to lag behind on the other, by classifying research results using the security lifecycle model of the National Institute of Standards and Technology (NIST) framework for improving the cybersecurity of critical infrastructures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alcaraz C (2017) Resilient industrial control systems based on multiple redundancy. Int J Crit Infrastruct (IJCIS) 13(2/3):278–2951

    Article  Google Scholar 

  2. Alcaraz C (2018) Cloud-assisted dynamic resilience for cyber-physical control systems. IEEE Wirel Commun 25(1):76–82

    Article  Google Scholar 

  3. Alcaraz C, Lopez J (2017) Secure interoperability in cyber-physical systems. In: Ferrag MA, Ahmim A (eds) Security solutions and applied cryptography in smart grid communications. IGI Global, Hershey, pp 137–158

    Google Scholar 

  4. Alcaraz C, Lopez J (2018) A cyber-physical systems-based checkpoint model for structural controllability. IEEE Syst J 12:1–12

    Article  Google Scholar 

  5. Alcaraz C, Roman R, Najera P, Lopez J (2013) Security of industrial sensor network-based remote substations in the context of the Internet of Things. Ad Hoc Netw 11(3):1091–1104

    Article  Google Scholar 

  6. Bakhshi Z, Balador A, Mustafa J (2018) Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models. In: 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Apr 2018. IEEE, pp 173–178

    Google Scholar 

  7. Barrett MP (2018) Framework for improving critical infrastructure cybersecurity version 1.1. Technical report

    Google Scholar 

  8. Caselli M, Zambon E, Kargl F (2015) Sequence-aware intrusion detection in industrial control systems. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security – CPSS’15. ACM Press, New York, pp 13–24

    Google Scholar 

  9. Choi J, Shin Y, Cho S (2018) Study on information security sharing system among the industrial IoT service and product provider. In: 2018 International Conference on Information Networking (ICOIN), Jan 2018. IEEE, pp 551–555

    Google Scholar 

  10. Esfahani A, Mantas G, Matischek R, Saghezchi FB, Rodriguez J, Bicaku A, Maksuti S, Tauber M, Schmittner C, Bastos J (2017) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J 6(1):288–296

    Article  Google Scholar 

  11. Gill H (2008) From vision to reality: cyber-physical systems. In: HCSS national workshop on new research directions for high confidence transportation CPS: automotive, aviation, and rail

    Google Scholar 

  12. Hassanzadeh A, Modi S, Mulchandani S (2015) Towards effective security control assignment in the industrial Internet of things. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Dec 2015. IEEE, pp 795–800

    Google Scholar 

  13. He D, Ma M, Zeadall S, Kumar N, Liang K (2017) Certificateless public key authenticated encryption with keyword search for industrial Internet of Things. IEEE Trans Ind Inf 14(8):3618–3627

    Article  Google Scholar 

  14. Jeschke S, Brecher C, Meisen T, Özdemir D, Eschert T (2017) Industrial Internet of things and cyber manufacturing systems. In: Jeschke S, Brecher C, Song H, Rawat D (eds) Industrial Internet of Things. Springer, Cham, pp 3–19

    Chapter  Google Scholar 

  15. Kalpakjian S, Schmid S (2006) Manufacturing engineering and technology, 5th edn. Prentice Hall, Upper Saddle River

    Google Scholar 

  16. Katsikeas S, Fysarakis K, Miaoudakis A, Van Bemten A, Askoxylakis I, Papaefstathiou I, Plemenos A (2017) Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol. In: 2017 IEEE Symposium on Computers and Communications (ISCC), July 2017. IEEE, pp 1193–1200

    Google Scholar 

  17. Khalili A, Sami A (2015) SysDetect: a systematic approach to critical state determination for industrial intrusion detection systems using Apriori algorithm. J Process Control 32:154–160

    Article  Google Scholar 

  18. Kim D, Yang H, Chung M, Cho S (2017) Squeezed convolutional variational autoEncoder for unsupervised anomaly detection in edge device industrial Internet of Things, Dec 2017. arXiv:1712.06343v1

    Google Scholar 

  19. Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur Priv Mag 9(3):49–51

    Article  Google Scholar 

  20. Lee S-Y, Chung T-M (2017) A study on the fast system recovery: selecting the number of surrogate nodes for fast recovery in industrial IoT environment. In: 2017 International Conference on Information and Communications (ICIC), June 2017. IEEE, pp 205–207

    Google Scholar 

  21. Lesjak C, Hein D, Winter J (2015) Hardware-security technologies for industrial IoT: TrustZone and security controller. In: IECON 2015 – 41st Annual Conference of the IEEE Industrial Electronics Society, Nov 2015. IEEE, pp 002589–002595

