TY - JOUR
T1 - Industrial iot, cyber threats, and standards landscape
T2 - Evaluation and roadmap
AU - Dhirani, Lubna Luxmi
AU - Armstrong, Eddie
AU - Newe, Thomas
N1 - Publisher Copyright:
© 2021 by the authors. Licensee MDPI, Basel, Switzerland.
PY - 2021/6/1
Y1 - 2021/6/1
N2 - Industrial IoT (IIoT) is a novel concept of a fully connected, transparent, automated, and intelligent factory setup improving manufacturing processes and efficiency. To achieve this, existing hierarchical models must transition to a fully connected vertical model. Since IIoT is a novel ap-proach, the environment is susceptible to cyber threat vectors, standardization, and interoperability issues, bridging the gaps at the IT/OT ICS (industrial control systems) level. IIoT M2M communication relies on new communication models (5G, TSN ethernet, self-driving networks, etc.) and technologies which require challenging approaches to achieve the desired levels of data security. Currently there are no methods to assess the vulnerabilities/risk impact which may be exploited by malicious actors through system gaps left due to improper implementation of security standards. The authors are currently working on an Industry 4.0 cybersecurity project and the insights pro-vided in this paper are derived from the project. This research enables an understanding of con-verged/hybrid cybersecurity standards, reviews the best practices, and provides a roadmap for identifying, aligning, mapping, converging, and implementing the right cybersecurity standards and strategies for securing M2M communications in the IIoT.
AB - Industrial IoT (IIoT) is a novel concept of a fully connected, transparent, automated, and intelligent factory setup improving manufacturing processes and efficiency. To achieve this, existing hierarchical models must transition to a fully connected vertical model. Since IIoT is a novel ap-proach, the environment is susceptible to cyber threat vectors, standardization, and interoperability issues, bridging the gaps at the IT/OT ICS (industrial control systems) level. IIoT M2M communication relies on new communication models (5G, TSN ethernet, self-driving networks, etc.) and technologies which require challenging approaches to achieve the desired levels of data security. Currently there are no methods to assess the vulnerabilities/risk impact which may be exploited by malicious actors through system gaps left due to improper implementation of security standards. The authors are currently working on an Industry 4.0 cybersecurity project and the insights pro-vided in this paper are derived from the project. This research enables an understanding of con-verged/hybrid cybersecurity standards, reviews the best practices, and provides a roadmap for identifying, aligning, mapping, converging, and implementing the right cybersecurity standards and strategies for securing M2M communications in the IIoT.
KW - Cybersecurity
KW - Industrial IoT
KW - Industry 4.0
KW - IoT/M2M
KW - IT/OT
KW - Standards
KW - Threats
UR - http://www.scopus.com/inward/record.url?scp=85107228157&partnerID=8YFLogxK
U2 - 10.3390/s21113901
DO - 10.3390/s21113901
M3 - Review article
C2 - 34198727
AN - SCOPUS:85107228157
SN - 1424-8220
VL - 21
SP - -
JO - Sensors
JF - Sensors
IS - 11
M1 - 3901
ER -