Abstract

The emerging Industrial Internet of Things (IIoT) provides industries with an opportunity to collect, aggregate, and analyze data from sensors, including motion control, machine‐to‐machine communication, predictive maintenance, smart energy grid, big data analysis, and other smart connected medical systems. The physical systems and the cyber systems are organically integrated, forming an interdependent IIoT. This system provides us with enormous advantages, but at the same time, it also introduces the main safety challenges in the design and operation phase. To exploit the security threats of IIoT systems, in this paper, we propose a novel security‐by‐design approach for interdependent IIoT environments across two different levels, namely, theory modeling and runtime simulation. Our method theoretically analyzes the cascading failure dynamics of the intentional attack network. Simultaneously, we verified the theoretical results through simulations and gave the risk factors that affect the system’s security to mitigate potential security attack threats. Besides, we prove its applicability through comparative simulation experiments to study application environments that rely on IIoT, which shows that our method helps identify risk factors and mitigate IIoT attacks’ mechanism.

Highlights

  • In recent years, with human society’s progress and the widespread use of the Internet, many emerging technologies and industries are booming

  • We found that the Internet of things technology has been embedded in people’s daily life, intelligently connecting things or objects around us. e industrial Internet of things is the deep integration of the Internet of things in industrialization and informatization

  • In 2011, Germany first proposed the concept of Industry 4.0 [3, 4] and took CPS as the primary goal of Industry 4.0 development [5]

Read more

Summary

Introduction

With human society’s progress and the widespread use of the Internet, many emerging technologies and industries are booming. Embedded computer and communication networks are considered network components It is the interdependent computational-resource network and physical-resource network that the CPS model as Ref. We model the IIoT system composed of computing resources and physical resources as two interdependent complex networks and elaborate the cascading failure dynamics of the cyberphysical system under the intentional attack strategy. We will mainly analyze and study the two critical theories of the security of the Industrial Internet of ings, namely the interdependent network and percolation theory. Compared with the above work, this paper’s difference is that it analyzes the interdependent network’s cascading failure dynamics based on the intentional attack mode, and the network type is closer to reality. We can better evaluate CPS’s network security performance and industrial Internet of things through the combination of theory and simulation

Proposed Model and Concepts
Mathematical Analysis of Cascading Failure Dynamics
Stage 1
Stage 2
Stage 4
Stage 5
Performance Analysis

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.