Securing the industrial internet of things for critical infrastructure (iiot-ci)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

The Industrial Internet of Things (IIoT) is a term applied to the industrial application of M2M devices. The security of IIoT devices is a difficult problem and where the automation of critical infrastructure is intended, risks may be unacceptable. Remote attacks are a significant threat and solutions are sought which are secure by default. The problem space may be analyzed using threat modelling methods. Software Defined Networks (SDN) provide mitigation for remote attacks which exploit local area networks. Similar concepts applied to the WAN may improve availability and performance and provide granular data on link characteristics. Schemes such as the Software Defined Perimeter allow IIoT devices to communicate on the Internet, mitigating avenues of remote attack. Finally, separation of duties at the IIoT device may prevent attacks on the integrity of the device or the confidentiality and integrity of its communications. Work remains to be done on the mitigation of DDoS.

Original languageEnglish
Title of host publicationIEEE 5th World Forum on Internet of Things, WF-IoT 2019 : Conference Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages70-75
Number of pages6
ISBN (Electronic)9781538649800
ISBN (Print)978-1-5386-4981-7
DOIs
Publication statusPublished - 22 Jul 2019
Event5th IEEE World Forum on Internet of Things, WF-IoT 2019 - Limerick, Ireland
Duration: 15 Apr 201918 Apr 2019

Conference

Conference5th IEEE World Forum on Internet of Things, WF-IoT 2019
CountryIreland
CityLimerick
Period15/04/201918/04/2019

Keywords

  • IIoT-CI
  • SD-Node
  • SD-WAN
  • SDN
  • Software Defined Perimeter

ASJC Scopus subject areas

  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint Dive into the research topics of 'Securing the industrial internet of things for critical infrastructure (iiot-ci)'. Together they form a unique fingerprint.

Cite this