Skip to main content
Log in

Using Security-through-Obscurity Principle in an Industrial Internet of Things

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

Considering the openness of industrial Internet-of-Things systems as compared with conventional SCADA-like systems, the provision of sustainable and continuous production becomes a more relevant and complex task. This article considers the application of the security-through-obscurity principle as the original method of maintaining production process continuity. An attempt to derive a formula for evaluating the protection level when using this principle is described.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.
Fig. 9.

Similar content being viewed by others

REFERENCES

  1. Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., and Ghani, N., Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations, IEEE Commun. Surv. Tutorials, 2019, vol. 21, no. 3, pp. 2702–2733.  https://doi.org/10.1109/COMST.2019.2910750

    Article  Google Scholar 

  2. Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., Moscow, 2019, Basarab, M. and Markov, A.S., Eds., Moscow: CEUR Workshop Proceedings, 2019, pp. 60–64.

  3. Zegzhda, P.D., Zegzhda, D.P., and Nikolsky, A.V., Using graph theory for cloud system security modeling, Computer Network Security. MMM-ACNS 2012, Kotenko, I. and Skormin, V., Eds., Lecture Notes in Computer Science, vol. 7531, Berlin: Springer, 2012, pp. 309–318.  https://doi.org/10.1007/978-3-642-33704-8_26

    Book  Google Scholar 

  4. Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, 2018, IEEE, 2018, pp. 830–834.  https://doi.org/10.1109/ICPHYS.2018.8390814

  5. Zegzhda, D.P., Lavrova, D.S., and Pavlenko, E.Yu., Management of a dynamic infrastructure of complex systems under conditions of directed cyber attacks, J. Comput. Syst. Sci. Int., 2020, vol. 59, no. 3, pp. 358–370.  https://doi.org/10.1134/S1064230720020124

    Article  MATH  Google Scholar 

  6. Ognev, R.A., Zhukovskii, E.V., and Zegzhda, D.P., Clustering of malicious executable files based on the sequence analysis of system calls, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1045–1055.  https://doi.org/10.3103/S0146411619080212

    Article  Google Scholar 

  7. Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Estimating the sustainability of cyber-physical systems based on spectral graph theory, IEEE Int. Black Sea Conf. on Communications and Networking (BlackSeaCom), Sochi, Russia, 2019, IEEE, 2019, pp. 1–5.  https://doi.org/10.1109/BlackSeaCom.2019.8812826

  8. Zegzhda, D. and Stepanova, T., Achieving internet of things security via providing topological sustainability, Science and Information Conf. (SAI), London, 2015, IEEE, 2015, pp. 269–276.  https://doi.org/10.1109/SAI.2015.7237154

  9. Lin, S., Crawford, M., and Mellor, S., The industrial Internet of Things, Volume G1: Reference Architecture, 2017. https://www.iiconsortium.org/IIC_PUB_G1_V1.80_2017-01-31.pdf. Cited February 19, 2019.

  10. Ross, M., Hannes, T., and Jara, A., Baseline security recommendations for IoT in the context of critical information infrastructures, 2017. https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot/at_download/fullReport. Cited January 21, 2019.

  11. Abbas, S.G., Hashmat, F., and Shah, G.A., A multi-layer industrial-IoT attack taxonomy: Layers, dimensions, techniques and application, Res. Square, 2021. https://doi.org/10.21203/rs.3.rs-167812/v1

    Book  Google Scholar 

  12. Secrecy (obscurity) is a valid security layer, 2019. https://danielmiessler.com/study/security-by-obscurity/. Cited February 5, 2021.

  13. Garlic routing and “garlic” terminology, 2014. https://geti2p.net/en/docs/how/garlic-routing. Cited December 20, 2021.

  14. Hoang, N.P., Kintis, P., Antonakakis, M., and Polychronakis, M., An empirical study of the I2P anonymity network and its censorship resistance, in Proc. Internet Measurement Conf., Boston, 2018, New York: Association for Computing Machinery, 2018, pp. 379–392.  https://doi.org/10.1145/3278532.3278565

  15. Diaz, C., Seys, S., Claessens, J., and Preneel, B., Towards measuring anonymity, in Privacy Enhancing Technologies. PET 2002, Dingledine, R. and Syverson, P., Eds., Lecture Notes in Computer Science, vol. 2482, Berlin: Springer, 2003, pp. 54–68.  https://doi.org/10.1007/3-540-36467-6_5

    Book  Google Scholar 

Download references

Funding

This study was funded by the Ministry of Science and Higher Education of the Russian Federation (grant IB), scientific project 20/2020.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to A. D. Dakhnovich, D. A. Moskvin or D. P. Zegzhda.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by S. Kuznetsov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dakhnovich, A.D., Moskvin, D.A. & Zegzhda, D.P. Using Security-through-Obscurity Principle in an Industrial Internet of Things. Aut. Control Comp. Sci. 55, 1061–1067 (2021). https://doi.org/10.3103/S0146411621080083

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411621080083

Keywords:

Navigation