IJIEEB Vol. 16, No. 5, 8 Oct. 2024
Cover page and Table of Contents: PDF (size: 317KB)
PDF (317KB), PP.55-62
Views: 0 Downloads: 0
Azure Cloud, Cloud security monitoring, Industrial IoT (IIoT), Threat Model, Network security group (NSG), Virtual network (Vnet)
In this paper, we take Industrial IoT (IloT) as a main point, where we touch on the direction of Industrial IoT concepts and connectivity protocols used by Industrial IoT devices. Moreover, we go into deep security challenges the Industrial ecosystem faces. Nowadays, most industries focus on specific protocols in their smart IoT devices. In return, we mainly focus on Message Queuing Telemetry Transport (MQTT) protocol, MQTT server where IoT devices are connected to it, and secure connectivity among server, cloud, and end user. Our purpose here is to describe the security approach for server and cloud-based environments and the utilization of cloud security tools such as IoT-hub, Network Security Group (NSG) and virtual private network (VPN). In more detail, here we have indicated proposed solution by separating into device, on-premises and cloud zone sections, proper technologies which are being used in modern security approaches and comparison with traditional IoT security approaches. This article enables readers to obtain fundamental knowledges on available technologies which are utilized in industrial areas and real-time scenarios where this solution is deployed.
Orkhan Aslanli, "Cloud and On-premises Based Security Solution for Industrial IoT", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.16, No.5, pp. 55-62, 2024. DOI:10.5815/ijieeb.2024.05.02
[1]Haralambos Mouratidis, Vasiliki Diamantopoulou, "A Security Analysis Method for Industrial Internet of Things,"{IEEE Transaction and Industrial Internet of Things}., 2018.
[2]Jiong Shi Liping Jin and Jun Li, "The Integration of Azure Sphere and Azure Cloud Services for Internet of Things,” {MDPI}., 2018.
[3]Zeinab Bakshi, Ali Balador and Jawwad Mustafa, "Industrial IoT Security Threats and Concerns by Considering Cisco and Microsoft IoT reference Models,"{IEEE Wireless Communication and Networking Conference Workshops}., 2018.
[4]George Mavridis, "Security Mechanisms for Internet of Things,"{Academia.edu}., 2021.
[5]Michael Frey, Cenk Gundogan, Peter Kietzmann, Martine Lenders, Hauke Petersen, Thomas C. Schmidt, Flex Juraschek, Matthias Wahlisch, "Security for the Industrial IoT: The Case for Information-Centric Networking,"{IEEE 5th World Form on Internet of Things}.,2018.
[6]Björn Leander and Hans Hansson, "Cybersecurity Challenges in Large Industrial IoT Systems," {2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)}., 2019.
[7]Eric D. Knapp and Joel Thomas Langill, "Industrial Network Security (Second Edition)" {Syngress}.,2015.
[8]Omerah Yousuf, Roohie Naaz Mir “A survey on Internet of Things security: State of art, architecture, issues and countermeasures”, 2019.
[9]Lubna Luxmi Dhirani, Eddie Armstrong and Thomas Newe, "Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap," {IEEE Wireless Communication and Networking Workshops}.,2021.
[10]Joseph Jose Anthraper, Jaidip Kotak, “Security, Privacy and Forensic Concern of MQTT protocol,"{International Conference on Sustainable Computing in Science}., 2019 DOI:10.2139/ssrn.3355193
[11]MQTT Version 5.0. Edited by Andrew Banks, Ed Briggs, Ken Borgendale, and Rahul Gupta. 07 March 2019. OASIS Standard. https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt v5.0-os.html. (accessed 25.02.2023).
[12]www.upguard.com/blog/network-segmentation-best practices (accessed 09.16.2023). DOI: Not available
[13]Hanlin Chen, Ming Hu, Hui Yan, and Ping Yu, "Research on Industrial Internet of Things Security Architecture and Protection Strategy,”{IEEE International Conference on Virtual Reality and Intelligent System}., 2019
[14]Soo Fun Tan and Azman Samsudin, "Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey,"{MDPI}., 2021.
[15]Martin, Serror, Sacha Hack, Martin Henze, Marko Schuba and Klaus Wehrle, "Challenges and Opportunities in Securing the Industrial Internet of Things,” {IEEE Transaction on Industrial Informatics}.,
[16]Microsoft Azure https://learn.microsoft.com/en us/azure/iot-hub/iot-hub-tls-support (accessed 03.03.2023).
[17]Eric D. Knapp and Joel Thomas Langill, "Industrial Network Security (Second Edition)" {Syngress}.,2015.
[18]Luigi Coppolino, Salvatore, D' Antonio, Giovanni Mazzeo and Luigi Romano, "Cloud security: Emerging threats and current solutions,"{Computers and Electrical Engineering}.,2017.
[19]Microsoft Azure https://learn.microsoft.com/en us/azure/virtual-network/ (accessed 01.03.2023).
[20]Abhijeet Thakare, Euijong Lee, Ajay Kumar, Valmik B Nikam and Young-Gab Kim, " PARBAC: Priority-Attribute Based RBAC Model for Azure IoT Cloud,"{IEEE Wireless Communication and Networking Conference Workshops}., 2019.
[21][White Paper] The Four Pillars of a Trusted Industrial Information Infrastructure (aveva.com) (accessed 01.05.2024).
[22]GE Predix Platform | Industrial IoT Platform | GE Digital (accessed 01.03.2024).