Big Concern: How to provide security to Industrial IoT data streams

The expanded application of Internet of Things(IoT) has brought development of Industry 4.0 up. The big streams of IIoT are main cause of implementing data-driven strategies. and what makes reliable such those networks? as soon as we see “Reliable” word, something blinks on audiences mind related the methods for carrying out the privacy and security.

Fog-computing-in-Industrial-IoT
https://www.researchgate.net/figure/Fog-computing-in-Industrial-IoT_fig3_326359269

Security on decentralized IIoT

Software solution paradigm :

As the matter of fact, the user mode solutions for handling the security , are primarily located on our thought . may be somebody says it’s better to bring the security of streams into user side. For example by the guard softwares or applications embedded on IoT boards which we call them SENSOR. let’s speech clearly. It is now essential for business to consider production infrastructure in their IT security strategies. Meanwhile, there are completely new attack vectors introduced by connecting machinery that must be monitored and protected by IT administrators. some vendors suggest software components which offers proven methods to secure data stream communications. But these scenarios mainly act better on centralized networks which there are some hosts to manage end-user’s data. But what about decentralized network and their generated big data? Does the software solution or end-user solution sufficient? Definitely not! It’s obvious we face huge amount of data generated by sensors which are inclined to be transfer some where with including enough power and ability. Therefore, what kind of approaches would be apply in security matters?! Undoubtedly only one method such as secure Tunnel nor data monitoring tools in one side will not be the best way.

Secure Channel paradigm:

How about the path of data streams? As we all know, the main concern of all networks( Data_Centric one), is how to provide safe communication channel. Cheifly on decentralized networks whose there is not main peer for data management except the nodes themselves. Thus one way to bring reliability is using cryptography algorithms. All connections between the end devices and the IIoT remote gateway or the central IIoT gateway and the IIoT remote gateway are encrypted with advanced algorithms (for example using Suite B cryptography). For additional security, all machine certificates can be managed centrally in a public key infrastructure (PKI). This ensures unique authentication for all end devices. Each time a connection is established, certificates are validated against Certification Authority (CA) revocation lists (online or offline).

Edge Components paradigm:

As the earlier posts, IoT and IIoT include Edge solutions which provide more convenience data processing mechanisms. Some principals such as device centric solutions, edge-based security orchestration , etc. albeit, as the Edge involves number of components then there would be main concerns on how to make secure relations. The DLT (Distributed Hash Table) which based on blockchain method, is asserted to this challenge. Another certain way is using strong protocols such as IPFS. This is HTML-based solution for securing decentralized WEB but in some ways industry owners whom wants to implement IIoT, would carry out this protocol.

Data Priority paradigm:

After all possible methods we can speak about, I want to allude to new paradigm related the mentioned issue. Do the priority of data play a role ? I mean If there would some components for leveraging the data priority, then we can say security issues would be overwhelm. In such a way that higher priority data is stored in the IoT components with certain methods. because that is not cost effective nor time consuming to manage all absorbed data in one way.

Conclusion !

at last but not least, Integrity, confidentiality, and privacy are three big concerns should be take over by Industry 4.0 owners. The big data streams could be handle by machine learning methods in which the Priority has a main role and I want to write more in deep about data priority soon.

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *