University Sétif 1 FERHAT ABBAS Faculty of Sciences
Détail de l'auteur
Auteur Nourchane Maouia Keraghel |
Documents disponibles écrits par cet auteur



Titre : Security for Industrial Internet of Things: Threat mitigation. Type de document : texte imprimé Auteurs : Nourchane Maouia Keraghel, Auteur ; Zerguine, Nadia, Directeur de thèse Editeur : Setif:UFA Année de publication : 2024 Importance : 1 vol (62 f .) Format : 29 cm Langues : Anglais (eng) Catégories : Thèses & Mémoires:Informatique Mots-clés : IIoT
IoT
Connected devices
Risks
Hacking
Security
ThroughputIndex. décimale : 004 - Informatique Résumé :
Imagine linking your smartphone to a factory machine! That's the basic idea behind Industrial IoT, where everyday devices connect to industrial systems. While this offers exciting benefits like smoother operations and less waste, it also creates new security risks. Hackers could disrupt production lines or even cause widespread outages. That's why researchers are scrambling to understand these risks. This project dives into the types of IIoT systems being studied, explores how software flaws might create security problems, and looks at ways to prevent attacks. By reviewing recent research, we found a growing concern about software vulnerabilities, especially in outdated programs running these machines. These weaknesses could be exploited by different hacking techniques. Thankfully, there are promising solutions being developed. However, there's still a lot we don't know. How do we keep these systems updated securely? How can we ensure the software powering them is safe from the start? These are crucial questions that we are trying to answer through this work in order to truly contribute to ensuring our industrial future.Note de contenu : Sommaire
Chapter 1: Internet of Things and Industrial Internet of Things
1.1 Introduction ……………………………………………………………………..15
1.2 Definition of Internet of Things ………………………………………………...17
1.2.1 How it works……………………………………………………………18
1.2.2 Impact and Applications………………………………………………..19
1.3 Definition of Industrial Internet of Things ……………………………………..19
1.3.1 Interconnexion and Communication…………………………………....20
1.3.2 Data Analysis and Insights……………………………………………...20
1.3.3 Optimization and Efficiency…………………………………………....21
1.3.4 Smart Devices and Automation………………………………………...21
1.4 Internet of Things Characteristics………………………………………………21
1.4.1 Widespread connectivity…………………………………………….....22
1.4.2 Object-Centric Services………………………………………………...22
1.4.3 Heterogeneous Landscape…………………………………………...…22
1.4.4 Dynamic Adaptability…………………………………………………..23
1.4.5 Large-Scale Deployment………………………………………………..23
1.4.6 Robust Security…………………………………………………………23
1.4.7 Universal Connectivity………………………………………………….23
1.4.8 Sensor Integration……………………………………………………….23
1.5 Industrial Internet of Things Characteristics…………………………………….24
1.5.1 Devices………………………………………………………………….24
1.5.2 Connectivity…………………………………………………………….24
1.5.3 Data collection…………………………………………………………..24
1.5.4 Data analysis…………………………………………………………….25
1.5.5 Automation………………………………………………………………25
1.5.6 Human-Machine Interaction…………………………………………….25
1.5.7 Digital modeling…………………………………………………………25
1.6 Internet of Things Conveniences and Inconveniences ……………………….25
1.6.1 Internet of Things Convenients………………………………………..25
1.6.2 Internet of Things Inconvenients………………………………………26
1.7 Industrial Internet of Things Conveniences and Inconveniences………………27
1.7.1 Industrial Internet of Things Conveniences……………………………27
1.7.2 Industrial Internet of Things Inconveniences…………………………..27
1.8 Internet of Things Security Aspect……………………………………………..28
1.8.1 Device-Level Security Fortification……………………………………28
1.8.2 Network Security: Building a Transparent Perimeter………………….29
1.8.3 User Education and Awareness: A Collaborative Effort………………29
1.8.4 Shared Responsibility: A Collective Effort for a Secure Future……….30
1.9 Internet of Things vs Industrial Internet of Things: What is the difference?.......30
1.9.1 Internet of Things: A Connected World ………………………...……..30
1.9.2 Industrial Internet of Things: Revolutionizing Industries from the Inside Out
1.10 Conclusion…………………………………………………………………….31
Chapter 2: Related work
2.1 Introduction…………………………………………………………………….33
2.2 Industrial Internet of Things Security aspects………………………………….33
2.2.1 Device-Level Security Fortification……………………………………33
2.2.2 Network Security: Building a Secure Industrial Zone…………………33
2.2.3 User Education and Awareness: A Collaborative Effort……………….34
