Conference Paper

Cybersecurity Challenges in Large Industrial IoT Systems

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

To achieve efficient and flexible systems when running production processes at affordable prices an industrial automation is pushed towards digital transformation. Such a transformation assumes an enhancement of current Industrial Automated Control Systems (IACS) with a large amount of IoTdevices in order to form an Industrial Internet of Things (IIoT). The aim is to enable a shift from an automatic towards an autonomous control in such systems. This paper discusses some of the main challenges such IIoT system is facing with respect to cybersecurity. We discuss our findings in an example of a flowcontrol loop, where we apply a simple threat model based on the STRIDE method to and deduce cybersecurity requirements in an IIoT context. Moreover, the identified requirements are assessed in the light of current state of the art solutions, and a number of challenges are discussed with respect to a large-scale IIoT system, together with some suggestions for future work.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Nowadays, the key challenge of effective cybersecurity assurance is the rapid advancement of information technology, with new types of threats and unprecedented discrepancies emerging daily. Existing security techniques are designed for the discovery and prevention of a specific type of problem, and hence having difficulties in adapting to new threats [5,37]. ...
Preprint
Full-text available
The digitalization of our society is only possible in secure software systems governing ongoing critical processes. The understanding of mutual interdependencies of events and processes is crucial for cybersecurity. One of the promising ways to tackle these challenges is process mining, which is a set of techniques that aim to mine knowledge from processes. However, it is unclear how process mining can be practically used in the context of cybersecurity. In this work, we investigate the potential of applying process mining in cybersecurity and support research efforts in this area via collecting existing applications, discussing current trends, and providing promising research directions. To this end, we have conducted a systematic literature review covering all relevant works between 2014 and 2020.
... These are principles to keep in mind while setting up any chain of interconnected devices and are a part of ethical practices to ensure security and privacy of users. The major effects of weak cybersecurity are related to IIoT [163] and CPS. Figure 8 depicts the elements of Cybersecurity in the professional environment. A research proposed 6 layers of cybersecurity for ensuring safety of the technologies and data. ...
Article
Since the first Industrial Revolution the trends in manufacturing have evolved a lot, from mechanical production to the era of smart manufacturing via technologies like Cyber Physical Systems, Internet of Things, Big Data, Cyber Security, Cloud Computing, Additive Manufacturing, Advanced robots, Modelling and Simulation and Augmented Virtual Reality. These technologies are enabling Interoperability and integration of various processes and departments in an organization because of the attribute of real-time inter-connectivity. Due to high inter-connectivity advantages like shorter development time, mass customization and modularity, configurability can be brought into existence. This will not only change the dynamics of the production lines but also add to the profit ratio of an organization by controlling over inventory via virtualization and predictive manufacturing. Due to such attributes of the Industry 4.0 paradigm, understanding them in depth is necessary. Hence, this paper aims to review many such characteristics, enablers, and main drivers of the Industry 4.0 paradigm and ultimately provides insight on the future scopes of each of the main pillars of Industry 4.0.
... Cyber security encompasses various areas of expertise and with the diversity of attack vectors ever growing, considerations should be given on how to mitigate the potential impact from incidents or tackle the underlying roots that may lead to prevention. As the world grows ever more connected with progress towards the IoT, Smart Cities, Industry 4.0, as well as increased remote working, online communications, and data storage needs, challenges are escalating for providing effective security measures and procedures [36,15,34,14,38,8]. This is exemplified through high profile cases in recent years, such as the WannaCry ransomware attack in May 2017, which had infected over 200,000 computers within a short span of time, causing estimates of damages in the hundreds of millions, if not billions of dollars. ...
Article
Training effective simulation scenarios presents numerous challenges from a pedagogical point of view. Through application of the Conceptual Framework for e-Learning and Training (COFELET) as a pattern for designing serious games, we propose the use of the Simulated Critical Infrastructure Protection Scenarios (SCIPS) platform as a prospective tool for supporting the process of providing effective cyber security training. The SCIPS platform is designed to run different scenarios, such as examples in financial forecasting and business infrastructures, with an initial scenario developed in collaboration with industrial partners focusing on an electricity generation plant. Focus groups from these sources were conducted to identify design and developmental considerations for the platform. As an extension from the COFELET framework, we propose an intelligence scaffolding practice as a guidance mechanic taking the form of an agent within the scenario. The agent represents a major innovation in the system and we envisage a deep learning-based augmentation to further adapt towards the behavioural aspects of learners.
