Redirigiendo al acceso original de articulo en 19 segundos...
Inicio  /  IoT  /  Vol: 2 Par: 1 (2021)  /  Artículo
ARTÍCULO
TITULO

Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures

Konstantinos Tsiknas    
Dimitrios Taketzis    
Konstantinos Demertzis and Charalabos Skianis    

Resumen

In today?s Industrial Internet of Things (IIoT) environment, where different systems interact with the physical world, the state proposed by the Industry 4.0 standards can lead to escalating vulnerabilities, especially when these systems receive data streams from multiple intermediaries, requiring multilevel security approaches, in addition to link encryption. At the same time taking into account the heterogeneity of the systems included in the IIoT ecosystem and the non-institutionalized interoperability in terms of hardware and software, serious issues arise as to how to secure these systems. In this framework, given that the protection of industrial equipment is a requirement inextricably linked to technological developments and the use of the IoT, it is important to identify the major vulnerabilities and the associated risks and threats and to suggest the most appropriate countermeasures. In this context, this study provides a description of the attacks against IIoT systems, as well as a thorough analysis of the solutions for these attacks, as they have been proposed in the most recent literature.

Palabras claves

 Artículos similares

       
 
Konstantinos Ntafloukas, Liliana Pasquale, Beatriz Martinez-Pastor and Daniel P. McCrum    
Transportation networks are fundamental to the efficient and safe functioning of modern societies. In the past, physical and cyber space were treated as isolated environments, resulting in transportation network being considered vulnerable only to threat... ver más
Revista: Future Internet

 
Karthikeyan Saminathan, Sai Tharun Reddy Mulka, Sangeetha Damodharan, Rajagopal Maheswar and Josip Lorincz    
The COVID-19 pandemic made all organizations and enterprises work on cloud platforms from home, which greatly facilitates cyberattacks. Employees who work remotely and use cloud-based platforms are chosen as targets for cyberattacks. For that reason, cyb... ver más
Revista: Future Internet

 
Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut and Marianne Azer    
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations f... ver más
Revista: Future Internet

 
Fahim Sufi    
The surge in cybercrime has emerged as a pressing concern in contemporary society due to its far-reaching financial, social, and psychological repercussions on individuals. Beyond inflicting monetary losses, cyber-attacks exert adverse effects on the soc... ver más
Revista: Future Internet

 
Elena Basan, Alexandr Basan, Alexey Nekrasov, Colin Fidge, Evgeny Abramov and Anatoly Basyuk    
The data analysis subsystem of an Unmanned Aerial Vehicle (UAV) includes two main modules: a data acquisition module for data processing and a normalization module. One of the main features of an adaptive UAV protection system is the analysis of its cybe... ver más
Revista: Drones