Cyber security Threat Mitigation in Architectures for Industrial IOT
DOI:
https://doi.org/10.61841/p4kt3661Keywords:
Attacks, Cryptography, Industry 4.0, IOT Security, Threats, VulnerabilitiesAbstract
The industrial IOT applications are rapidly growing and transforming the traditional industries to smart industries (Industry 4.0), along with the impending consumer IOT adoption. It is therefore necessary to adapt and deploy a reliable cyber security software architecture. Due to the immense security challenges in IIOT, this paper tries to approach the concerns from an end-to-end IIOT solution security perspective. In this paper, we discuss the current architectural framework and study how they can address challenges like scalability, integration problems, data privacy, and security, and how the framework improves the security in the IIOT environment and reduces cost. With respect to the aspect of cost, we highlight the factors and specific costs in developing an IOT application. This paper also explains the security requirements, practices, and types of attacks on the IOT architecture. Here, we highlight the critical problems (threats/attacks/vulnerabilities) and their detection, prevention, and mitigation techniques. The authors aim is to prepare a study of existing protocols, frameworks, and architectures currently proposed in active research based on various parameters as well as to review the existing technology and project requirements in IIOT to understand both technology and stakeholder impact over IIOT security.
Downloads
References
1. Ahmed, Ali & Ibrahim, Nagwa. (2017). “Modern IoT Architectures Review: A Security Perspective,” 8th Annual International Conference on ICT: Big Data, Cloud, and Security (ICT-BDCS 2017). DOI:10.5176/2251-2136_ICT-BDCS17.30.
3. Andrea, C. Chrysostomou, and G. Hadjichristofi, "Internet of Things: Security Vulnerabilities and Challenges," 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, 2015, pp. 180-187, doi: 10.1109/ISCC.2015.7405513.
4. Bissel, La Salle, Dal Chin. (2020). Innovate forcyberrresilience. AccentureSecurity Study. https://www.accenture.com/_acnmedia/PDF-116/Accenture-Cybersecurity-Report-2020.pdf
5. Bissel, La Salle, Dal Chin. (2018). The Cost of Cybercrime. Accenture Study. https://www.accenture.com/_acnmedia/pdf-96/accenture-2019-cost-of-cybercrime-study-final.pdf
6. Chase, J. (2013). The evolution of the internet of things. Texas Instruments white paper. http://www.ti.com/lit/ml/swrb028/swrb028.pdf
7. Cheruvu S., Kumar A., Smith N., Wheeler D.M. (2020) IoT Frameworks and Complexity.In Demystifying Internet of Things Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2896-8_2
8. Curtis, Hywel. (2018). Why you need automated security for the Internet of Things. . Venafi.
9. https://www.venafi.com/blog/why-you-need-automated-security-internet-things-iot.
10. Dev Technosys (2018, May 22). How Much Does It Cost to Develop an IoT Application? ? Business of Apps. https://www.businessofapps.com/news/how-much-does-it-costs-to-develop-iot-application/
11. Filho (2020). Vulnerabilities and security issues of IoT devices. Sikur Lab whitepaper.DOI:10.13140/RG.2.2.14211.86562.
12. Gochhait, S., Shou, D.T., & Fazalbhoy, S. (2020). Cloud Computing Applications and Techniques for Ecommerce. IGI Global. http://doi:10.4018/978-1-7998-1294-4
13. Islam, S.M., Kwak, D., Kabir, M.H., Hossain, M., & Kwak, K. (2015). The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access, 3, 678-708.
14. Ivan Valeryevich Evdokimov et al 2019 J. Phys.: Conf. Ser. 1176 042083
15. A cost-testing approach for IOT projects.
16. https://iopscience.iop.org/article/10.1088/1742-6596/1176/4/042083
17. Liu, Y. Xiao, and C. L. P. Chen, "Authentication and Access Control in the Internet of Things," 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, 2012, pp. 588–5922, DOI:10.1109/ICDCSW.2012.23.
18. Kaushik, Keshav & Dahiya, Susheela. (2018). Security and Privacy in Io-Based E-Business and Retail. 78-81. 10.1109/SYSMART.2018.8746961
19. Khalid, A., Butt, S. A., Jamal, T., & Gochhait, S. (2020). Agile Scrum Issues at Large-Scale Distributed Projects: Scrum Project Development at Large. International Journal of Software Innovation (IJSI), 8(2), 85-94. doi:10.4018/IJSI.2020040106.
20. Milosevic, Jelena, Sklavos, Nicolas, & Koutsikou, Konstantina. (2016). Malware in IoT Software and Hardware. Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE'16)
21. https://www.researchgate.net/publication/317011595_Malware_in_IoT_Software_and_Hardware.
22. Parotkin, Nikolay & Zolotarev, Vyacheslav. (2018). Information Security of IoT Wireless Segment. 1-7.10.1109/GloSIC.2018.8570144
23. Radanliev, P., De Roure, C., Cannady, S., Montalvo, R.M., Nicolescu, R., Huth, M., 2018. Economic impact of IoT cyber risk: analyzing past and present to predict future developments in IoT risk analysis and IoT cyber insurance, in: Living in the Internet of Things: Cybersecurity of the IoT - 2018. Institution of Engineering and Technology, London. https://doi.org/10.1049/cp.2018.0003
24. Rak M., Casola V., De Benedictis A., Villano U. (2019) Automated Risk Analysis for IoT Systems. In: Xhafa F., Leu FY., Ficco M., Yang CT. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2018. Lecture Notes on Data Engineering and Communications Technologies, vol. Springer.
25. Robles, Daisy & Robles, Rosslin. (2019). State of Internet of Things (IoT) Security Attacks, Vulnerabilities, and Solutions. 3. 255-263. https://www.researchgate.net/publication/334224658_State_of_Internet_of_Things_IoT_Security_Attacks_Vulnerabilities_and_Solutions/citations
26. R. Sharma, N. Pandey and S. K. Khatri, "Analysis of IoT security at network layer, 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, 2017, pp. 585-590
27. The Internet of Things Reference Model (2014). Cisco whitepaper. http://cdn.iotwf.com/resources/71/IoT_Reference_Model_White_Paper_June_4_2014.pdf.
28. Tsai, Chang (2004). Function-based cost estimation integrates quality function deployment to support system design. International Journal of Advanced Manufacturing Technology 23(7):514-522. DOI: 23. 514-522. 10.1007/s00170-003-1564-7.
29. Ud Din, Ikram & Guizani, Mohsen & Kim, Byung-Seo & Hassan, Suhaidi & Khan, Khurram. (2018). Trust Management Techniques for the Internet of Things: A Survey. IEEE Access. PP. 1-1.10.1109/ACCESS.2018.2880838.
30. Varga, Pal & Plósz, Sándor & Soos, Gabor & Hegedus, Csaba. (2017). Security Threats and Issues in Automation IoT. 10.1109/WFCS.2017.7991968.
31. Yu, B., Wright, J., Nepal, S., Zhu, L., Liu, J., & Ranjan, R. (2018). IoTChain: establishing trust in the Internet of Things ecosystem using blockchain. IEEE Cloud Computing, 5(4), 12-23
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.