RUS  ENG
Full version
JOURNALS // Informatics and Automation // Archive

Tr. SPIIRAN, 2020 Issue 19, volume 2, Pages 358–382 (Mi trspy1102)

This article is cited in 6 papers

Information Security

Some security issues with the industrial Internet of Things and comparison to SCADA systems

G. Tsocheva, R. Yoshinova, N. Zhukovab

a Bulgarian Academy of Sciences (BAS)
b St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences (SPIIRAS)

Abstract: An issue of the Internet of Things security which does not belong to the traditional problem of cybersecurity, as it is a local or distributed monitoring and/or monitoring of physical systems state connected via the Internet, is considered. An architecture of Supervisory Control and Data Acquisition system (SCADA) was considered in previous authors studies. Due to SCADA systems implementation, vulnerabilities and various options of cyberattacks on them were analyzed. As an example, a case study based on trees was considered, and the obtained results were summarized and visualized.
The purpose of the paper is to compare new industrial technology of the Internet of things (Industrial Internet of Things) with the previously studied traditional SCADA systems.
The Industrial Internet of Things is a network of devices which are connected through communication technologies. Some of the most common security issues for the Industrial Internet of Things are presented in this paper.
A brief overview of the structure of the Industrial Internet of things is presented, basic principles of security and the main problems that can arise with devices of the Internet of things are described. Based on research and analysis of the risk of threats in the field of the Industrial Internet of things, a specific case of destructive impact based on a tree analysis is considered as the main approach. A description of an attack tree leaf node value creation and an analysis of results are provided. Analysis of the electronic record change scenario to increase the infusion rate of an overflow pump using a complexity index is performed. The consequences compared to a previous study of SCADA systems are analyzed, and respective conclusion is made.

Keywords: internet of things, industrial systems, scada, attack tree, cyber security, network and information security.

UDC: 006.72

Received: 06.02.2020

Language: English

DOI: 10.15622/sp.2020.19.2.5



© Steklov Math. Inst. of RAS, 2024