Analyzing the Attack Surface and Threats of Industrial Internet of Things Devices

Read original: arXiv:2405.16318 - Published 5/28/2024 by Simon Liebl, Leah Lathrop, Ulrich Raithel, Andreas A{ss}muth, Ian Ferguson, Matthias Sollner
Total Score

0

🏷️

Sign in to get full access

or

If you already have an account, we'll log you in



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

🏷️

Total Score

0

Analyzing the Attack Surface and Threats of Industrial Internet of Things Devices

Simon Liebl, Leah Lathrop, Ulrich Raithel, Andreas A{ss}muth, Ian Ferguson, Matthias Sollner

The growing connectivity of industrial devices as a result of the Internet of Things is increasing the risks to Industrial Control Systems. Since attacks on such devices can also cause damage to people and machines, they must be properly secured. Therefore, a threat analysis is required in order to identify weaknesses and thus mitigate the risk. In this paper, we present a systematic and holistic procedure for analyzing the attack surface and threats of Industrial Internet of Things devices. Our approach is to consider all components including hardware, software and data, assets, threats and attacks throughout the entire product life cycle.

Read more

5/28/2024

📊

Total Score

0

Cyberattack Data Analysis in IoT Environments using Big Data

Neelam Patidar, Sally Zreiqat, Sirisha Mahesh, Jongwook Woo

In the landscape of the Internet of Things (IoT), transforming various industries, our research addresses the growing connectivity and security challenges, including interoperability and standardized protocols. Despite the anticipated exponential growth in IoT connections, network security remains a major concern due to inadequate datasets that fail to fully encompass potential cyberattacks in realistic IoT environments. Using Apache Hadoop and Hive, our in-depth analysis of security vulnerabilities identified intricate patterns and threats, such as attack behavior, network traffic anomalies, TCP flag usage, and targeted attacks, underscoring the critical need for robust data platforms to enhance IoT security.

Read more

6/18/2024

Security of Cloud Services with Low-Performance Devices in Critical Infrastructures
Total Score

0

Security of Cloud Services with Low-Performance Devices in Critical Infrastructures

Michael Molle, Ulrich Raithel, Dirk Kraemer, Norbert Gra{ss}, Matthias Sollner, Andreas A{ss}muth

As part of the Internet of Things (IoT) and Industry 4.0 Cloud services are increasingly interacting with low-performance devices that are used in automation. This results in security issues that will be presented in this paper. Particular attention is paid to so-called critical infrastructures. The authors intend to work on the addressed security challenges as part of a funded research project, using electrical actuators and battery storages as specific applications. The core ideas of this research project are also presented in this paper.

Read more

5/21/2024

Software-based Security Framework for Edge and Mobile IoT
Total Score

0

Software-based Security Framework for Edge and Mobile IoT

Jos'e Cec'ilio, Alan Oliveira de S'a, Andr'e Souto

With the proliferation of Internet of Things (IoT) devices, ensuring secure communications has become imperative. Due to their low cost and embedded nature, many of these devices operate with computational and energy constraints, neglecting the potential security vulnerabilities that they may bring. This work-in-progress is focused on designing secure communication among remote servers and embedded IoT devices to balance security robustness and energy efficiency. The proposed approach uses lightweight cryptography, optimizing device performance and security without overburdening their limited resources. Our architecture stands out for integrating Edge servers and a central Name Server, allowing secure and decentralized authentication and efficient connection transitions between different Edge servers. This architecture enhances the scalability of the IoT network and reduces the load on each server, distributing the responsibility for authentication and key management.

Read more

4/10/2024