sensors-logo

Journal Browser

Journal Browser

Process-Aware Cyber Security Management in the Industrial Internet of Things

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: closed (20 August 2023) | Viewed by 1353

Special Issue Editor


E-Mail Website
Guest Editor
Institute for Management Information Systems, University of Regensburg, Universitätsstraße 31, 93053 Regensburg, Germany
Interests: business process management; industrial Internet of Things; process mining; process-aware IIoT security; IIoT-aware process modelling

Special Issue Information

Dear Colleagues,

The Industrial Internet of Things (IIoT) offers a broad compendium of technologies from the Internet of Things (IoT) to automate and intelligently network production systems. This networking is achieved by connecting industrial operational technology (OT) with information technology (IT). The resulting convergence leads to more efficient systems and enables new solutions. However, the convergence of IT and OT has a significant drawback: machines and plants become vulnerable to external attacks. In the context of digital production systems, it is essential to understand that cyber security is a joint and overarching task in the fields of both IT and OT. Therefore, security aspects in IIoT environments require special attention, while new solutions for the maintenance of cyber security are necessary. For this reason, regulatory efforts to have been made to establish the implementation of security measures such as IEC62443 in the EU as a standard. According to the IEC62443 standard, respective organizations should follow a security by design paradigm. In this respect, to conduct meaningful and sustainable security management, it is crucial to know and define corporate assets that must be protected as well as operative processes and their information-related needs. Based thereon, risks can be identified, protective measures can be taken, and security incidents can be monitored.

This Special Issue therefore aims to amalgamate original research and review articles regarding recent advancements, technologies, solutions, applications, and new challenges in the field of Industrial IoT security with a strong interdisciplinary focus on underlying operative processes.

Potential topics include but are not limited to:

  • Modeling sensor-aware security aspects in IIoT processes;
  • (Sensor) technologies supporting privacy and security in IIoT processes;
  • IoT and ubiquitous technologies supporting processes;
  • Sensor-based security monitoring in IIoT processes;
  • Visual analytics enabling cyber security in IIoT;
  • IIoT-enhanced process model discovery, recognition, monitoring and prediction;
  • Process anomaly detection from sensor-based IIoT data.

Prof. Dr. Stefan Schönig
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • industrial IoT
  • cyber security
  • process management
  • process modelling
  • sensors

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

27 pages, 2711 KiB  
Article
A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World
by Tyler Cultice, Joseph Clark, Wu Yang and Himanshu Thapliyal
Sensors 2023, 23(24), 9886; https://doi.org/10.3390/s23249886 - 17 Dec 2023
Cited by 1 | Viewed by 1091
Abstract
As the popularity of 3D printing or additive manufacturing (AM) continues to increase for use in commercial and defense supply chains, the requirement for reliable, robust protection from adversaries has become more important than ever. Three-dimensional printing security focuses on protecting both the [...] Read more.
As the popularity of 3D printing or additive manufacturing (AM) continues to increase for use in commercial and defense supply chains, the requirement for reliable, robust protection from adversaries has become more important than ever. Three-dimensional printing security focuses on protecting both the individual Industrial Internet of Things (I-IoT) AM devices and the networks that connect hundreds of these machines together. Additionally, rapid improvements in quantum computing demonstrate a vital need for robust security in a post-quantum future for critical AM manufacturing, especially for applications in, for example, the medical and defense industries. In this paper, we discuss the attack surface of adversarial data manipulation on the physical inter-device communication bus, Controller Area Network (CAN). We propose a novel, hierarchical tree solution for a secure, post-quantum-supported security framework for CAN-based AM devices. Through using subnet hopping between isolated CAN buses, our framework maintains the ability to use legacy or third-party devices in a plug-and-play fashion while securing and minimizing the attack surface of hardware Trojans or other adversaries. The results of the physical implementation of our framework demonstrate 25% and 90% improvement in message costs for authentication compared to existing lightweight and post-quantum CAN security solutions, respectively. Additionally, we performed timing benchmarks on the normal communication (hopping) and authentication schemes of our framework. Full article
Show Figures

Figure 1

Back to TopTop