Abstract

An issue of the Internet of Things security which does not belong to the traditional problem of cybersecurity, as it is a local or distributed monitoring and/or monitoring of physical systems state connected via the Internet, is considered. An architecture of Supervisory Control and Data Acquisition system (SCADA) was considered in previous authors studies. Due to SCADA systems implementation, vulnerabilities and various options of cyberattacks on them were analyzed. As an example, a case study based on trees was considered, and the obtained results were summarized and visualized.
 The purpose of the paper is to compare new industrial technology of the Internet of things (Industrial Internet of Things) with the previously studied traditional SCADA systems.
 The Industrial Internet of Things is a network of devices which are connected through communication technologies. Some of the most common security issues for the Industrial Internet of Things are presented in this paper.
 A brief overview of the structure of the Industrial Internet of things is presented, basic principles of security and the main problems that can arise with devices of the Internet of things are described. Based on research and analysis of the risk of threats in the field of the Industrial Internet of things, a specific case of destructive impact based on a tree analysis is considered as the main approach. A description of an attack tree leaf node value creation and an analysis of results are provided. Analysis of the electronic record change scenario to increase the infusion rate of an overflow pump using a complexity index is performed. The consequences compared to a previous study of SCADA systems are analyzed, and respective conclusion is made.

Highlights

  • In modern society, information and communication technologies have penetrated deeply and have become the basis of all activities in the economy, administration, society and privacy

  • The so-called digital transformation of the industry has emerged in the overall development of the digital society [2] in recent years, which is the result of the increasing penetration of the Internet of Things (IoT), robotics, 3D printing, cloud solutions, and artificial intelligence-based cognitive technologies

  • Repeated attack would result in incorrect data being recorded in normal data, if the physician starts treating a patient based on this data, the result could be catastrophic

Read more

Summary

Introduction

Information and communication technologies have penetrated deeply and have become the basis of all activities in the economy, administration, society and privacy. The so-called digital transformation of the industry has emerged in the overall development of the digital society [2] in recent years, which is the result of the increasing penetration of the Internet of Things (IoT), robotics, 3D printing, cloud solutions, and artificial intelligence-based cognitive technologies. All these technologies form the so-called Industry 4.0, driven by design and production, and by its relationship with the market and consumers. Industrial technologies are among the top 5 priority areas in the EU's 2020 development strategy. ISSN 2078-9181 (печ.), ISSN 2078-9599 (онлайн) www.proceedings.spiiras.nw.ru

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call