{"title":"ANALYSIS OF INDUSTRIAL INTERNET OF THINGS VULNERABILITY TO CYBERATTACKS","authors":"V. Yevsieiev, N. Demska","doi":"10.36074/logos-01.10.2021.v1.27","DOIUrl":null,"url":null,"abstract":"Currently, the widespread implementation of Industry 4.0 concepts has led to the emergence of complex Cyber-Physical Production Systems (CPPS), which are based on the paradigm of \"digital production\" [1]. Digital production is a mirror image of physical processes in virtual space. For this to exist, it is necessary to develop one information eco-system that combines: sensors, Programmable Logic Controller (PLC), Supervisory Control And Data Acquisition (SCADA) / human-machine interface (HMI) and allows you to implement a single Manufacturing Execution System (MES). Industrial Internet of Things (IIoT) is a network that allows you to unite all industrial facilities in order to solve problems: increasing equipment productivity, reducing material and energy costs, improving quality, optimizing technological processes [2]. As a result, multiple flows of information appear for many different operations, from signal processing to optimization, visualization, cognitive and high-performance computing. To deal with a huge amount of data, industrial clouds are used, they are located in an area remote from the main production. Thus, it inevitably continues to expand and use the growing computing power available to operators via smartphones and laptops [3]. Cybersecurity - protection against unauthorized access and theft of business information and valuable knowledge in digital form. Before finding a solution for cybersecurity breaches, it is necessary to synthesize existing knowledge about possible cybersecurity threats targeting different levels of IIoT, as well as the consequences and","PeriodicalId":362289,"journal":{"name":"DÉBATS SCIENTIFIQUES ET ORIENTATIONS PROSPECTIVES DU DÉVELOPPEMENT SCIENTIFIQUE - Volume 1","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"DÉBATS SCIENTIFIQUES ET ORIENTATIONS PROSPECTIVES DU DÉVELOPPEMENT SCIENTIFIQUE - Volume 1","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36074/logos-01.10.2021.v1.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Currently, the widespread implementation of Industry 4.0 concepts has led to the emergence of complex Cyber-Physical Production Systems (CPPS), which are based on the paradigm of "digital production" [1]. Digital production is a mirror image of physical processes in virtual space. For this to exist, it is necessary to develop one information eco-system that combines: sensors, Programmable Logic Controller (PLC), Supervisory Control And Data Acquisition (SCADA) / human-machine interface (HMI) and allows you to implement a single Manufacturing Execution System (MES). Industrial Internet of Things (IIoT) is a network that allows you to unite all industrial facilities in order to solve problems: increasing equipment productivity, reducing material and energy costs, improving quality, optimizing technological processes [2]. As a result, multiple flows of information appear for many different operations, from signal processing to optimization, visualization, cognitive and high-performance computing. To deal with a huge amount of data, industrial clouds are used, they are located in an area remote from the main production. Thus, it inevitably continues to expand and use the growing computing power available to operators via smartphones and laptops [3]. Cybersecurity - protection against unauthorized access and theft of business information and valuable knowledge in digital form. Before finding a solution for cybersecurity breaches, it is necessary to synthesize existing knowledge about possible cybersecurity threats targeting different levels of IIoT, as well as the consequences and