A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations

Industrial IoT (IIoT) refers to the application of IoT in industrial management to improve the overall operational efficiency. With IIoT that accelerates the industrial automation process by enrolling thousands of IoT devices, strong security foundations are to be deployed befitting the distributed...

Full description

Bibliographic Details
Main Authors: Gemini George, Sabu M. Thampi
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8430731/
id doaj-3af64ee430554da3be6451fbfed0500b
record_format Article
spelling doaj-3af64ee430554da3be6451fbfed0500b2021-03-29T20:50:53ZengIEEEIEEE Access2169-35362018-01-016435864360110.1109/ACCESS.2018.28632448430731A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability ExploitationsGemini George0Sabu M. Thampi1https://orcid.org/0000-0001-6453-5520Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, IndiaIndian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, IndiaIndustrial IoT (IIoT) refers to the application of IoT in industrial management to improve the overall operational efficiency. With IIoT that accelerates the industrial automation process by enrolling thousands of IoT devices, strong security foundations are to be deployed befitting the distributed connectivity and constrained functionalities of the IoT devices. Recent years witnessed severe attacks exploiting the vulnerabilities in the devices of IIoT networks. Moreover, attackers can use the relations among the vulnerabilities to penetrate deep into the network. This paper addresses the security issues in IIoT network because of the vulnerabilities existing in its devices. As graphs are efficient in representing relations among entities, we propose a graphical model representing the vulnerability relations in the IIoT network. This helps to formulate the security issues in the network as graph-theoretic problems. The proposed model acts as a security framework for the risk assessment of the network. Furthermore, we propose a set of risk mitigation strategies to improve the overall security of the network. The strategies include detection and removal of the attack paths with high risk and low hop-length. We also discuss a method to identify the strongly connected vulnerabilities referred as hot-spots. A use-case is discussed and various security parameters are evaluated. The simulation results with graphs of different sizes and structures are presented for the performance evaluation of the proposed techniques against the changing dynamics of the IIoT networks.https://ieeexplore.ieee.org/document/8430731/Industrial IoTInternet of Thingsnetwork securityrisk assessmentattack graph
collection DOAJ
language English
format Article
sources DOAJ
author Gemini George
Sabu M. Thampi
spellingShingle Gemini George
Sabu M. Thampi
A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations
IEEE Access
Industrial IoT
Internet of Things
network security
risk assessment
attack graph
author_facet Gemini George
Sabu M. Thampi
author_sort Gemini George
title A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations
title_short A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations
title_full A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations
title_fullStr A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations
title_full_unstemmed A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations
title_sort graph-based security framework for securing industrial iot networks from vulnerability exploitations
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2018-01-01
description Industrial IoT (IIoT) refers to the application of IoT in industrial management to improve the overall operational efficiency. With IIoT that accelerates the industrial automation process by enrolling thousands of IoT devices, strong security foundations are to be deployed befitting the distributed connectivity and constrained functionalities of the IoT devices. Recent years witnessed severe attacks exploiting the vulnerabilities in the devices of IIoT networks. Moreover, attackers can use the relations among the vulnerabilities to penetrate deep into the network. This paper addresses the security issues in IIoT network because of the vulnerabilities existing in its devices. As graphs are efficient in representing relations among entities, we propose a graphical model representing the vulnerability relations in the IIoT network. This helps to formulate the security issues in the network as graph-theoretic problems. The proposed model acts as a security framework for the risk assessment of the network. Furthermore, we propose a set of risk mitigation strategies to improve the overall security of the network. The strategies include detection and removal of the attack paths with high risk and low hop-length. We also discuss a method to identify the strongly connected vulnerabilities referred as hot-spots. A use-case is discussed and various security parameters are evaluated. The simulation results with graphs of different sizes and structures are presented for the performance evaluation of the proposed techniques against the changing dynamics of the IIoT networks.
topic Industrial IoT
Internet of Things
network security
risk assessment
attack graph
url https://ieeexplore.ieee.org/document/8430731/
work_keys_str_mv AT geminigeorge agraphbasedsecurityframeworkforsecuringindustrialiotnetworksfromvulnerabilityexploitations
AT sabumthampi agraphbasedsecurityframeworkforsecuringindustrialiotnetworksfromvulnerabilityexploitations
AT geminigeorge graphbasedsecurityframeworkforsecuringindustrialiotnetworksfromvulnerabilityexploitations
AT sabumthampi graphbasedsecurityframeworkforsecuringindustrialiotnetworksfromvulnerabilityexploitations
_version_ 1724194031476408320