    Google Scholar 

  22. Lesjak C, Druml N, Matischek R, Ruprechter T, Holweg G (2016) Security in industrial IoT – quo vadis? e & i Elektrotechnik und Informationstechnik 133(7):324–329

    Article  Google Scholar 

  23. Manzoor A (2016) Securing device connectivity in the industrial Internet of Things (IoT). Springer, Cham, pp 3–22

    Google Scholar 

  24. Mitrokotsa A, Rieback MR, Tanenbaum AS (2010) Classifying RFID attacks and defenses. Inf Syst Front 12(5):491–505

    Article  Google Scholar 

  25. Mouratidis H, Diamantopoulou V (2018) A security analysis method for industrial Internet of Things. IEEE Trans Ind Inf 14(9):4093–4100

    Article  Google Scholar 

  26. Pinto S, Gomes T, Pereira J, Cabral J, Tavares A (2017) IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput 21(1):40–47

    Article  Google Scholar 

  27. Pohl F, Schotten HD (2017) Secure and scalable remote access tunnels for the IIoT: an assessment of openVPN and IPsec performance. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), LNCS, vol 10465. Springer, Cham, pp 83–90

    Google Scholar 

  28. Ponomarev S, Atkison T (2016) Industrial control system network intrusion detection by telemetry analysis. IEEE Trans Dependable Secure Comput 13(2):252–260

    Article  Google Scholar 

  29. Quarta D, Pogliani M, Polino M, Maggi F, Zanchettin AM, Zanero S (2017) An experimental security analysis of an industrial robot controller. In: 2017 IEEE Symposium on Security and Privacy (SP), May 2017. IEEE, pp 268–286

    Google Scholar 

  30. Sadeghi A-R, Wachsmann C, Waidner M (2015) Security and privacy challenges in industrial Internet of Things. In: Proceedings of the 52nd Annual Design Automation Conference on – DAC’15. ACM Press, New York, pp 1–6

    Google Scholar 

  31. Sharmeen S, Huda S, Abawajy JH, Ismail WN, Hassan MM (2018) Malware threats and detection for industrial mobile-IoT networks. IEEE Access 6:15941–15957

    Article  Google Scholar 

  32. Skwarek V (2017) Blockchains as security-enabler for industrial IoT-applications. Asia Pac J Innov Entrepreneurship 11(3):301–311

    Article  Google Scholar 

  33. Szymanski TH (2017) Strengthening security and privacy in an ultra-dense green 5G radio access network for the industrial and tactile Internet of Things. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), June 2017. IEEE, pp 415–422

    Google Scholar 

  34. Thames L, Schaefer D (2017) Cybersecurity for industry 4.0. Springer, Cham

    Google Scholar 

  35. Ulltveit-Moe N, Nergaard H, Erdödi L, Gjøsæter T, Kolstad E, Berg P (2016) Secure information sharing in an industrial Internet of Things, Jan 2016

    Google Scholar 

  36. Ulz T, Pieber T, Steger C, Haas S, Matischek R, Bock H (2017) Hardware-secured configuration and two-layer attestation architecture for smart sensors. In: 2017 Euromicro Conference on Digital System Design (DSD), Aug 2017. IEEE, pp 229–236

    Google Scholar 

  37. Urquhart L, McAuley D (2018) Avoiding the Internet of insecure industrial things. Comput Law Secur Rev 34(3):450–466

    Article  Google Scholar 

  38. US Office of Technology Assessment (1984) Computerized manufacturing automation: employment, education, and the workplace. Washington, DC: U.S. Congress, Office of Technology Assessment, OTACIT-235

    Google Scholar 

  39. van Lier B (2017) The industrial Internet of Things and cyber security: an ecological and systemic perspective on security in digital industrial ecosystems. In: 2017 21st International Conference on System Theory, Control and Computing (ICSTCC), Oct 2017. IEEE, pp 641–647

    Google Scholar 

  40. Wurm J, Hoang K, Arias O, Sadeghi A-R, Jin Y (2016) Security analysis on consumer and industrial IoT devices. In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Jan 2016. IEEE, pp 519–524

    Google Scholar 

  41. Xie C, Deng S-T (2017) Research and application of security and privacy in industrial Internet of Things based on fingerprint encryption. Springer, Cham, pp 102–110

    Google Scholar 

  42. Yan Q, Huang W, Luo X, Gong Q, Richard Yu F (2018) A multi-level DDoS mitigation framework for the industrial Internet of Things. IEEE Commun Mag 56(2):30–36

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sokratis Katsikas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Spathoulas, G., Katsikas, S. (2019). Towards a Secure Industrial Internet of Things. In: Alcaraz, C. (eds) Security and Privacy Trends in the Industrial Internet of Things. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-12330-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-12330-7_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-12329-1

  • Online ISBN: 978-3-030-12330-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics