Planned intervention: On Wednesday April 3rd 05:30 UTC Zenodo will be unavailable for up to 2-10 minutes to perform a storage cluster upgrade.
Published May 1, 2018 | Version v1
Journal article Open

Trustworthy Industrial IoT Gateways for Interoperability Platforms and Ecosystems

Description

The industrial Internet of Things (IIoT) is having a significant impact in the manufacturing industry, especially in the context of horizontal integration of operational systems in factories as part of information systems in supply chains. Manufacturing companies can use this technology to create data streams along the supply chain that monitor and con- trol manufacturing and logistic processes, to in the end make these data streams interoperable with other software systems and to enable smart interactions among supply chain processes. However, the provision of these data streams may expose manufacturing operational systems to cyber-attacks. Therefore, cybersecurity is a critical aspect to design trustworthy gateways, which are system components that implement interoperabil- ity mechanisms between operational systems and information systems. Gateways must provide security mechanisms at dif- ferent system layers to minimize threats. This paper presents the Device Drivers security architecture: trustworthy gateways between operational technology and information technology used in the virtual factory open operating system (vf-OS) platform, which is a multisided platform orientated to manufacturing and logistics companies to enable collaboration among supply chains in all sectors. The main contribution of this paper is the evalua- tion of fallback mechanisms to improve resilience. In situations when the system may be under attack, the proposed mecha- nisms provide means to quickly recover component availability, by applying alternative security measures to minimize the threat at the same time. Other significant contributions are: a descrip- tion of the threat model for Device Drivers, a presentation of the security countermeasures implemented in the vf-OS system, the mapping of the vf-OS response objectives to the different char- acteristics of a trustworthy system: security, privacy, reliability, safety, and resilience and how the proposed countermeasures complement this response.

Files

JIEEEET2018_UPV.pdf

Files (1.2 MB)

Name Size Download all
md5:a5753e724625901196519c8649ee4bc7
1.2 MB Preview Download

Additional details

Funding

vf-OS – Virtual Factory Open Operating System 723710
European Commission