| Literature DB >> 34198727 |
Lubna Luxmi Dhirani1,2, Eddie Armstrong3, Thomas Newe1,2.
Abstract
Industrial IoT (IIoT) is a novel concept of a fully connected, transparent, automated, and intelligent factory setup improving manufacturing processes and efficiency. To achieve this, existing hierarchical models must transition to a fully connected vertical model. Since IIoT is a novel approach, the environment is susceptible to cyber threat vectors, standardization, and interoperability issues, bridging the gaps at the IT/OT ICS (industrial control systems) level. IIoT M2M communication relies on new communication models (5G, TSN ethernet, self-driving networks, etc.) and technologies which require challenging approaches to achieve the desired levels of data security. Currently there are no methods to assess the vulnerabilities/risk impact which may be exploited by malicious actors through system gaps left due to improper implementation of security standards. The authors are currently working on an Industry 4.0 cybersecurity project and the insights provided in this paper are derived from the project. This research enables an understanding of converged/hybrid cybersecurity standards, reviews the best practices, and provides a roadmap for identifying, aligning, mapping, converging, and implementing the right cybersecurity standards and strategies for securing M2M communications in the IIoT.Entities:
Keywords: IT/OT; IoT/M2M; cybersecurity; industrial IoT; industry 4.0; standards; threats
Mesh:
Year: 2021 PMID: 34198727 PMCID: PMC8200965 DOI: 10.3390/s21113901
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Rationale.
Figure 2Cybersecurity taxonomy for IIoT.
Figure 3Timeline and history of ICS cybersecurity attacks.
ENISA’s threat classification for IIoT.
| Threat Classification | Security Service Breached/Compromised | Risk Impact |
|---|---|---|
| Nefarious activity/abuse (misuse, alter, steal, destroy information on targeted ICT systems, network, and infrastructure) | Confidentiality, | High |
| Eavesdropping/interception/hijacking (listening, interrupting, or gaining control of a third-party communication without approval) | Confidentiality | High |
| Disaster (accidental, force majeur, etc.) | Availability | Medium-High |
| Unintentional/accidental damages. This threat involves destroying, harming, or damaging people/property affecting the environment’s functionality or may lead to complete system failure (e.g., malware, misconfigurations, compromised hardware/software, etc.) | Integrity | High |
| Outage (service disruption) | Availability | High |
| Failure/malfunction (partially or complete lack of functionality of hardware/software assets) | Availability | High |
| Legal (legal issues related to third-party subcontractors, GDPR issues, lawful interception, e.g., unlawful surveillance, weaponization of interception, manipulation of information, etc.) | Confidentiality, | Medium-High |
| Physical attacks (exposing, leaking, falsifying, damaging, or gaining unauthorized access to ICT systems, networks, and infrastructure) | Confidentiality, | High |
Figure 4Hybrid security standards and controls adapted from [40].
Standards co-existence and comparison.
| NIST 800-53 versus ISO 27001 | NIST 800-53 [ |
| IEC 62443 versus ISO 27001 | IEC 62443 versus ISO 27001: IEC 62443 [ |
| NIST 800-82 and IEC 62443 | NIST 800-82 refers to securing ICS and SCADA systems. Both NIST 800-82 and IEC 62443 are applicable to the same type of industry and work on the same level (process control, collaborative robotics, additive manufacturing). However they differ in terms of security protection strategy, security management and security classification [ |
| NIST 800-53 and Federal Risk and Authorization Management Program (FedRAMP) | Both of these standards complement each other in terms of governmental compliance fundamentals. NIST 800-53 [ |
| Secure Controls Framework (SCF) [ | An open-source, free to use framework which “ |
Figure 5Cybersecurity standards coverage adapted from [40].
Synopsis of different cybersecurity standards and threats in IIoT.