... Another emerging threat model is STRIDE (Spoofing, Tampering, Information disclosure, Denial of service and Elevation Of privilege). This system can define security zones in a system block diagram, check any interplay between them and itemize any threat-per-class for that interchange [19]. ...
... They selected and justified security assurance controls by using the US Defense Information Systems Agency's Security Technical Implementation Guides for control and selection of national security systems. Leander et al. [24] discussed the main challenges faced in ICS and IoT systems concerning cybersecurity. They presented findings as a flow-control loop applied to a simple threat model and deduced cybersecurity requirements [25]. ...
Article
Full-text available
Industrial Control Systems monitor, automate, and operate complex infrastructure and processes that integrate into critical industrial sectors that affect our daily lives. With the advent of networking and automation, these systems have moved from being dedicated and independent to centralized corporate infrastructure. While this has facilitated the monitoring and overall management using traditional detection methods, Web Application Firewalls or Intrusion Detection Systems has exposed the networks subjecting them to Behavior-based cybersecurity attacks. Such attacks alter the control flow and processes and have the malicious ability to alter the functioning of these systems altogether. This research focuses on the use of process analytics to detect attacks in the industrial control infrastructure systems and compares the effectiveness of signature-based detection methods. The proposed work presents a pattern recognition algorithm aptly named as “Capturing-the-Invisible (CTI)” to find the hidden process in industrial control device logs and detect Behavior-based attacks being performed in real-time.
Chapter
This article addresses cyber security risk assessment in industrial internet of things (IIoT) networks, and particularly the continuous risk assessment (CRA) process, which assumes real-time, dynamic risk evaluation based on the run-time data. IIoT cyber security risks, threats, and attacks are briefly presented. Requirements for cyber security risk assessment of industrial control systems as well as applicability of machine learning for that purpose are considered. The architectural view of the CRA process in the IIoT environment is presented and discussed. Possibilities of deep learning approaches to achieve CRA in IIoT systems are explored. Deep learning can be integrated into edge-computing-based systems and used for feature extraction and risk classification from massive raw data. Several research works are presented and briefly discussed. The article ends with emphasizing the future research directions and concluding remarks.
Research
Full-text available
The Internet of things has gained intense popularity in the past few years. It has become one of the most important technologies. However, along with gaining popularity, threats related to cyber security have increased. As the name suggests, the Internet of Things, is completely based on the internet which means a hacker can find a weak link in the network and exfiltrate data to the cloud and threaten to keep, delete or make the data public. This includes sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems. Cybersecurity is a set of processes, tools and frameworks to protect networks, devices, programs and data from cyber attacks.This paper highlights the different types of Cyber attacks possible on IoT and suggests few mitigations towards it.
Chapter
The digitalization of our society is only possible in secure software systems governing ongoing critical processes. The understanding of mutual interdependencies of events and processes is crucial for cybersecurity. One of the promising ways to tackle these challenges is process mining, which is a set of techniques that aim to mine knowledge from processes. However, it is unclear how process mining can be practically used in the context of cybersecurity. In this work, we investigate the potential of applying process mining in cybersecurity and support research efforts in this area via collecting existing applications, discussing current trends, and providing promising research directions. To this end, we have conducted a systematic literature review covering all relevant works between 2014 and 2020.
Article
The digitalization of our society is only possible in the presence of secure and reliable software systems governing ongoing critical processes, so-called critical information infrastructures. The understanding of mutual interdependencies of events and processes is crucial for cybersecurity and software reliability. One of the promising ways to tackle these challenges is process mining, which is a set of techniques that aims to mine essential knowledge from processes, thus providing more perspectives and temporal context to data interpretation and process understanding. However, it is unclear how process mining can help and can be practically used in the context of cybersecurity and reliability. Therefore, in this work, we investigate the potential of process mining to aid in cybersecurity and software reliability to analyze and support research efforts in these areas. Concretely, we collect existing process mining applications, discuss current trends and promising research directions that can be used to tackle the current cybersecurity and software reliability challenges. To this end, we conduct a systematic literature review covering 35 relevant research approaches to examine how the process mining is currently used for these tasks and what are the research gaps and promising research directions in the area. This work is an extension of our previous work, which focused solely on the cybersecurity area, based on the observation of relative closeness and similar goals of those two fields, in which some approaches tend to overlap.
Article
Full-text available
Historically, Industrial Automation and Control Systems (IACS) were largely isolated from conventional digital networks such as enterprise ICT environments. Where connectivity was required, a zoned architecture was adopted, with firewalls and/or demilitarized zones used to protect the core control system components. The adoption and deployment of ‘Internet of Things’ (IoT) technologies is leading to architectural changes to IACS, including greater connectivity to industrial systems. This paper reviews what is meant by Industrial IoT (IIoT) and relationships to concepts such as cyber-physical systems and Industry 4.0. The paper develops a definition of IIoT and analyses related partial IoT taxonomies. It develops an analysis framework for IIoT that can be used to enumerate and characterise IIoT devices when studying system architectures and analysing security threats and vulnerabilities. The paper concludes by identifying some gaps in the literature.
Article
Full-text available
Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of research. In its basic form, a security monitor creates time-series models of sensor readings for an industrial control system and identifies anomalies in these measurements to identify potentially false control commands or false sensor readings. In this article, we review previous work on physics-based anomaly detection based on a unified taxonomy that allows us to identify limitations and unexplored challenges and to propose new solutions.
Article
Full-text available
An integral part of an enterprise computer security incident response team (CSIRT), the security operations center (SOC) is a centralized unit tasked with real-time monitoring and identification of security incidents. Security information and event management (SIEM) systems are an important tool used in SOCs; they collect security events from many diverse sources in enterprise networks, normalize the events to a common format, store the normalized events for forensic analysis, and correlate the events to identify malicious activities in real time. In this article, the authors discuss the critical role SIEM systems play SOCs, highlight the current operational challenges in effectively using SIEM systems, and describe future technical challenges that SIEM systems must overcome to remain relevant.
Article
Full-text available
Remote attestation is the process of securely veri-fying internal state of a remote hardware platform. It can be achieved either statically (at boot time) or dy-namically, at run-time in order to establish a dynamic root of trust. The latter allows full isolation of a code region from preexisting software (including the oper-ating system) and guarantees untampered execution of this code. Despite the untrusted state of the overall platform, a dynamic root of trust facilitates execution of critical code. Prior software-based techniques lack concrete security guarantees, while hardware-based approaches involve security co-processors that are too costly for low-end embedded devices. In this paper, we develop a new primitive (called SMART) based on hardware-software co-design. SMART is a simple, efficient and secure approach for establishing a dynamic root of trust in a re-mote embedded device. We focus on low-end micro-controller units (MCU) that lack specialized memory management or protection features. SMART requires minimal changes to existing MCUs (while providing concrete security guarantees) and assumes few restric-tions on adversarial capabilities. We demonstrate both practicality and feasibility of SMART by implementing it – via hardware modifications – on two common MCU platforms: AVR and MSP430. Results show that SMART implementations require only a few changes to memory bus access logic. We also synthesize both implementations to an 180nm ASIC process to confirm its small impact on MCU size and overall cost.
Article
Full-text available
In recent years, radio frequency identification technology has moved from obscurity into mainstream applications that help speed the handling of manufactured goods and materials. RFID enables identification from a distance, and unlike earlier bar-code technology, it does so without requiring a line of sight. In this paper, the author introduces the principles of RFID, discusses its primary technologies and applications, and reviews the challenges organizations will face in deploying this technology.
Book
This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns. This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat modeling and risk management is the focus of Chapter 5. Chapter 6 and Chapter 7 examine Process for Attack Simulation and Threat Analysis (PASTA). Finally, Chapter 8 shows how to use the PASTA risk-centric threat modeling process to analyze the risks of specific threat agents targeting web applications. This chapter focuses specifically on the web application assets that include customer's confidential data and business critical functionality that the web application provides. Provides a detailed walkthrough of the PASTA methodology alongside software development activities, normally conducted via a standard SDLC process Offers precise steps to take when combating threats to businesses Examines real-life data breach incidents and lessons for risk management Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis is a resource for software developers, architects, technical risk managers, and seasoned security professionals.
Article
The existing 4G networks have been widely used in the Internet of Things (IoT) and is continuously evolving to match the needs of the future Internet of Things (IoT) applications. The 5G networks are expected to massive expand today’s IoT that can boost cellular operationgs, IoT security, and network challenges and driving the Internet future to the edge. The existing IoT solutions are facing a number of challenges such as large number of conneciton of nodes, security, and new standards. This paper reviews the current research state-of-the-art of 5G IoT, key enabling technologies, and main research trends and challenges in 5G IoT.
