IEEE Access (Jan 2022)

Cybersecurity for Industrial Internet of Things: Architecture, Models and Lessons Learned

  • George Bravos,
  • Antonio J. Cabrera,
  • Camilo Correa,
  • Dragan Danilovic,
  • Nikolaos Evangeliou,
  • Gilad Ezov,
  • Zoran Gajica,
  • Dusan Jakovetic,
  • Leonidas Kallipolitis,
  • Milan Lukic,
  • Julien Mascolo,
  • Davide Masera,
  • Raul Mazo,
  • Ivan Mezei,
  • Andreas Miaoudakis,
  • Nemanja Milosevic,
  • William Oliff,
  • Jacques Robin,
  • Michail Smyrlis,
  • Georgia Sakellari,
  • Giorgos Stamatis,
  • Dusan Stamenkovic,
  • Srdan Skrbic,
  • Carine Souveyet,
  • Spyridon Vantolas,
  • Giorgos Vasiliadis,
  • Dejan Vukobratovic

DOI
https://doi.org/10.1109/ACCESS.2022.3225074
Journal volume & issue
Vol. 10
pp. 124747 – 124765

Abstract

Read online

Modern industrial systems now, more than ever, require secure and efficient ways of communication. The trend of making connected, smart architectures is beginning to show in various fields of the industry such as manufacturing and logistics. The number of IoT (Internet of Things) devices used in such systems is naturally increasing and industry leaders want to define business processes which are reliable, reproducible, and can be effortlessly monitored. With the rise in number of connected industrial systems, the number of used IoT devices also grows and with that some challenges arise. Cybersecurity in these types of systems is crucial for their wide adoption. Without safety in communication and threat detection and prevention techniques, it can be very difficult to use smart, connected systems in the industry setting. In this paper we describe two real-world examples of such systems while focusing on our architectural choices and lessons learned. We demonstrate our vision for implementing a connected industrial system with secure data flow and threat detection and mitigation strategies on real-world data and IoT devices. While our system is not an off-the-shelf product, our architecture design and results show advantages of using technologies such as Deep Learning for threat detection and Blockchain enhanced communication in industrial IoT systems and how these technologies can be implemented. We demonstrate empirical results of various components of our system and also the performance of our system as-a-whole.

Keywords