A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations
Industrial IoT (IIoT) refers to the application of IoT in industrial management to improve the overall operational efficiency. With IIoT that accelerates the industrial automation process by enrolling thousands of IoT devices, strong security foundations are to be deployed befitting the distributed...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8430731/ |
id |
doaj-3af64ee430554da3be6451fbfed0500b |
---|---|
record_format |
Article |
spelling |
doaj-3af64ee430554da3be6451fbfed0500b2021-03-29T20:50:53ZengIEEEIEEE Access2169-35362018-01-016435864360110.1109/ACCESS.2018.28632448430731A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability ExploitationsGemini George0Sabu M. Thampi1https://orcid.org/0000-0001-6453-5520Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, IndiaIndian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, IndiaIndustrial IoT (IIoT) refers to the application of IoT in industrial management to improve the overall operational efficiency. With IIoT that accelerates the industrial automation process by enrolling thousands of IoT devices, strong security foundations are to be deployed befitting the distributed connectivity and constrained functionalities of the IoT devices. Recent years witnessed severe attacks exploiting the vulnerabilities in the devices of IIoT networks. Moreover, attackers can use the relations among the vulnerabilities to penetrate deep into the network. This paper addresses the security issues in IIoT network because of the vulnerabilities existing in its devices. As graphs are efficient in representing relations among entities, we propose a graphical model representing the vulnerability relations in the IIoT network. This helps to formulate the security issues in the network as graph-theoretic problems. The proposed model acts as a security framework for the risk assessment of the network. Furthermore, we propose a set of risk mitigation strategies to improve the overall security of the network. The strategies include detection and removal of the attack paths with high risk and low hop-length. We also discuss a method to identify the strongly connected vulnerabilities referred as hot-spots. A use-case is discussed and various security parameters are evaluated. The simulation results with graphs of different sizes and structures are presented for the performance evaluation of the proposed techniques against the changing dynamics of the IIoT networks.https://ieeexplore.ieee.org/document/8430731/Industrial IoTInternet of Thingsnetwork securityrisk assessmentattack graph |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Gemini George Sabu M. Thampi |
spellingShingle |
Gemini George Sabu M. Thampi A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations IEEE Access Industrial IoT Internet of Things network security risk assessment attack graph |
author_facet |
Gemini George Sabu M. Thampi |
author_sort |
Gemini George |
title |
A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations |
title_short |
A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations |
title_full |
A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations |
title_fullStr |
A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations |
title_full_unstemmed |
A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations |
title_sort |
graph-based security framework for securing industrial iot networks from vulnerability exploitations |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
Industrial IoT (IIoT) refers to the application of IoT in industrial management to improve the overall operational efficiency. With IIoT that accelerates the industrial automation process by enrolling thousands of IoT devices, strong security foundations are to be deployed befitting the distributed connectivity and constrained functionalities of the IoT devices. Recent years witnessed severe attacks exploiting the vulnerabilities in the devices of IIoT networks. Moreover, attackers can use the relations among the vulnerabilities to penetrate deep into the network. This paper addresses the security issues in IIoT network because of the vulnerabilities existing in its devices. As graphs are efficient in representing relations among entities, we propose a graphical model representing the vulnerability relations in the IIoT network. This helps to formulate the security issues in the network as graph-theoretic problems. The proposed model acts as a security framework for the risk assessment of the network. Furthermore, we propose a set of risk mitigation strategies to improve the overall security of the network. The strategies include detection and removal of the attack paths with high risk and low hop-length. We also discuss a method to identify the strongly connected vulnerabilities referred as hot-spots. A use-case is discussed and various security parameters are evaluated. The simulation results with graphs of different sizes and structures are presented for the performance evaluation of the proposed techniques against the changing dynamics of the IIoT networks. |
topic |
Industrial IoT Internet of Things network security risk assessment attack graph |
url |
https://ieeexplore.ieee.org/document/8430731/ |
work_keys_str_mv |
AT geminigeorge agraphbasedsecurityframeworkforsecuringindustrialiotnetworksfromvulnerabilityexploitations AT sabumthampi agraphbasedsecurityframeworkforsecuringindustrialiotnetworksfromvulnerabilityexploitations AT geminigeorge graphbasedsecurityframeworkforsecuringindustrialiotnetworksfromvulnerabilityexploitations AT sabumthampi graphbasedsecurityframeworkforsecuringindustrialiotnetworksfromvulnerabilityexploitations |
_version_ |
1724194031476408320 |