Abstract
Considering the openness of industrial Internet-of-Things systems as compared with conventional SCADA-like systems, the provision of sustainable and continuous production becomes a more relevant and complex task. This article considers the application of the security-through-obscurity principle as the original method of maintaining production process continuity. An attempt to derive a formula for evaluating the protection level when using this principle is described.
Similar content being viewed by others
REFERENCES
Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., and Ghani, N., Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations, IEEE Commun. Surv. Tutorials, 2019, vol. 21, no. 3, pp. 2702–2733. https://doi.org/10.1109/COMST.2019.2910750
Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., Moscow, 2019, Basarab, M. and Markov, A.S., Eds., Moscow: CEUR Workshop Proceedings, 2019, pp. 60–64.
Zegzhda, P.D., Zegzhda, D.P., and Nikolsky, A.V., Using graph theory for cloud system security modeling, Computer Network Security. MMM-ACNS 2012, Kotenko, I. and Skormin, V., Eds., Lecture Notes in Computer Science, vol. 7531, Berlin: Springer, 2012, pp. 309–318. https://doi.org/10.1007/978-3-642-33704-8_26
Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, 2018, IEEE, 2018, pp. 830–834. https://doi.org/10.1109/ICPHYS.2018.8390814
Zegzhda, D.P., Lavrova, D.S., and Pavlenko, E.Yu., Management of a dynamic infrastructure of complex systems under conditions of directed cyber attacks, J. Comput. Syst. Sci. Int., 2020, vol. 59, no. 3, pp. 358–370. https://doi.org/10.1134/S1064230720020124
Ognev, R.A., Zhukovskii, E.V., and Zegzhda, D.P., Clustering of malicious executable files based on the sequence analysis of system calls, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1045–1055. https://doi.org/10.3103/S0146411619080212
Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Estimating the sustainability of cyber-physical systems based on spectral graph theory, IEEE Int. Black Sea Conf. on Communications and Networking (BlackSeaCom), Sochi, Russia, 2019, IEEE, 2019, pp. 1–5. https://doi.org/10.1109/BlackSeaCom.2019.8812826
Zegzhda, D. and Stepanova, T., Achieving internet of things security via providing topological sustainability, Science and Information Conf. (SAI), London, 2015, IEEE, 2015, pp. 269–276. https://doi.org/10.1109/SAI.2015.7237154
Lin, S., Crawford, M., and Mellor, S., The industrial Internet of Things, Volume G1: Reference Architecture, 2017. https://www.iiconsortium.org/IIC_PUB_G1_V1.80_2017-01-31.pdf. Cited February 19, 2019.
Ross, M., Hannes, T., and Jara, A., Baseline security recommendations for IoT in the context of critical information infrastructures, 2017. https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot/at_download/fullReport. Cited January 21, 2019.
Abbas, S.G., Hashmat, F., and Shah, G.A., A multi-layer industrial-IoT attack taxonomy: Layers, dimensions, techniques and application, Res. Square, 2021. https://doi.org/10.21203/rs.3.rs-167812/v1
Secrecy (obscurity) is a valid security layer, 2019. https://danielmiessler.com/study/security-by-obscurity/. Cited February 5, 2021.
Garlic routing and “garlic” terminology, 2014. https://geti2p.net/en/docs/how/garlic-routing. Cited December 20, 2021.
Hoang, N.P., Kintis, P., Antonakakis, M., and Polychronakis, M., An empirical study of the I2P anonymity network and its censorship resistance, in Proc. Internet Measurement Conf., Boston, 2018, New York: Association for Computing Machinery, 2018, pp. 379–392. https://doi.org/10.1145/3278532.3278565
Diaz, C., Seys, S., Claessens, J., and Preneel, B., Towards measuring anonymity, in Privacy Enhancing Technologies. PET 2002, Dingledine, R. and Syverson, P., Eds., Lecture Notes in Computer Science, vol. 2482, Berlin: Springer, 2003, pp. 54–68. https://doi.org/10.1007/3-540-36467-6_5
Funding
This study was funded by the Ministry of Science and Higher Education of the Russian Federation (grant IB), scientific project 20/2020.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by S. Kuznetsov
About this article
Cite this article
Dakhnovich, A.D., Moskvin, D.A. & Zegzhda, D.P. Using Security-through-Obscurity Principle in an Industrial Internet of Things. Aut. Control Comp. Sci. 55, 1061–1067 (2021). https://doi.org/10.3103/S0146411621080083
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411621080083