Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap

Industrial IoT (IIoT) is a novel concept of a fully connected, transparent, automated, and intelligent factory setup improving manufacturing processes and efficiency. To achieve this, existing hierarchical models must transition to a fully connected vertical model. Since IIoT is a novel approach, the environment is susceptible to cyber threat vectors, standardization, and interoperability issues, bridging the gaps at the IT/OT ICS (industrial control systems) level. IIoT M2M communication relies on new communication models (5G, TSN ethernet, self-driving networks, etc.) and technologies which require challenging approaches to achieve the desired levels of data security. Currently there are no methods to assess the vulnerabilities/risk impact which may be exploited by malicious actors through system gaps left due to improper implementation of security standards. The authors are currently working on an Industry 4.0 cybersecurity project and the insights provided in this paper are derived from the project. This research enables an understanding of converged/hybrid cybersecurity standards, reviews the best practices, and provides a roadmap for identifying, aligning, mapping, converging, and implementing the right cybersecurity standards and strategies for securing M2M communications in the IIoT.

[1]  Yuqian Lu,et al.  Standards for Smart Manufacturing: A review , 2019, 2019 IEEE 15th International Conference on Automation Science and Engineering (CASE).

[2]  P. Eng,et al.  7 Steps to ICS and SCADA Security , 2012 .

[3]  Xi Chen,et al.  Analysis on security standards for industrial control system and enlightenment on relevant Chinese standards , 2016, 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA).

[4]  Henning Trsek,et al.  Analysis of the Cyber-Security of industry 4.0 technologies based on RAMI 4.0 and identification of requirements , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).

[5]  Christoph Schmittner,et al.  Application of IEC 62443 for IoT Components , 2018, SAFECOMP Workshops.

[6]  Yacine Challal,et al.  A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.

[7]  Tanesh Kumar,et al.  5G security: Analysis of threats and solutions , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[8]  Saqib Ali,et al.  Cyber Security for Cyber Physical Systems , 2018, Studies in Computational Intelligence.

[9]  IMT Vision – Framework and overall objectives of the future development of IMT for 2020 and beyond M Series Mobile , radiodetermination , amateur and related satellite services , 2015 .

[10]  Kyoung Dae Kim,et al.  An Overview and Some Challenges in Cyber-Physical Systems , 2013 .

[11]  Kyungho Lee,et al.  Advanced Approach to Information Security Management System Model for Industrial Control System , 2014, TheScientificWorldJournal.

[12]  Hans A. Hansson,et al.  Applicability of the IEC 62443 standard in Industry 4.0 / IIoT , 2019, ARES.

[13]  Jian Zhou,et al.  Smart manufacturing standardization: Architectures, reference models and standards framework , 2018, Comput. Ind..

[14]  R.S.H. Piggin Development of industrial cyber security standards: IEC 62443 for SCADA and Industrial Control System security , 2013 .

[15]  Sushmita Ruj,et al.  A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT , 2020, J. Netw. Comput. Appl..

[16]  Cristina Cano,et al.  A Square Peg in a Round Hole: The Complex Path for Wireless in the Manufacturing Industry , 2018, IEEE Communications Magazine.

[17]  Muhammad Murtaza Yousaf,et al.  Security assessment of data management systems for cyber physical system applications , 2019, J. Softw. Evol. Process..

[18]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[19]  Yashwant Singh,et al.  IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges , 2020, IEEE Access.

[20]  Andrea Bartoli,et al.  Advanced security taxonomy for machine-to-machine (M2M) communications in 5G capillary networks , 2015 .

[21]  Peter Burnap,et al.  SCADA System Forensic Analysis Within IIoT , 2017 .

[22]  Min Chen,et al.  Machine-to-Machine Communications: Architectures, Standards and Applications , 2012, KSII Trans. Internet Inf. Syst..

[23]  Dmitry Korzun,et al.  Secure Communication and Data Processing Challenges in the Industrial Internet , 2016, Balt. J. Mod. Comput..

[24]  Quan Wang,et al.  Comparative Examination on Architecture and Protocol of Industrial Wireless Sensor Network Standards , 2016, IEEE Communications Surveys & Tutorials.

[25]  Sundeep Rangan,et al.  Towards 6G Networks: Use Cases and Technologies , 2019, ArXiv.

[26]  Antonio Skarmeta,et al.  Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks , 2020, IEEE Journal on Selected Areas in Communications.

[27]  Karen A. Scarfone,et al.  Guide to Securing Legacy IEEE 802.11 Wireless Networks , 2008 .

[28]  Alex Talevski,et al.  Comparison of industrial WSN standards , 2010, 4th IEEE International Conference on Digital Ecosystems and Technologies.

[29]  David Hutchison,et al.  A survey of cyber security management in industrial control systems , 2015, Int. J. Crit. Infrastructure Prot..

[30]  Sheila E. Frankel,et al.  Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i , 2007 .

[31]  Mohsen Guizani,et al.  M2M Communications in 5G: State-of-the-Art Architecture, Recent Advances, and Research Challenges , 2017, IEEE Communications Magazine.

[32]  Jacek Rak,et al.  Guide to Disaster-Resilient Communication Networks , 2020, Computer Communications and Networks.

[33]  Cuong Nguyen,et al.  NIST framework and roadmap for smart grid interoperability standards, release 4.0 , 2021 .

[35]  Johannes Schneider,et al.  A security evaluation of IEC 62351 , 2017, J. Inf. Secur. Appl..

[36]  Antonio Skarmeta,et al.  Challenges in Cybersecurity and Privacy - the European Research Landscape , 2019, Challenges in Cybersecurity and Privacy - the European Research Landscape.

[37]  Chantal CHERIFI,et al.  Wireless Connectivity of CPS for Smart Manufacturing: A Survey , 2018, 2018 12th International Conference on Software, Knowledge, Information Management & Applications (SKIMA).

[38]  Jürgen Dunkel,et al.  Intelligent M2M: Complex event processing for machine-to-machine communication , 2015, Expert Syst. Appl..

[39]  Andrei V. Gurtov,et al.  Secure communication channel architecture for Software Defined Mobile Networks , 2017, Comput. Networks.

[40]  Manan Shah,et al.  A Comprehensive Study on Critical Security Issues and Challenges of the IoT World , 2020, Journal of Data, Information and Management.

[41]  Stephen Hailes,et al.  Security of smart manufacturing systems , 2018 .

[42]  Sufian Hameed,et al.  Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review , 2019, J. Comput. Networks Commun..

[43]  Yan Lu,et al.  Standards landscape and directions for smart manufacturing systems , 2015, 2015 IEEE International Conference on Automation Science and Engineering (CASE).

[44]  Jeffrey L. Hieb,et al.  Cyber security risk assessment for SCADA and DCS networks. , 2007, ISA transactions.

[45]  Athanasios V. Vasilakos,et al.  A review of industrial wireless networks in the context of Industry 4.0 , 2015, Wireless Networks.

[46]  Justin Varghese,et al.  Security issues in SCADA based industrial control systems , 2017, 2017 2nd International Conference on Anti-Cyber Crimes (ICACC).

[47]  Ramjee Prasad,et al.  Cyber Security for IntelligentWorld with Internet of Things and Machine to Machine Communication , 2015, J. Cyber Secur. Mobil..

[48]  P. Martigne Overview of ETSI machine-to-machine and oneM2M architectures , 2015 .