Securing IIoT using Defence-in-Depth: Towards an End-to-End Secure Industry 4.0

Industry 4.0 uses a subset of the IoT, named Industrial IoT (IIoT), to achieve connectivity, interoperability, and decentralization. The deployment of industrial networks rarely considers security by design, but this becomes imperative in smart manufacturing as connectivity increases. The combination of OT and IT infrastructures in Industry 4.0 adds new security threats beyond those of traditional industrial networks. Defence-in-Depth (DiD) strategies tackle the complexity of this problem by providing multiple defense layers, each of these focusing on a particular set of threats. Additionally, the strict requirements of IIoT networks demand lightweight encryption algorithms. Nevertheless, these ciphers must provide E2E (End-to-End) security, as data passes through intermediate entities or middleboxes before reaching their destination. If compromised, middleboxes could expose vulnerable information to potential attackers if it is not encrypted throughout this path. This paper presents an analysis of the most relevant security strategies in Industry 4.0, focusing primarily on DiD. With these in mind, it proposes a combination of DiD, an encryption algorithm called Attribute-Based-Encryption (ABE), and object security (i.e., OSCORE) to get an E2E security approach. This analysis is a critical first step to developing more complex and lightweight security frameworks suitable for Industry 4.0.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/24/2020

Lightweight Cryptography for IoT: A State-of-the-Art

With the emergence of 5G, Internet of Things (IoT) has become a center o...
research
05/08/2020

Convergence of IT and SCADA: Associated Security Threats and Vulnerabilities

As many industries shift towards centralised controlled information syst...
research
01/24/2019

Efficient Lightweight Encryption Algorithm for Smart Video Applications

The future generation networks: Internet of things (IoT), in combination...
research
05/25/2022

A Case for Practical Configuration Management Using Hardware-based Security Tokens

Future industrial networks will consist of a complex mixture of new and ...
research
07/24/2020

MQT-TZ: Hardening IoT Brokers Using ARM TrustZone

The publish-subscribe paradigm is an efficient communication scheme with...
research
09/22/2022

mini-ELSA: using Machine Learning to improve space efficiency in Edge Lightweight Searchable Attribute-based encryption for Industry 4.0

In previous work a novel Edge Lightweight Searchable Attribute-based enc...

Please sign up or login with your details

Forgot password? Click here to reset