Abstract
An issue of the Internet of Things security which does not belong to the traditional problem of cybersecurity, as it is a local or distributed monitoring and/or monitoring of physical systems state connected via the Internet, is considered. An architecture of Supervisory Control and Data Acquisition system (SCADA) was considered in previous authors studies. Due to SCADA systems implementation, vulnerabilities and various options of cyberattacks on them were analyzed. As an example, a case study based on trees was considered, and the obtained results were summarized and visualized.
 The purpose of the paper is to compare new industrial technology of the Internet of things (Industrial Internet of Things) with the previously studied traditional SCADA systems.
 The Industrial Internet of Things is a network of devices which are connected through communication technologies. Some of the most common security issues for the Industrial Internet of Things are presented in this paper.
 A brief overview of the structure of the Industrial Internet of things is presented, basic principles of security and the main problems that can arise with devices of the Internet of things are described. Based on research and analysis of the risk of threats in the field of the Industrial Internet of things, a specific case of destructive impact based on a tree analysis is considered as the main approach. A description of an attack tree leaf node value creation and an analysis of results are provided. Analysis of the electronic record change scenario to increase the infusion rate of an overflow pump using a complexity index is performed. The consequences compared to a previous study of SCADA systems are analyzed, and respective conclusion is made.
Highlights
In modern society, information and communication technologies have penetrated deeply and have become the basis of all activities in the economy, administration, society and privacy
The so-called digital transformation of the industry has emerged in the overall development of the digital society [2] in recent years, which is the result of the increasing penetration of the Internet of Things (IoT), robotics, 3D printing, cloud solutions, and artificial intelligence-based cognitive technologies
Repeated attack would result in incorrect data being recorded in normal data, if the physician starts treating a patient based on this data, the result could be catastrophic
Summary
Information and communication technologies have penetrated deeply and have become the basis of all activities in the economy, administration, society and privacy. The so-called digital transformation of the industry has emerged in the overall development of the digital society [2] in recent years, which is the result of the increasing penetration of the Internet of Things (IoT), robotics, 3D printing, cloud solutions, and artificial intelligence-based cognitive technologies. All these technologies form the so-called Industry 4.0, driven by design and production, and by its relationship with the market and consumers. Industrial technologies are among the top 5 priority areas in the EU's 2020 development strategy. ISSN 2078-9181 (печ.), ISSN 2078-9599 (онлайн) www.proceedings.spiiras.nw.ru
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.