|
| |
| [ | addresses existing IACS cybersecurity issues related to IT/OT convergence. This paper also talks about the need for Standardizing IT/OT, IEC 62443, and limitations of existing security standards. |
| [ | provides analysis of security standards for ICS. |
| [ | compares existing industrial WSN standards in the following settings: (i) wireless standards for process automation (ZigBee, WirelessHART, ISA 100.11a, WIA-PA) and factory automation (WISA, WSAN-FA)—IEEE 802.15.4 (PHY and MAC Layer), (ii) network architectures for different wireless standards. |
| [ | focuses on security breaches in ICS (SCADA systems) and forensic challenges in IIoT. |
| [ | marks the limit of security and convergence in IT and OT systems. |
| [ | notifies different community-based open standards such as MTConnect, OPC-UA and mentions limitations within the existing standards. |
| [ | abstracts wireless standards IEEE 802.1 and use cases (i.e., industrial wireless and wireless access in medical environments). |
| [ | quotes lack of compliance in IEC 62443 and the necessity for a standard compliant threat analysis process in IIoT. |
| [ | discusses IEC 62443 implementation at the component level improving security for IoT devices. |
| [ | elaborates IoT dimensions and sub-dimensions in IIoT architecture with reference to RAMI 4.0, IMSA, IVRA, IIRA, SME, F-CPS, and IoT ARM. |
| [ | sets forth IEEE 802.1 TSN performance and security requirements supporting IIoT. (i) Time/mission critical data traffic supporting IIoT performance requirements, (ii) IEC/IEEE 60802 TSN for industrial automation, and (iii) 5G support for TSN and integration. |
| [ | drafts IEEE standards in digitization of EU industry/advanced manufacturing and shows how IEEE TSN is enabled to deliver deterministic connectivity to time and mission critical IIoT-based applications over ethernet networks (IEEE 802.3). |
| [ | discusses M2M standards (OneM2M, HyperCat, OMA Lightweight, ECLIPSE M2M, Weightless), cross-level standards (IEC 62443/ISA 99, ISO 9000, etc.) enabling technologies and key capabilities. |
| [ | summarizes ETSI OneM2M architectures and standard M2M architecture for universal machines. |
| [ | outlines smart manufacturing standards (ISO/IEC/JTC1) for CPS IT. |
| [ | reviews intelligent M2M systems and complex event processing for M2M communications. |
| [ | compares wired and wireless standards in terms of performance metrics (i.e., network security, reliability, visibility, cost, etc.). |
| [ | encapsulates industrial cybersecurity standards (IEC 62443 for SCADA and industrial control system security). Focuses on ICS security attributes and challenges, NIST SP 800-82 ICS security, ISA 99—ISA/IEC 62443, industrial communication networks and system security. |
| [ | compares industrial WSN standards (i.e., ZigBee, WirelessHART, ISA 100.11a) performance and security (authentication, integrity, encryption techniques) characteristics in industrial environment. |
|
| |
| [ | addresses the need of security solutions for data management systems in CPS. |
| [ | examines 5G cybersecurity risk assessment (i.e., threat environment, vulnerabilities to the IIoT and its impact on assets, possible risk scenarios, security baseline). |
| [ | summarizes the ENISA threat landscape for 5G networks. |
| [ | highlights cybersecurity and privacy challenges in H2020-projects (i.e., ANASTACIA, SAINT, FORTIKA, CYBECO, CS-AWARE, ARIES, LEPS, etc.). |
| [ | outlines a security policy-based approach implemented and tested in H2020 EU project ANASTACIA, showing its feasibility to mitigate cyberattacks. |
| [ | gives the main points of securing 5G networks (EU toolbox), cybersecurity requirements, and risk assessment methodologies for the EU IIoT environment. |
| [ | discusses security of existing industrial and manufacturing systems and compares manufacturing and IT systems in terms of (systems, operations, security, and impact metrics) IIoT dependability metrics versus security metrics. Security solutions: Standards (IEC 62443—IACS, ISO/IEC 27033:1:2015—IT network security, IEC 61508—electronics in industry, IEC 61784 -industrial communication networks, ISO/IEC 27000—information security management). It also suggests 20 different intrusion detection systems for process systems. |
| [ | overviews IoT cybersecurity (objectives, risks, and threats) and standards landscape (cryptographic techniques, IAM, network security, etc.). |
| [ | lays a foundation for security services, methodologies, and procedures to secure data transmission and M2M communications. |
| [ | reviews securing communication channels architecture for software defined mobile networks (SDMN) and implementing IPsec tunnels for securing SDMN communication channels. The real test-bed results showed SDMN architecture secured the environment against IP-based attacks (i.e., DoS, reset, spoofing, replay, etc.) but it affected the performance (throughput, latency) levels. |
| [ | provides analyzing of 5G threats (DoS, hijacking, security keys exposure, signaling storms, etc.) and possible solutions. |
| [ | suggests new approaches for cyber–physical security (security Services (CIA), IT/OT convergence, security issues related to distributed manufacturing environments, manufacturing security enforcement device (MSED)—cryptographically ensuring data integrity). |
| [ | demonstrated cybersecurity analysis based on reference architecture model (RAMI 4.0) and the VDI/VDE guideline 2182 (IT security for industrial automation). |
| [ | outlines IoT/M2M Communications cybersecurity issues. |
| [ | discusses security requirements and constraints in M2M communications and solutions to mitigate these risks. |
| [ | provides a framework for the future development of IMT 2020 and beyond. |
|
| |
| [ | summarizes security functions provided by 3GPP and 5G security architecture. |
| [ | examines 6G networks, potential use cases, the 3D network architecture, and its key capabilities. |
| [ | highlights ICS concerns (i.e., gaps between legacy equipment and new communications systems (retrofitting, interoperability, and reliability issues) between industrial requirements and wireless standards). |
| [ | focuses on IIoT use cases, performance metrics, standards, and security. It also puts a light on 5G key technologies and challenges. |
| [ | provides a 5G digital factory workflow, mapping the smart factory performance metrics with 5G capabilities. |
| [ | discusses 5G-ACIA initiative and manufacturing solution architecture. The white paper also mentions more than 90% of OT networks are connected by wired technologies (PROFIBUS, PROFINET, EtherCAT, Modbus, etc.). |
| [ | delivers IIoT proof of concept using IWC 3.7-3.8 GHz band having capabilities of 5G standalone network. |
| [ | reviews 5G industrial connectivity trends driving the IT/OT convergence. |
| [ | elaborates Wi-Fi 6 performance and technological differences between Wi-Fi 6 and 5G. |
| [ | gives a summary of IEC and IWN standards. |
| [ | runs through industrial wireless standards and limitations of WLANs/WWAN networks. |
| [ | outlines IWN (standards, QoS, real-time algorithms), security and data fusion issues in I4.0. |
| [ | discusses M2M Communications in 5G: state-of-the-art architecture, recent advances. It also mentions the following research challenges: M2M architecture (device, communication and server/application domain), standards (ETSI, 3GPP, IEEE), secured M2M communication collaborations (LOLA, 5GPPP SESAME, etc.) and 5G services for future M2M communication. |
| [ | articulates the scope of 5G standardization and advanced wireless technology. |
| [ | gives a synopsis of 5GPP and 5G empowering vertical industries/IIoT. It also describes the 5G architecture for distributed and flexible network functions. |
| [ | provides knowledgeable insights on M2M System architecture and security (vulnerabilities, services (CIA), protocols and algorithms) issues. |
| [ | mentions challenges associated with cellular M2M and capillary M2M communications using wireless standards. It also examines M2M and wireless standards—IoT, WSNs, M2M, and CPS. |
IT/OT priorities.
| IT | OT |
|---|---|
| Prioritize confidentiality over availability | Availability, efficient, and deterministic |
| Burden to manage more and more connected devices | Machine and processes—100% uptime |
| Factory and office ethernet (segmentation concerns) | Shorter response time/resilient |
Figure 6(a) The different standards within the manufacturing environment with the same metric. (b) Necessity to align cybersecurity standards and security controls.
IIoT communication and security standards.
| IEC 62443 | IEC 61784-1:2019 | ISO 27001 | ISO 27033:1: 2015 |
|---|---|---|---|
| ISA-62443-4-2, Security for IACS: Technical Security Requirements for IACS Components | IEC 61784-1:2019 (E) defines a set of protocol specific communication profiles based primarily on the IEC 61158 series, to be used in the design of devices involved in communications in factory manufacturing and process control [ | Information Security Policies—2 C | Overview and concepts |
| ISA/IEC 62443-3-3, System Security Requirements and Security Levels | IEC 61784-2:2019, Industrial communication networks (Profiles Part 2): Additional fieldbus profiles for real-time networks are based on ISO/IEC/IEEE 8802-3 | Communications Security—7 C | Securing communications between networks using security gateways |
| ISA/IEC TR62443-2-3, Patch Management in the IACS Environment | IEC 61784-5-2:2018, Industrial communication networks (Profiles Part 5-2): Installation of fieldbuses—Installation profiles for Communication Profile Families (CPF 2) | Securing wireless IP network access |
Figure 7ENISA thematic landscape SDN/5G.
Various standards illustrating different aspects of ICS/SCADA security [109].
| BPI-CPNI [ | NIST 800-82 | NIST 800-100 | NIST 800-48 & 800-97 [ | ISO 27001 | IEC 62443 | IEC 61784 | OneM2M | MITRE ATT&CK | |
|---|---|---|---|---|---|---|---|---|---|
| Access control | ● | ● | ● | ● | ● | ||||
| Asset categorization and control | ● | ● | ● | ||||||
| Business continuity management | ● | ||||||||
| IT/OT (ICS/SCADA) convergence | ● | ● | ● | ||||||
| ICS/SCADA characteristics, threats, and vulnerabilities | ● | ● | ● | ||||||
| ICS/SCADA security controls (management, operational, technical) | ● | ● | ● | ● | |||||
| Multi-connections to ICS/SCADA network | ● | ● | |||||||
| Network architecture security | ● | ● | ● | ||||||
| Patch management strategies | ● | ● | ● | ||||||
| Physical and environmental security | ● | ||||||||
| Physical and logical demilitarized zone (DMZ) | ● | ● | |||||||
| Remote Access/IAM policy | ● | ● | |||||||
| Security strategy | ● | ● | |||||||
| Standards interfaces between different networks | ● | ● | |||||||
| Logical segmentation on virtual LANs | ● | ● | |||||||
| Physical segmentations | ● | ● | |||||||
| Wireless network security | ● | ● | ● | ● | |||||
| E2E encryption | ● |
Figure 8Unified IIoT standards roadmap.