2021
DOI: 10.3390/info12110460
|View full text |Cite
|
Sign up to set email alerts
|

Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures

Abstract: Cyber-security countermeasures are important for IIoT (industrial Internet of things) systems in which IT (information technology) and OT (operational technology) are integrated. The appropriate asset management is the key to creating strong security systems to protect from various cyber threats. However, the timely and coherent asset management methods used for conventional IT systems are difficult to be implemented for IIoT systems. This is because these systems are composed of various network protocols, var… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…These include, for example, commonly used smartphones, intelligent household appliances and electronics, heating and lighting systems that can be operated remotely using appropriate applications, but also a machine park whose devices connected to the network allow it to be managed from anywhere in the plant and/or outside of it [25][26][27]. There are 5 billion IoT devices worldwide and forecasts show that this will reach 29 billion by 2022 [24] or 9.27 billion according to Matsumoto et al [28].…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%
See 2 more Smart Citations
“…These include, for example, commonly used smartphones, intelligent household appliances and electronics, heating and lighting systems that can be operated remotely using appropriate applications, but also a machine park whose devices connected to the network allow it to be managed from anywhere in the plant and/or outside of it [25][26][27]. There are 5 billion IoT devices worldwide and forecasts show that this will reach 29 billion by 2022 [24] or 9.27 billion according to Matsumoto et al [28].…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%
“…To ensure that real-time communication and control processes (10-100 ms cycle duration) are not disrupted, security countermeasures are required in IoT. However, solutions used in IT systems such as malware detection software are insufficient [28]. In typical IIoT, symmetric-key cryptography can provide a lightweight solution [83].…”
Section: B Lack Of Budget and Knowledgementioning
confidence: 99%
See 1 more Smart Citation
“…These vulnerabilities directly connect to the network and provide a breach for a saboteur to gain easy access to the entire system. IIoT systems usually combine information technology with operational technology which adds another layer of potential threats [12,13].…”
Section: Introductionmentioning
confidence: 99%
“…In light of the above analysis, there are many types of security researches in the IoT field, relevant problems are complex, and there are relatively few systematic summaries in this field [12]. Therefore, this paper focuses on the three fields of IIoT, IoV, and smart home and focuses on IoT in various scenarios and security issues.…”
Section: Introductionmentioning
confidence: 99%