论文标题
为工业互联网开发安全测试床
Developing a Security Testbed for Industrial Internet of Things
论文作者
论文摘要
尽管实现工业互联网(IIOT)的安全性是一项至关重要且不琐碎的任务,但Brownfield IIOT系统需要更多关注。这是其传统设备长寿周期的结果,这些设备最初是在不考虑安全性和物联网连接性的情况下设计的,但是它们现在正变得更加连接并与新兴的物联网技术和消息传递通信协议相结合。当今的方法和解决方案在Brownfield IIOT系统中不可行,因为安全解决方案必须共存并符合这些系统要求。这需要一个现实的标准化IIT测试台,可以用作最佳格式,以衡量IIOT网络安全解决方案的信誉,分析IIT攻击景观并提取威胁智能。为BrownField IIOT系统开发测试床被认为是一个重大挑战,因为这些系统包括遗产,异质设备,通信层和应用需要全面实施以实现高保真度。在本文中,我们提出了一种新的通用端到端IIOT安全性测试床,特别关注棕场系统,并提供了测试床的建筑设计和实施过程的详细信息。可以轻松地复制和重新配置所提出的测试床,以支持新过程和各种安全方案的测试活动。在不同的连接设备,通信协议和应用程序上证明了拟议的测试台操作。实验表明,该测试床在其操作和安全性测试方面有效。提供了与现有测试床的比较,包括功能表。
While achieving security for Industrial Internet of Things (IIoT) is a critical and non-trivial task, more attention is required for brownfield IIoT systems. This is a consequence of long life cycles of their legacy devices which were initially designed without considering security and IoT connectivity, but they are now becoming more connected and integrated with emerging IoT technologies and messaging communication protocols. Deploying today's methodologies and solutions in brownfield IIoT systems is not viable, as security solutions must co-exist and fit these systems requirements. This necessitates a realistic standardized IIoT testbed that can be used as an optimal format to measure the credibility of security solutions of IIoT networks, analyze IIoT attack landscapes and extract threat intelligence. Developing a testbed for brownfield IIoT systems is considered a significant challenge as these systems are comprised of legacy, heterogeneous devices, communication layers and applications that need to be implemented holistically to achieve high fidelity. In this paper, we propose a new generic end-to-end IIoT security testbed, with a particular focus on the brownfield system and provide details of the testbed's architectural design and the implementation process. The proposed testbed can be easily reproduced and reconfigured to support the testing activities of new processes and various security scenarios. The proposed testbed operation is demonstrated on different connected devices, communication protocols and applications. The experiments demonstrate that this testbed is effective in terms of its operation and security testing. A comparison with existing testbeds, including a table of features is provided.