Cyber security Threat Mitigation in Architectures for Industrial IOT

Authors

  • Triveni Mishra student of MBA(DTM) at the Symbiosis Institute of Digital and Telecom Management (SIDTM), Lavale, Pune Author
  • Dr.SaikatGochhait Post Doctoral Fellow from University of Extremadura, Spain and a Sr. Assistant Professor at the Symbiosis Insttute of Digital and Telecom Management, Lavale, Pune Author

DOI:

https://doi.org/10.61841/p4kt3661

Keywords:

Attacks, Cryptography, Industry 4.0, IOT Security, Threats, Vulnerabilities

Abstract

The industrial IOT applications are rapidly growing and transforming the traditional industries to smart industries (Industry 4.0), along with the impending consumer IOT adoption. It is therefore necessary to adapt and deploy a reliable cyber security software architecture. Due to the immense security challenges in IIOT, this paper tries to approach the concerns from an end-to-end IIOT solution security perspective. In this paper, we discuss the current architectural framework and study how they can address challenges like scalability, integration problems, data privacy, and security, and how the framework improves the security in the IIOT environment and reduces cost. With respect to the aspect of cost, we highlight the factors and specific costs in developing an IOT application. This paper also explains the security requirements, practices, and types of attacks on the IOT architecture. Here, we highlight the critical problems (threats/attacks/vulnerabilities) and their detection, prevention, and mitigation techniques. The authors aim is to prepare a study of existing protocols, frameworks, and architectures currently proposed in active research based on various parameters as well as to review the existing technology and project requirements in IIOT to understand both technology and stakeholder impact over IIOT security. 

Downloads

Download data is not yet available.

References

1. Ahmed, Ali & Ibrahim, Nagwa. (2017). “Modern IoT Architectures Review: A Security Perspective,” 8th Annual International Conference on ICT: Big Data, Cloud, and Security (ICT-BDCS 2017). DOI:10.5176/2251-2136_ICT-BDCS17.30.

2. https://www.researchgate.net/publication/320044307_Modern_IoT_Architectures_Review_A_Security_Perspective

3. Andrea, C. Chrysostomou, and G. Hadjichristofi, "Internet of Things: Security Vulnerabilities and Challenges," 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, 2015, pp. 180-187, doi: 10.1109/ISCC.2015.7405513.

4. Bissel, La Salle, Dal Chin. (2020). Innovate forcyberrresilience. AccentureSecurity Study. https://www.accenture.com/_acnmedia/PDF-116/Accenture-Cybersecurity-Report-2020.pdf

5. Bissel, La Salle, Dal Chin. (2018). The Cost of Cybercrime. Accenture Study. https://www.accenture.com/_acnmedia/pdf-96/accenture-2019-cost-of-cybercrime-study-final.pdf

6. Chase, J. (2013). The evolution of the internet of things. Texas Instruments white paper. http://www.ti.com/lit/ml/swrb028/swrb028.pdf

7. Cheruvu S., Kumar A., Smith N., Wheeler D.M. (2020) IoT Frameworks and Complexity.In Demystifying Internet of Things Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2896-8_2

8. Curtis, Hywel. (2018). Why you need automated security for the Internet of Things. . Venafi.

9. https://www.venafi.com/blog/why-you-need-automated-security-internet-things-iot.

10. Dev Technosys (2018, May 22). How Much Does It Cost to Develop an IoT Application? ? Business of Apps. https://www.businessofapps.com/news/how-much-does-it-costs-to-develop-iot-application/

11. Filho (2020). Vulnerabilities and security issues of IoT devices. Sikur Lab whitepaper.DOI:10.13140/RG.2.2.14211.86562.

12. Gochhait, S., Shou, D.T., & Fazalbhoy, S. (2020). Cloud Computing Applications and Techniques for Ecommerce. IGI Global. http://doi:10.4018/978-1-7998-1294-4

13. Islam, S.M., Kwak, D., Kabir, M.H., Hossain, M., & Kwak, K. (2015). The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access, 3, 678-708.