Article
Social Internet of Things (SIoT) is a new paradigm where IoT merges with Social Networks, allowing people and devices to interact, and facilitating information sharing. However, security and privacy issues are a great challenge for IoT but they are also enabling factors to create a “trust ecosystem”. In fact, the intrinsic vulnerabilities of IoT devices, with limited resources and heterogeneous technologies, together with the lack of specifically designed IoT standards, represent a fertile ground for the expansion of specific cyber threats. In this paper, we try to bring order on the IoT security panorama providing a taxonomic analysis from the perspective of the three main key layers of the IoT system model: Perception, Transportation and Application levels. As a result of the analysis, we will highlight the most critical issues with the aim of guiding future research directions. Index terms: Internet of Things, IoT System Model, Cyber Threats, Trust, IoT Security, IoT Protocols.
Article
This article provides an overview of the development and standardizations of connectivity solutions for enabling the Industrial Internet of Things (IIoT). It also highlights key IIoT connectivity technologies and platforms that have the potential of driving the next industrial revolution. In addition, the article addresses the main challenges standing in the way of realizing the full potential of the IIoT, namely attaining secure connectivity and managing a vastly fragmented ecosystem of connectivity solutions and platforms. Finally, IIoT connectivity challenges are illustrated by the example of future building automation.
Article
Fog is an emergent architecture for computing, storage, control, and networking that distributes these services closer to end users along the cloud-To-Things continuum. It covers both mobile and wireline scenarios, traverses across hardware and software, resides on network edge but also over access networks and among end users, and includes both data plane and control plane. As an architecture, it supports a growing variety of applications, including those in the Internet of Things (IoT), fifth-generation (5G) wireless systems, and embedded artificial intelligence (AI). This survey paper summarizes the opportunities and challenges of fog, focusing primarily in the networking context of IoT.
Article
Motivated by the recent explosion of interest around blockchains, we examine whether they make a good fit for the Internet of Things (IoT) sector. Blockchains allow us to have a distributed peer-to-peer network where non-trusting members can interact with each other without a trusted intermediary, in a verifiable manner. We review how this mechanism works and also look into smart contracts-scripts that reside on the blockchain that allow for the automation of multi-step processes. We then move into the IoT domain, and describe how a blockchain-IoT combination: 1) facilitates the sharing of services and resources leading to the creation of a marketplace of services between devices and 2) allows us to automate in a cryptographically verifiable manner several existing, time-consuming workflows. We also point out certain issues that should be considered before the deployment of a blockchain network in an IoT setting: from transactional privacy to the expected value of the digitized assets traded on the network. Wherever applicable, we identify solutions and workarounds. Our conclusion is that the blockchain-IoT combination is powerful and can cause significant transformations across several industries, paving the way for new business models and novel, distributed applications.
Article
Today, embedded, mobile, and cyberphysical systems are ubiquitous and used in many applications, from industrial control systems, modern vehicles, to critical infrastructure. Current trends and initiatives, such as "Industrie 4.0" and Internet of Things (IoT), promise innovative business models and novel user experiences through strong connectivity and effective use of next generation of embedded devices. These systems generate, process, and exchange vast amounts of security-critical and privacy-sensitive data, which makes them attractive targets of attacks. Cyberattacks on IoT systems are very critical since they may cause physical damage and even threaten human lives. The complexity of these systems and the potential impact of cyberattacks bring upon new threats. This paper gives an introduction to Industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards a holistic security framework for Industrial IoT systems.
Conference Paper
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We develop a new cryptosystem for flne-grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption (KP-ABE). In our cryptosystem, ciphertexts are labeled with sets of attributes and private keys are associated with access structures that control which ciphertexts a user is able to decrypt. We demonstrate the applicability of our construction to sharing of audit-log information and broadcast encryption. Our construction supports delegation of private keys which subsumes Hierarchical Identity-Based Encryption (HIBE).
