ANALYSIS OF INDUSTRIAL INTERNET OF THINGS VULNERABILITY TO CYBERATTACKS

V. Yevsieiev, N. Demska
{"title":"ANALYSIS OF INDUSTRIAL INTERNET OF THINGS VULNERABILITY TO CYBERATTACKS","authors":"V. Yevsieiev, N. Demska","doi":"10.36074/logos-01.10.2021.v1.27","DOIUrl":null,"url":null,"abstract":"Currently, the widespread implementation of Industry 4.0 concepts has led to the emergence of complex Cyber-Physical Production Systems (CPPS), which are based on the paradigm of \"digital production\" [1]. Digital production is a mirror image of physical processes in virtual space. For this to exist, it is necessary to develop one information eco-system that combines: sensors, Programmable Logic Controller (PLC), Supervisory Control And Data Acquisition (SCADA) / human-machine interface (HMI) and allows you to implement a single Manufacturing Execution System (MES). Industrial Internet of Things (IIoT) is a network that allows you to unite all industrial facilities in order to solve problems: increasing equipment productivity, reducing material and energy costs, improving quality, optimizing technological processes [2]. As a result, multiple flows of information appear for many different operations, from signal processing to optimization, visualization, cognitive and high-performance computing. To deal with a huge amount of data, industrial clouds are used, they are located in an area remote from the main production. Thus, it inevitably continues to expand and use the growing computing power available to operators via smartphones and laptops [3]. Cybersecurity - protection against unauthorized access and theft of business information and valuable knowledge in digital form. Before finding a solution for cybersecurity breaches, it is necessary to synthesize existing knowledge about possible cybersecurity threats targeting different levels of IIoT, as well as the consequences and","PeriodicalId":362289,"journal":{"name":"DÉBATS SCIENTIFIQUES ET ORIENTATIONS PROSPECTIVES DU DÉVELOPPEMENT SCIENTIFIQUE - Volume 1","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"DÉBATS SCIENTIFIQUES ET ORIENTATIONS PROSPECTIVES DU DÉVELOPPEMENT SCIENTIFIQUE - Volume 1","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36074/logos-01.10.2021.v1.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Currently, the widespread implementation of Industry 4.0 concepts has led to the emergence of complex Cyber-Physical Production Systems (CPPS), which are based on the paradigm of "digital production" [1]. Digital production is a mirror image of physical processes in virtual space. For this to exist, it is necessary to develop one information eco-system that combines: sensors, Programmable Logic Controller (PLC), Supervisory Control And Data Acquisition (SCADA) / human-machine interface (HMI) and allows you to implement a single Manufacturing Execution System (MES). Industrial Internet of Things (IIoT) is a network that allows you to unite all industrial facilities in order to solve problems: increasing equipment productivity, reducing material and energy costs, improving quality, optimizing technological processes [2]. As a result, multiple flows of information appear for many different operations, from signal processing to optimization, visualization, cognitive and high-performance computing. To deal with a huge amount of data, industrial clouds are used, they are located in an area remote from the main production. Thus, it inevitably continues to expand and use the growing computing power available to operators via smartphones and laptops [3]. Cybersecurity - protection against unauthorized access and theft of business information and valuable knowledge in digital form. Before finding a solution for cybersecurity breaches, it is necessary to synthesize existing knowledge about possible cybersecurity threats targeting different levels of IIoT, as well as the consequences and
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
工业物联网网络攻击脆弱性分析
目前,工业4.0概念的广泛实施导致了基于“数字生产”范式的复杂网络物理生产系统(CPPS)的出现。数字生产是物理过程在虚拟空间中的镜像。为此,有必要开发一个信息生态系统,该系统结合:传感器,可编程逻辑控制器(PLC),监控和数据采集(SCADA) /人机界面(HMI),并允许您实现单个制造执行系统(MES)。工业物联网(IIoT)是一个网络,它允许您将所有工业设施联合起来,以解决问题:提高设备生产率,降低材料和能源成本,提高质量,优化技术流程[2]。因此,多种信息流出现在许多不同的操作中,从信号处理到优化、可视化、认知和高性能计算。为了处理大量数据,工业云被使用,它们位于远离主要生产的区域。因此,它不可避免地会继续扩展,并利用运营商通过智能手机和笔记本电脑b[3]获得的日益增长的计算能力。网络安全-防止未经授权的访问和盗窃数字形式的商业信息和有价值的知识。在找到网络安全漏洞的解决方案之前,有必要综合现有的知识,了解针对不同级别的工业物联网可能存在的网络安全威胁,以及后果和风险
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
СУЧАСНІ МЕТОДИ МАТЕМАТИЧНОГО МОДЕЛЮВАННЯ ГІДРОДИНАМІЧНИХ ПРОЦЕСІВ EVOLUTION OF THE DOCTRINE OF INNOVATION MANAGEMENT IN LAND USE AND ECOLOGIZATION OF AGRICULTURAL ENTERPRISES ANALYSIS OF INDUSTRIAL INTERNET OF THINGS VULNERABILITY TO CYBERATTACKS ASPECTS SYSTÉMIQUES DE LA CONSIDÉRATION DU SYSTÈME D'ALIMENTATION ÉLECTRIQUE UNIE DE L'UKRAINE ЛОГІСТИКА СИЛ СЕКТОРУ БЕЗПЕКИ І ОБОРОНИ УКРАЇНИ В УМОВАХ ПАНДЕМІЇ
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1