Loading [MathJax]/extensions/MathMenu.js
Protocol Security in the Industrial Internet of Things | IEEE Conference Publication | IEEE Xplore

Protocol Security in the Industrial Internet of Things


Abstract:

Advances like Industry 4.0 lead to a rising number of Internet-connected industrial deployments and thus an Industrial Internet of Things with growing attack vectors. To ...Show More

Abstract:

Advances like Industry 4.0 lead to a rising number of Internet-connected industrial deployments and thus an Industrial Internet of Things with growing attack vectors. To uphold a secure and safe operation of these deployments, industrial protocols nowadays include security features, e.g., end-to-end secure communication. However, so far, it is unclear how well these features are used in practice and which obstacles might prevent operators from securely running their deployments.In this research description paper, we summarize our recent research activities to close this gap. Specifically, we show that even secure-by-design protocols are by far no guarantee for secure deployments. Instead, many deployments still open the doors for eavesdropping attacks or malicious takeovers. Additionally, we give an outlook on how to overcome identified obstacles allowing operators to configure their deployments more securely.
Date of Conference: 06-10 May 2024
Date Added to IEEE Xplore: 02 July 2024
ISBN Information:

ISSN Information:

Conference Location: Seoul, Korea, Republic of

Funding Agency:


I. Introduction

While industrial networks, e.g., for factory and process automation, traditionally were designed as isolated networks, advances like Industry 4.0 [1] significantly increase the network connectivity leading to a growing Industrial Internet of Things (IIoT). Thus, today’s modern Internet-connected industrial networks offer a large variety of attack vectors that already have been exploited by several incidents, e.g., NotPetya or manipulation attacks on several industrial devices [2]. Hence, IIoT deployments require notable adaptations in security. Particularly, end-to-end secure communication via the Internet and access control are important to prevent attackers from (i) eavesdropping sensitive data and (ii) maliciously controlling production lines.

Contact IEEE to Subscribe

References

References is not available for this document.