2.2.4 Shared Responsibility: A Collective Effort for a Secure Future ..……..34
2.3 Common Industrial Internet of Things Attacks………………………………...35
2.3.1 RPL Attacks……………………………………………………...…….35
2.3.2 Categories and Types of RPL Attacks………………………………....36
2.3.2.1 Resources…………………………………………………………..36
2.3.2.2 Topology………………………………………………………...…36
2.3.2.3 Traffic………………………………………………………………36
2.4 State of Art……………………………………………………………………..37
2.4.1 Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation …………………………………………………37
2.4.2 Deep learning-based intrusion detection approach for securing industrial Internet of Things ………………………………………………………………..38
2.4.3 Risk and threat mitigation techniques in internet of things (IoT) environments: a survey…………………………………………………………..38
2.4.4 Securing Cloud-Based Internet of Things: Challenges and Mitigations.39
2.5 Comparison of Works…………………………………………………………..39
2.5.1 Scope of Problems……………………………………………………...39
2.5.2 Methods and Tools……………………………………………………..39
2.5.3 Implementation…………………………………………………...……40
2.6 Conclusion……………………………………………………………………...40
Chapter 3: KSIIOT solution for a Black-hole attack
3.1 Introduction…………………………………………………………………….42
3.2 Definition of black-hole attack………………………………………………...42
3.3 TSCH Communication………………………………………………………...42
3.3.1 Characteristics of TSCH Communication…………………………….43
3.3.2 Choice of TSCH in Simulation……………………………………..…43
3.4 Creation of a network………………………………………………………....43
3.5 Creating and adding a malicious mote………………………………………...45
3.6 KSIIOT Solution……………………………………………………………....46
3.6.1 Creation of new IDS…………………………………………………..46
3.6.2 Generating RSA Keys………………………………………………...46
3.6.3 Exchanging keys and Encrypted IDs…………………………………46
3.6.4 Verifying the Mac address in case of a stolen ID…………………….47
3.7 Conclusion……………………………………………………………………49
Chapter 4: Implementation and Results
6.1 Introduction…………………………………………………………………...51
6.2 Setting Up the Simulation Environment…………………………………..….51
6.3 Capturing and Analyzing Network Traffic…………………………………...53
6.4 Introducing a Malicious Mote………………………………………………..54
6.5 Implementing and Testing the Secure System…………………………….....55
6.6 Documenting and Comparing Results…………………………………….....55
6.7 Conclusion…………………………………………………………………...58Côte titre : MAI/0855 Security for Industrial Internet of Things: Threat mitigation. [texte imprimé] / Nourchane Maouia Keraghel, Auteur ; Zerguine, Nadia, Directeur de thèse . - [S.l.] : Setif:UFA, 2024 . - 1 vol (62 f .) ; 29 cm.
Langues : Anglais (eng)
Catégories : Thèses & Mémoires:Informatique Mots-clés : IIoT
IoT
Connected devices
Risks
Hacking
Security
ThroughputIndex. décimale : 004 - Informatique Résumé :
Imagine linking your smartphone to a factory machine! That's the basic idea behind Industrial IoT, where everyday devices connect to industrial systems. While this offers exciting benefits like smoother operations and less waste, it also creates new security risks. Hackers could disrupt production lines or even cause widespread outages. That's why researchers are scrambling to understand these risks. This project dives into the types of IIoT systems being studied, explores how software flaws might create security problems, and looks at ways to prevent attacks. By reviewing recent research, we found a growing concern about software vulnerabilities, especially in outdated programs running these machines. These weaknesses could be exploited by different hacking techniques. Thankfully, there are promising solutions being developed. However, there's still a lot we don't know. How do we keep these systems updated securely? How can we ensure the software powering them is safe from the start? These are crucial questions that we are trying to answer through this work in order to truly contribute to ensuring our industrial future.Note de contenu : Sommaire
Chapter 1: Internet of Things and Industrial Internet of Things
1.1 Introduction ……………………………………………………………………..15
1.2 Definition of Internet of Things ………………………………………………...17
1.2.1 How it works……………………………………………………………18
1.2.2 Impact and Applications………………………………………………..19
1.3 Definition of Industrial Internet of Things ……………………………………..19
1.3.1 Interconnexion and Communication…………………………………....20
1.3.2 Data Analysis and Insights……………………………………………...20
1.3.3 Optimization and Efficiency…………………………………………....21
1.3.4 Smart Devices and Automation………………………………………...21
1.4 Internet of Things Characteristics………………………………………………21
1.4.1 Widespread connectivity…………………………………………….....22
