Security, IoT Internet of Things, Critical Infrastructures, Technologies, Solutions, Vulnerabilities, Standards, Innovations, Cyber Risks, National Security
This research examines the security of IoT devices in critical infrastructures, balancing technological innovation and protection against cyber risks.
[...] Here are two advanced techniques that stand out in this context: homomorphic encryption and dynamic symmetric encryption. Homomorphic Encryption: Homomorphic encryption is one of the most promising cryptographic techniques for IoT devices, particularly due to its ability to offer secure data processing without the need to decrypt it. Typically, data must be decrypted before being manipulated or processed, creating a vulnerability window. Homomorphic encryption circumvents this issue by enabling devices to process data while keeping it encrypted. This ensures that even during the computation or analysis process, sensitive data remains protected against cyberattacks or unauthorized access. [...]
[...] In this case, the attacker would literally cut off the power supply to millions of people. The consequences of such assaults would be mass chaos, prolonged service disruptions, and severe economic disturbances affecting millions of people across various sectors, including transportation, medical services, and communications. The water sector, responsible for providing potable water and collecting wastewater, uses IoT devices to monitor water levels, water quality, and distribution systems. Vulnerabilities in IoT devices in this infrastructure can have consequences for public health and the environment. [...]
[...] In this way, reaction time is reduced and the integrity of the information remains more or less intact in the process. - Advantages : By using these technologies, Enel can improve the resilience and security of Smart Grids. Fog computing and edge computing enable the rapid detection and response to local threats, thereby minimizing the risks of cyberattacks that could compromise the entire electrical network. Surveillance of critical infrastructure of gas pipelines - China : Sinopec Technique proposed : Security by Machine Learning Details of the solution : - Contextualisation : The pipelines are a critical infrastructure where security threats could have devastating consequences. [...]
[...] - Strengthening authentication for access to critical systems : In critical infrastructures, access to systems must be strictly controlled. The implementation of multi-factor authentication (MFA) for operators and technicians accessing these systems is imperative to prevent any unauthorized intrusion. Access control systems must be integrated with continuous monitoring solutions to detect and block malicious access attempts. For example, in a nuclear power plant, each operator accessing management systems must authenticate via strong methods, ensuring only legitimate users can interact with critical systems. [...]
[...] The IEC 62443 standard is a series of international standards developed to secure industrial automation systems, which are often integrated into critical infrastructure38. All aspects related to industrial system security are covered by the standards, including risk management and the implementation of technical security controls. The IEC 62443-4-2 standard is a standard that applies to security requirements for industrial components such as programmable controllers, centralized process control systems, data acquisition, and sensor networks. Ensuring compliance of this standard to IoT devices used in industrial fields is crucial, as it ensures that devices used by attackers meet high security requirements to reduce the chances that devices will be targeted by attacks that could compromise critical operations. [...]
APA Style reference
For your bibliographyOnline reading
with our online readerContent validated
by our reading committee