Abstract:Increasingly, the society is witnessing how today's industry is adapting the new technologies and communication protocols to offer more optimal and reliable services to end-users, with support for inter-domain communication belonging to diverse critical infrastructures. As a consequence of this technological revolution, interconnection mechanisms are required to offer transparency in the connections and protection in the different application domains, without this implying a significant degradation of the cont… Show more
“…As pointed out above, one important trend in the Industrial IoT is the convergence of OT & IT. Fog computing has been named as an architectural means to achieve this convergence [3,86]. More concretely, Müller et al [38,62] present a reference model for a seamless runtime environment for industrial software, which can thus be deployed in both the fog and the cloud.…”
Section: Fog Computing In Industrial Settingsmentioning
“…As pointed out above, one important trend in the Industrial IoT is the convergence of OT & IT. Fog computing has been named as an architectural means to achieve this convergence [3,86]. More concretely, Müller et al [38,62] present a reference model for a seamless runtime environment for industrial software, which can thus be deployed in both the fog and the cloud.…”
Section: Fog Computing In Industrial Settingsmentioning
“…• Authorization, which is the verification that an entity is permitted to carry out certain operations or access certain data [36]; • Non-repudiation, which means that the sender of a transmission should not be able to credibly deny having sent it; • The protection of data in storage from unauthorized access or modification; • Availability, which is the guarantee that the services and resources of a system are always accessible, including protection against denial-of-service attacks; • Intrusion detection, which is the ability to detect ongoing attacks [9]; • Post-incident management, which is the ability to recover from an attack and to mitigate the damage done [9]; • Accountability, which is the ability to pinpoint the source of unauthorized behaviour.…”
Section: Cryptography For It/ot Links In Iiot a Security Challenges For Iiot Interconnectionmentioning
Manufacturing is facing a host of new security challenges due to the convergence of information technology (IT) and operational technology (OT) in the industry. This paper addresses the challenges that arise due to the use of low power Industrial Internet of Things (IIoT) devices in modular manufacturing systems of Industry 4.0. First, we analyze security challenges concerning the manufacturing execution system (MES) and programmable logic controllers (PLC) in IIoT through a selective literature review. Second, we present an exploratory case study to determine a protocol for cryptographic key management and key exchange suitable for the Smart Production Lab of Aalborg University (a learning cyberphysical factory). Finally, we combine the findings of the case study with a quality function deployment (QFD) method to determine design requirements for Industry 4.0. We identify specific requirements from both the high-level domain of factory capabilities and the low-level domain of cryptography and translate requirements between these domains using a QFD analysis. The recommendations for designing a secure smart factory focus on how security can be implemented for low power and low-cost IIoT devices. Even though there have been a few studies on securing IT to OT data exchange, we conclude that the field is not yet in a state where it can be applied in practice with confidence.
“…Such issues have already been highlighted and addressed in several works in literature, e.g. [13,14,15], all of which can provide relevant inputs to OAuth-based systems to control access according to the type of context the system operates within. Some of these works use formal approaches in defining and verifying such interoperability, e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Dependability properties (including reliability and robustness), for which formal specification and analysis techniques allow their establishment, have been highlighted as one of the control and automation requirements for such gateway-based systems. Furthermore, in [15], a reference architecture for Industry 4.0 systems was proposed that establishes interoperability in a secure manner using Policy Decision Points (PDPs), which allow various access control measures, e.g. RBAC [17,18] to be deployed when components in a critical system need to coordinate and constrain access to their resources.…”
The increasing presence and utilisation of IoT systems raises many fundamental security and privacy issues that require robust approaches in understanding the behaviour of IoT systems and tackling those issues. In previous works, we demonstrated how some of the security and privacy questions in IoT systems could be answered by means of using federated identity management and authorisation frameworks, such as OAuth, intelligent gateways and personal cloud systems. In this paper, we take these works into a more fundamental level by formally modelling and analysing the OAuthing personal cloud-based IoT system. We demonstrate that this exercise reveals how data is shared across the system, and therefore how security and privacy guarantees can be established at a fundamental level.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.