Abstract

Industrial IoT (IIoT) is a novel concept of a fully connected, transparent, automated, and intelligent factory setup improving manufacturing processes and efficiency. To achieve this, existing hierarchical models must transition to a fully connected vertical model. Since IIoT is a novel approach, the environment is susceptible to cyber threat vectors, standardization, and interoperability issues, bridging the gaps at the IT/OT ICS (industrial control systems) level. IIoT M2M communication relies on new communication models (5G, TSN ethernet, self-driving networks, etc.) and technologies which require challenging approaches to achieve the desired levels of data security. Currently there are no methods to assess the vulnerabilities/risk impact which may be exploited by malicious actors through system gaps left due to improper implementation of security standards. The authors are currently working on an Industry 4.0 cybersecurity project and the insights provided in this paper are derived from the project. This research enables an understanding of converged/hybrid cybersecurity standards, reviews the best practices, and provides a roadmap for identifying, aligning, mapping, converging, and implementing the right cybersecurity standards and strategies for securing M2M communications in the IIoT.

Highlights

  • Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations

  • Industrial IoT (IIoT), Section discusses cyber threats in the context of industrial control systems (ICS), IIoT, Section 3 discusses cyber threats in the context of industrial control systems (ICS), Section 4 articulates the scope of different security and communication standards and how Section 4 articulates the scope of different security and communication standards and how alignment can be achieved

  • Visibility, insights, and control are critical for the fully automated vertical model which relies on ultra-reliable low latency communications (URLLC), massive machine type communications, and enhanced mobile broadband [2]

Read more

Summary

Section 22 outlines challenges in in

IIoT, Section discusses cyber threats in the context of industrial control systems (ICS), IIoT, Section 3 discusses cyber threats in the context of industrial control systems (ICS), Section 4 articulates the scope of different security and communication standards and how Section 4 articulates the scope of different security and communication standards and how alignment can be achieved. Tion issues that arise in the I4.0/IIoT environment due to IT/OT convergence gaps

Cybersecurity Challenges in IIoT
Security Issues
IIoT Communication and Security Risks
Security Controls and Standardization
Cyber Threats
Standards
Standards Complementing or Comparative
Standardization Bodies
ETSI OneM2M
IEC 62443
Threat Intelligence
Standards Collaboration and Co-Existence
(Annex
The Unified IIoT Standards Roadmap
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.