Availability Models of Industrial Internet of Things Wired System Considering Cyberattacks

A promising direction for the development of industrial enterprises is the Industrial Internet of Things (IIoT) technologies introduction. The paper presents the features of such systems organization and assesses the reliability of the functioning of the wired IIoT system. investigation of an important reliability indicator of a reconstructed wired IIoT system was provided, the availability function (AC), were carried out, which showed that it is necessary to increase the reliability of the server and the system power cables. The paper also assesses the dependability of the IIoT wired system using the mathematical apparatus of Markov models in the event of cyberattacks on the IIoT subsystems. A research of this system’s AC showed, that cyberattacks decreases mostly the AC value of IIoT wired system.

[1]  Yohei Tanaka,et al.  Tracking attack sources based on traceback honeypot for ICS network , 2017, 2017 56th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE).

[2]  Liang Cheng,et al.  Detecting Payload Attacks on Programmable Logic Controllers (PLCs) , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).

[3]  Khaled M. Khan,et al.  Cybersecurity for industrial control systems: A survey , 2020, Comput. Secur..

[4]  Shingo Abe,et al.  Security threats of Internet-reachable ICS , 2016, 2016 55th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE).

[5]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[6]  D. A. Dube,et al.  Risk management guidelines , 1992 .

[7]  Chong Xiang,et al.  Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment Environment , 2015, 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP).

[8]  Bünyamin Ciylan,et al.  Cyber security in industrial control systems: Analysis of DoS attacks against PLCs and the insider effect , 2018, 2018 6th International Istanbul Smart Grids and Cities Congress and Fair (ICSG).

[9]  Christian Diedrich,et al.  Identifying false data injection attacks in industrial control systems using artificial neural networks , 2017, 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).

[10]  Threat landscape for industrial automation systems , 2018 .

[11]  Robert E. Johnson,et al.  Survey of SCADA security challenges and potential attack vectors , 2010, 2010 International Conference for Internet Technology and Secured Transactions.

[12]  Nasser Modiri,et al.  Information Security Management , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.

[13]  G. Stoneburner,et al.  Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .

[14]  Vyacheslav S. Kharchenko,et al.  IoT Server Availability Considering DDoS-attacks: Analysis of Prevention Methods and Markov Model , 2019, 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT).