Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures

被引:66
|
作者
Tsiknas, Konstantinos [1 ]
Taketzis, Dimitrios [2 ]
Demertzis, Konstantinos [3 ]
Skianis, Charalabos [4 ]
机构
[1] Democritus Univ Thrace, Dept Elect & Comp Engn, Xanthi 67100, Greece
[2] Hellen Natl Def Gen Staff, Athens 15561, Greece
[3] Int Hellen Univ, Fac Sci, Dept Phys, Lab Complex Syst, Kavala Campus, St Loukas 65404, Greece
[4] Univ Aegean, Dept Informat & Commun Syst Engn, Samos 83200, Greece
来源
IOT | 2021年 / 2卷 / 01期
关键词
IIoT; IoT; Industry; 4.0; protocols; cyber threats; attacks; security; ANOMALY DETECTION; INTERNET; SECURITY; THINGS; RANSOMWARE; PRIVACY; ISSUES; SYSTEM;
D O I
10.3390/iot2010009
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In today's Industrial Internet of Things (IIoT) environment, where different systems interact with the physical world, the state proposed by the Industry 4.0 standards can lead to escalating vulnerabilities, especially when these systems receive data streams from multiple intermediaries, requiring multilevel security approaches, in addition to link encryption. At the same time taking into account the heterogeneity of the systems included in the IIoT ecosystem and the non-institutionalized interoperability in terms of hardware and software, serious issues arise as to how to secure these systems. In this framework, given that the protection of industrial equipment is a requirement inextricably linked to technological developments and the use of the IoT, it is important to identify the major vulnerabilities and the associated risks and threats and to suggest the most appropriate countermeasures. In this context, this study provides a description of the attacks against IIoT systems, as well as a thorough analysis of the solutions for these attacks, as they have been proposed in the most recent literature.
引用
收藏
页码:163 / 186
页数:24
相关论文
共 50 条
  • [21] A deep hybrid learning model for detection of cyber attacks in industrial IoT devices
    Mohammad Shahin
    F. Frank Chen
    Ali Hosseinzadeh
    Hamed Bouzary
    Rasoul Rashidifar
    The International Journal of Advanced Manufacturing Technology, 2022, 123 : 1973 - 1983
  • [22] Cyber Threats/Attacks and a Defensive Model to Mitigate Cyber Activities
    Awan, Jawad Hussain
    Memon, Shahzad
    Memon, Sheeraz
    Pathan, Kamran Taj
    Arijo, Niaz Hussain
    MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2018, 37 (02) : 359 - 366
  • [23] Comparative Analysis of Governmental Countermeasures to Cyber attacks
    Soo, Lee Heon
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 95 - 100
  • [24] A Survey on Cyber Security Threats
    Gulshan
    Chauhan, Sansar Singh
    Proceedings of International Conference on Technological Advancements and Innovations, ICTAI 2021, 2021, : 218 - 223
  • [25] Cyber Threats Classifications and Countermeasures in Banking and Financial Sector
    Darem, Abdulbasit A.
    Alhashmi, Asma A.
    Alkhaldi, Tareq M.
    Alashjaee, Abdullah M.
    Alanazi, Sultan M.
    Ebad, Shouki A.
    IEEE ACCESS, 2023, 11 : 125138 - 125158
  • [26] Cyber-Physical Systems: Security Threats and Countermeasures
    Hammoudeh, Mohammad
    Epiphaniou, Gregory
    Pinto, Pedro
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (01)
  • [27] Survey of Attacks and Countermeasures for SDN
    BAI Jiasong
    ZHANG Menghao
    BI Jun
    ZTE Communications, 2018, 16 (04) : 3 - 8
  • [28] A Literature Survey and Analysis of Defending Cyber Attacks Targeting IoT in Critical infrastructure
    Al-Sinayyid, Ali
    Sasidhar, Kadiyala
    Jewel, Md Julifiker Ali
    Mannuru, Venkatesh
    2023 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE, CSCI 2023, 2023, : 823 - 829
  • [29] A Survey on Threats and Countermeasures in Smart Meter
    Pealy, Syeda
    Matin, Mohammad Abdul
    2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORKS AND SATELLITE (COMNETSAT), 2020, : 417 - 422
  • [30] When SDN Meets Low-rate Threats: A Survey of Attacks and Countermeasures in Programmable Networks
    Tang, Dan
    Dai, Rui
    Yan, Yudong
    Li, Keqin
    Liang, Wei
    Qin, Zheng
    ACM COMPUTING SURVEYS, 2025, 57 (04)