Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures

被引:66
|
作者
Tsiknas, Konstantinos [1 ]
Taketzis, Dimitrios [2 ]
Demertzis, Konstantinos [3 ]
Skianis, Charalabos [4 ]
机构
[1] Democritus Univ Thrace, Dept Elect & Comp Engn, Xanthi 67100, Greece
[2] Hellen Natl Def Gen Staff, Athens 15561, Greece
[3] Int Hellen Univ, Fac Sci, Dept Phys, Lab Complex Syst, Kavala Campus, St Loukas 65404, Greece
[4] Univ Aegean, Dept Informat & Commun Syst Engn, Samos 83200, Greece
来源
IOT | 2021年 / 2卷 / 01期
关键词
IIoT; IoT; Industry; 4.0; protocols; cyber threats; attacks; security; ANOMALY DETECTION; INTERNET; SECURITY; THINGS; RANSOMWARE; PRIVACY; ISSUES; SYSTEM;
D O I
10.3390/iot2010009
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In today's Industrial Internet of Things (IIoT) environment, where different systems interact with the physical world, the state proposed by the Industry 4.0 standards can lead to escalating vulnerabilities, especially when these systems receive data streams from multiple intermediaries, requiring multilevel security approaches, in addition to link encryption. At the same time taking into account the heterogeneity of the systems included in the IIoT ecosystem and the non-institutionalized interoperability in terms of hardware and software, serious issues arise as to how to secure these systems. In this framework, given that the protection of industrial equipment is a requirement inextricably linked to technological developments and the use of the IoT, it is important to identify the major vulnerabilities and the associated risks and threats and to suggest the most appropriate countermeasures. In this context, this study provides a description of the attacks against IIoT systems, as well as a thorough analysis of the solutions for these attacks, as they have been proposed in the most recent literature.
引用
收藏
页码:163 / 186
页数:24
相关论文
共 50 条
  • [31] Side channel attacks on Smart Cards: Threats & countermeasures
    Krieger, U
    SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 73 - 81
  • [32] A Closer Look at Attacks on Lightweight Cryptosystems: Threats and Countermeasures
    Kodirov, Khusanboy
    Lee, Hoon-Jae
    Lee, Young Sil
    INTELLIGENT HUMAN COMPUTER INTERACTION, IHCI 2023, PT II, 2024, 14532 : 171 - 176
  • [33] Assessing and Proposing Countermeasures for Cyber-Security Attacks
    Al-Zahrani, Ali
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 885 - 895
  • [34] A Planner for Supporting Countermeasures in Large Scale Cyber Attacks
    Amato, Flora
    Moscato, Francesco
    COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, CISIS-2017, 2018, 611 : 964 - 973
  • [35] Securing Smart Grid: Cyber Attacks, Countermeasures, and Challenges
    Li, Xu
    Liang, Xiaohui
    Lu, Rongxing
    Shen, Xuemin
    Lin, Xiaodong
    Zhu, Haojin
    IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (08) : 38 - 45
  • [36] Demonstration: Cyber Attacks on Automation Systems and simple Countermeasures
    Hutterer, Stephan
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2019, 136 (08): : 394 - 395
  • [37] Cyber-Attacks - Trends, Patterns and Security Countermeasures
    Bendovschi, Andreea
    7TH INTERNATIONAL CONFERENCE ON FINANCIAL CRIMINOLOGY 2015, 7TH ICFC 2015, 2015, 28 : 24 - 31
  • [38] Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
    Yaacoub, Jean-Paul A.
    Noura, Hassan N.
    Salman, Ola
    Chehab, Ali
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (01) : 115 - 158
  • [39] A Study on the Government's Countermeasures against Cyber Attacks
    Byeon, Seo-hui
    Suh, Woo-jong
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP 2020), 2020, : 495 - 499
  • [40] Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
    Jean-Paul A. Yaacoub
    Hassan N. Noura
    Ola Salman
    Ali Chehab
    International Journal of Information Security, 2022, 21 : 115 - 158