14. Ivan Valeryevich Evdokimov et al 2019 J. Phys.: Conf. Ser. 1176 042083

15. A cost-testing approach for IOT projects.

16. https://iopscience.iop.org/article/10.1088/1742-6596/1176/4/042083

17. Liu, Y. Xiao, and C. L. P. Chen, "Authentication and Access Control in the Internet of Things," 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, 2012, pp. 588–5922, DOI:10.1109/ICDCSW.2012.23.

18. Kaushik, Keshav & Dahiya, Susheela. (2018). Security and Privacy in Io-Based E-Business and Retail. 78-81. 10.1109/SYSMART.2018.8746961

19. Khalid, A., Butt, S. A., Jamal, T., & Gochhait, S. (2020). Agile Scrum Issues at Large-Scale Distributed Projects: Scrum Project Development at Large. International Journal of Software Innovation (IJSI), 8(2), 85-94. doi:10.4018/IJSI.2020040106.

20. Milosevic, Jelena, Sklavos, Nicolas, & Koutsikou, Konstantina. (2016). Malware in IoT Software and Hardware. Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE'16)

21. https://www.researchgate.net/publication/317011595_Malware_in_IoT_Software_and_Hardware.

22. Parotkin, Nikolay & Zolotarev, Vyacheslav. (2018). Information Security of IoT Wireless Segment. 1-7.10.1109/GloSIC.2018.8570144

23. Radanliev, P., De Roure, C., Cannady, S., Montalvo, R.M., Nicolescu, R., Huth, M., 2018. Economic impact of IoT cyber risk: analyzing past and present to predict future developments in IoT risk analysis and IoT cyber insurance, in: Living in the Internet of Things: Cybersecurity of the IoT - 2018. Institution of Engineering and Technology, London. https://doi.org/10.1049/cp.2018.0003

24. Rak M., Casola V., De Benedictis A., Villano U. (2019) Automated Risk Analysis for IoT Systems. In: Xhafa F., Leu FY., Ficco M., Yang CT. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2018. Lecture Notes on Data Engineering and Communications Technologies, vol. Springer.

25. Robles, Daisy & Robles, Rosslin. (2019). State of Internet of Things (IoT) Security Attacks, Vulnerabilities, and Solutions. 3. 255-263. https://www.researchgate.net/publication/334224658_State_of_Internet_of_Things_IoT_Security_Attacks_Vulnerabilities_and_Solutions/citations

26. R. Sharma, N. Pandey and S. K. Khatri, "Analysis of IoT security at network layer, 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, 2017, pp. 585-590

27. The Internet of Things Reference Model (2014). Cisco whitepaper. http://cdn.iotwf.com/resources/71/IoT_Reference_Model_White_Paper_June_4_2014.pdf.

28. Tsai, Chang (2004). Function-based cost estimation integrates quality function deployment to support system design. International Journal of Advanced Manufacturing Technology 23(7):514-522. DOI: 23. 514-522. 10.1007/s00170-003-1564-7.

29. Ud Din, Ikram & Guizani, Mohsen & Kim, Byung-Seo & Hassan, Suhaidi & Khan, Khurram. (2018). Trust Management Techniques for the Internet of Things: A Survey. IEEE Access. PP. 1-1.10.1109/ACCESS.2018.2880838.

30. Varga, Pal & Plósz, Sándor & Soos, Gabor & Hegedus, Csaba. (2017). Security Threats and Issues in Automation IoT. 10.1109/WFCS.2017.7991968.

31. Yu, B., Wright, J., Nepal, S., Zhu, L., Liu, J., & Ranjan, R. (2018). IoTChain: establishing trust in the Internet of Things ecosystem using blockchain. IEEE Cloud Computing, 5(4), 12-23

32. https://doi.org/10.1109/MCC.2018.043221010

Downloads

Published

30.04.2020

How to Cite

Mishra, T., & SaikatGochhait. (2020). Cyber security Threat Mitigation in Architectures for Industrial IOT. International Journal of Psychosocial Rehabilitation, 24(2), 5545-5562. https://doi.org/10.61841/p4kt3661