Conference Paper
This paper describes the EC PERMIS project, which has developed a role based access control infrastructure that uses X.509 attribute certificates (ACs) to store the users’ roles. All access control decisions are driven by an authorisation policy, which is itself stored in an X.509 AC, thus guaranteeing its integrity. All the ACs can be stored in one or more LDAP directories, thus making them widely available. Authorisation policies are written in XML according to a DTD that has been published at XML.org. The Access Control Decision Function (ADF) is written in Java and the Java API is simple to use, comprising of just three methods and a constructor. There is also a Privilege Allocator, which is a tool that constructs and signs ACs and stores them in an LDAP directory for subsequent use by the ADF.
Conference Paper
In an open network computing environment, a workstation cannot be trusted to identify its users correctly to network services. Kerberos provides an alternative approach whereby a trusted third-party authentication service is used to verify users' identities. This paper gives an overview of the Kerberos authentication model as imple- mented for MIT's Project Athena. It describes the protocols used by clients, servers, and Kerberos to achieve authentication. It also describes the management and replication of the database required. The views of Kerberos as seen by the user, programmer, and administrator are described. Finally, the role of Kerberos in the larger Athena picture is given, along with a list of applications that presently use Kerberos for user authentica- tion. We describe the addition of Kerberos authentication to the Sun Network File Sys- tem as a case study for integrating Kerberos with an existing application.
Article
This paper describes the output of the PERMIS project, which has developed a role based access control infrastructure that uses X.509 attribute certificates (ACs) to store the users' roles. All access control decisions are driven by an authorization policy, which is itself stored in an X.509 attribute certificate, thus guaranteeing its integrity. All the ACs can be stored in one or more LDAP directories, thus making them widely available. Authorization policies are written in XML according to a DTD that has been published at XML.org. The Access Control Decision Function (ADF) is written in Java and the Java API is simple to use, comprising of just 3 methods and a constructor. There is also a Privilege Allocator, which is a tool that constructs and signs attribute certificates and stores them in an LDAP directory for subsequent use by the ADF.
Article
This paper estimates service lifetimes for capital assets in Dutch manufacturing industries, using information on asset retirement patterns. A Weibull distribution function is estimated using a non-linear regression technique to derive service lifetimes for three selected asset types: transport equipment, machinery and computers. For this purpose, benchmark capital stock surveys for different two-digit industries are linked to annual discard surveys. On average the estimated lifetimes are 6, 9 and 26 years for transport equipment, computers and machinery, respectively. However, these estimates vary across industries. A comparison of our estimates with Canadian, U.S. and Japanese estimates shows notable differences in the lifetimes of all the asset types, with machinery showing the largest difference. Copyright 2008 The Author. Journal compilation International Association for Research in Income and Wealth 2008.
Glossary of key information security terms
  • R Kissel
R. Kissel, Glossary of key information security terms, Rev. 2. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2013.
Microsoft Azure IoT Reference Architecture
  • Microsoft
Microsoft, "Microsoft Azure IoT Reference Architecture." https://aka. ms/iotrefarchitecture, 2018. [Online; accessed 29-may-2019].
Internet of Things (IoT) security architecture
  • R Shahan
  • B Lamos
R. Shahan and B. Lamos, "Internet of Things (IoT) security architecture." https://docs.microsoft.com/en-us/azure/iot-fundamentals/ iot-security-architecture, 2018. [Online; accessed 29-may-2019].
The STRIDE Threat Model
  • Microsoft
Microsoft, "The STRIDE Threat Model." https://docs.microsoft.com/ en-us/previous-versions/commerce-server/ee823878(v=cs.20), 2005. [Online; accessed 5-march-2019].
The OAuth 2.0 Authorization Framework
  • D Hardt
D. Hardt, "The OAuth 2.0 Authorization Framework." Internet Requests for Comments, October 2012.
Encyclopedia of Cryptography and Security: Intrusion Detection in Ad Hoc Networks
  • Q Gu
Q. Gu, Encyclopedia of Cryptography and Security: Intrusion Detection in Ad Hoc Networks, pp. 620-623. Boston, MA: Springer US, 2011.
  • Industrial Internet Consortium
Industrial Internet Consortium, "Industrial Internet of Things Volume G4 : Security Framework," 2016.
ISO/IEC 19770-2:2015 IT Asset Management Part 2: Software Identification tag
  • Iso Iec
ISO IEC, "ISO/IEC 19770-2:2015 IT Asset Management Part 2: Software Identification tag," tech. rep., ISO/IEC, 2015.
  • gu
  • schoenmakers
  • challener
  • avoine