The Internet of Things (IoT) is a vast collection of interconnected sensors, devices, and services that share data and information over the Internet with the objective of leveraging multiple information sources to optimize related systems. The technologies associated with the IoT have significantly improved the quality of many existing applications by reducing costs, improving functionality, increasing access to resources, and enhancing automation. The adoption of IoT by industries has led to the next industrial revolution: Industry 4.0. The rise of the Industrial IoT (IIoT) promises to enhance factory management, process optimization, worker safety, and more. However, the rollout of the IIoT is not without significant issues, and many of these act as major barriers that prevent fully achieving the vision of Industry 4.0. One major area of concern is the security and privacy of the massive datasets that are captured and stored, which may leak information about intellectual property, trade secrets, and other competitive knowledge. As a way forward toward solving security and privacy concerns, we aim in this paper to identify common input-output (I/O) design patterns that exist in applications of the IIoT. These design patterns enable constructing an abstract model representation of data flow semantics used by such applications, and therefore better understand how to secure the information related to IIoT operations. In this paper, we describe communication protocols and identify common I/O design patterns for IIoT applications with an emphasis on data flow in edge devices, which, in the industrial control system (ICS) setting, are most often involved in process control or monitoring.
more »
« less
Privacy-Preserving Database Assisted Spectrum Access for Industrial Internet of Things: A Distributed Learning Approach
Industrial Internet of Things (IIoT) has been shown to be of great value to the deployment of smart industrial environment. With the immense growth of IoT devices, dynamic spectrum sharing is introduced, envisaged as a promising solution to the spectrum shortage in IIoT. Meanwhile, cyber-physical safety issue remains to be a great concern for the reliable operation of IIoT system. In this paper, we consider the dynamic spectrum access in IIoT under a Received Signal Strength (RSS) based adversarial localization attack. We employ a practical and effective power perturbation approach to mitigate the localization threat on the IoT devices and cast the privacy-preserving spectrum sharing problem as a stochastic channel selection game. To address the randomness induced by the power perturbation approach, we develop a two-timescale distributed learning algorithm that converges almost surely to the set of correlated equilibria of the game. The numerical results show the convergence of the algorithm and corroborate that the design of two-timescale learning process effectively alleviates the network throughput degradation brought by the power perturbation procedure.
more »
« less
- Award ID(s):
- 1838024
- PAR ID:
- 10129633
- Date Published:
- Journal Name:
- IEEE Transactions on Industrial Electronics
- ISSN:
- 0278-0046
- Page Range / eLocation ID:
- 1 to 1
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
In intelligent IoT networks, an IoT user is capable of sensing the spectrum and learning from its observation to dynamically access the wireless channels without interfering with the primary user’s signal. The network, however, is potentially subject to primary user emulation and jamming attacks. In the existing works, various attacks and defense mechanisms for spectrum sharing in IoT networks have been proposed. This paper systematically conducts a targeted survey of these efforts and proposes new approaches for future studies to strengthen the communication of IoT users. Our proposed methods involve the development of intelligent IoT devices that go beyond existing solutions, enabling them not only to share the spectrum with licensed users but also to effectively thwart potential attackers. First, considering practical aspects of imperfect spectrum sensing and delay, we propose to utilize online machine learning-based approaches to design spectrum sharing attack policies. We also investigate the attacker’s channel observation/sensing capabilities to design attack policies using time-varying feedback graph models. Second, taking into account the IoT devices’ practical characteristics of channel switching delay, we propose online learning-based channel access policies for optimal defense by the IoT device to guarantee the maximum network capacity. We then highlight future research directions, focusing on the defense of IoT devices against adaptive attackers. Finally, aided by concepts from intelligence and statistical factor analysis tools, we provide a workflow which can be utilized for devices’ intelligence factors impact analysis on the defense performance.more » « less
-
Internet of Things (IoT) is becoming increasingly popular due to its ability to connect machines and enable an ecosystem for new applications and use cases. One such use case is industrial loT (1IoT) that refers to the application of loT in industrial settings especially engaging instrumentation and control of sensors and machines with Cloud technologies. Industries are counting on the fifth generation (5G) of mobile communications to provide seamless, ubiquitous and flexible connectivity among machines, people and sensors. The open radio access network (O-RAN) architecture adds additional interfaces and RAN intelligent controllers that can be leveraged to meet the IIoT service requirements. In this paper, we examine the connectivity requirements for IIoT that are dominated by two industrial applications: control and monitoring. We present the strength, weakness, opportunity, and threat (SWOT) analysis of O-RAN for IIoT and provide a use case example which illustrates how O-RAN can support diverse and changing IIoT network services. We conclude that the flexibility of the O-RAN architecture, which supports the latest cellular network standards and services, provides a path forward for next generation IIoT network design, deployment, customization, and maintenance. It offers more control but still lacks products-hardware and software-that are exhaustively tested in production like environments.more » « less
-
Internet-of-things (IoT) devices (e.g., micro camera and microphone) are usually small form factor, low-cost, and low-power, which makes them easy to conceal and deploy in the indoor environment to spy on people for human private information such as location and indoor activities. As a result, these IoT devices introduce a great privacy and ethical threat. Therefore, it is important to reveal these concealed IoT devices in the indoor environment for human privacy protection. This paper presents RFScan, a system that can passively detect, fingerprint, and localize diverse concealed IoT devices in the indoor environment by sensing their unintentional electromagnetic emanations. However, sensing these emanations is challenging due to the weak emanation strength and the interference from the ambient wireless communication signals. To this end, we boost the emanation strength through the non-coherent averaging based on the emanation signal's characteristics and design a novel suppression algorithm to mitigate interference from the wireless communication signals. We further profile emanations across frequency and time that act as the emanation source's unique signature and customize a deep neural network architecture to fingerprint the emanation sources. Furthermore, we can localize the emanation source with an angle-of-arrival (AoA) based triangulation approach. Our experimental results demonstrate the efficiency of the IoT devices' detection, fingerprinting, and localization across different indoor environments.more » « less
-
null (Ed.)Industrial Internet of Things (IIoT) systems aim to interconnect a large number of heterogeneous industrial sensing and actuation devices through both wired and wireless communication technologies and further connect them to the Internet to achieve ubiquitous sensing, computing and control services [1]. As a representative IIoT technology, 6TiSCH [2] targets at gluing together the 802.15.4e data link layer (offering industrial performance in terms of timing, reliability and power consumption) and an IP-enabled upper layer stack to achieve both deterministic network performance and seamless integration with Internet services. In recent years, 6TiSCH has been receiving increasing attentions from both industry and academia. We have witnessed its wide deployment in many industrial domains, including advanced manufacturing, industrial process control, smart grids, and healthcare.more » « less
An official website of the United States government