1.4.2 Object-Centric Services………………………………………………...22
1.4.3 Heterogeneous Landscape…………………………………………...…22
1.4.4 Dynamic Adaptability…………………………………………………..23
1.4.5 Large-Scale Deployment………………………………………………..23
1.4.6 Robust Security…………………………………………………………23
1.4.7 Universal Connectivity………………………………………………….23
1.4.8 Sensor Integration……………………………………………………….23
1.5 Industrial Internet of Things Characteristics…………………………………….24
1.5.1 Devices………………………………………………………………….24
1.5.2 Connectivity…………………………………………………………….24
1.5.3 Data collection…………………………………………………………..24
1.5.4 Data analysis…………………………………………………………….25
1.5.5 Automation………………………………………………………………25
1.5.6 Human-Machine Interaction…………………………………………….25
1.5.7 Digital modeling…………………………………………………………25
1.6 Internet of Things Conveniences and Inconveniences ……………………….25
1.6.1 Internet of Things Convenients………………………………………..25
1.6.2 Internet of Things Inconvenients………………………………………26
1.7 Industrial Internet of Things Conveniences and Inconveniences………………27
1.7.1 Industrial Internet of Things Conveniences……………………………27
1.7.2 Industrial Internet of Things Inconveniences…………………………..27
1.8 Internet of Things Security Aspect……………………………………………..28
1.8.1 Device-Level Security Fortification……………………………………28
1.8.2 Network Security: Building a Transparent Perimeter………………….29
1.8.3 User Education and Awareness: A Collaborative Effort………………29
1.8.4 Shared Responsibility: A Collective Effort for a Secure Future……….30
1.9 Internet of Things vs Industrial Internet of Things: What is the difference?.......30
1.9.1 Internet of Things: A Connected World ………………………...……..30
1.9.2 Industrial Internet of Things: Revolutionizing Industries from the Inside Out
1.10 Conclusion…………………………………………………………………….31
Chapter 2: Related work
2.1 Introduction…………………………………………………………………….33
2.2 Industrial Internet of Things Security aspects………………………………….33
2.2.1 Device-Level Security Fortification……………………………………33
2.2.2 Network Security: Building a Secure Industrial Zone…………………33
2.2.3 User Education and Awareness: A Collaborative Effort……………….34
2.2.4 Shared Responsibility: A Collective Effort for a Secure Future ..……..34
2.3 Common Industrial Internet of Things Attacks………………………………...35
2.3.1 RPL Attacks……………………………………………………...…….35
2.3.2 Categories and Types of RPL Attacks………………………………....36
2.3.2.1 Resources…………………………………………………………..36
2.3.2.2 Topology………………………………………………………...…36
2.3.2.3 Traffic………………………………………………………………36
2.4 State of Art……………………………………………………………………..37
2.4.1 Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation …………………………………………………37
2.4.2 Deep learning-based intrusion detection approach for securing industrial Internet of Things ………………………………………………………………..38
2.4.3 Risk and threat mitigation techniques in internet of things (IoT) environments: a survey…………………………………………………………..38
2.4.4 Securing Cloud-Based Internet of Things: Challenges and Mitigations.39
2.5 Comparison of Works…………………………………………………………..39
2.5.1 Scope of Problems……………………………………………………...39
2.5.2 Methods and Tools……………………………………………………..39
2.5.3 Implementation…………………………………………………...……40
2.6 Conclusion……………………………………………………………………...40
Chapter 3: KSIIOT solution for a Black-hole attack
3.1 Introduction…………………………………………………………………….42
3.2 Definition of black-hole attack………………………………………………...42
3.3 TSCH Communication………………………………………………………...42
3.3.1 Characteristics of TSCH Communication…………………………….43
3.3.2 Choice of TSCH in Simulation……………………………………..…43
3.4 Creation of a network………………………………………………………....43
3.5 Creating and adding a malicious mote………………………………………...45
3.6 KSIIOT Solution……………………………………………………………....46
3.6.1 Creation of new IDS…………………………………………………..46
3.6.2 Generating RSA Keys………………………………………………...46
3.6.3 Exchanging keys and Encrypted IDs…………………………………46
3.6.4 Verifying the Mac address in case of a stolen ID…………………….47
3.7 Conclusion……………………………………………………………………49
Chapter 4: Implementation and Results
6.1 Introduction…………………………………………………………………...51
6.2 Setting Up the Simulation Environment…………………………………..….51
6.3 Capturing and Analyzing Network Traffic…………………………………...53
6.4 Introducing a Malicious Mote………………………………………………..54
6.5 Implementing and Testing the Secure System…………………………….....55
6.6 Documenting and Comparing Results…………………………………….....55
6.7 Conclusion…………………………………………………………………...58Côte titre : MAI/0855 Exemplaires (1)
Code-barres Cote Support Localisation Section Disponibilité MAI/0855 MAI/0855 Mémoire Bibliothéque des sciences Anglais Disponible
Disponible