A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead

The concepts brought by Industry 4.0 have been explored and gradually applied.The cybersecurity impacts on the progress of Industry 4.0 implementations and their interactions with other technologies require constant surveillance, and it is important to forecast cybersecurity-related challenges and t...

Full description

Bibliographic Details
Main Authors: Vítor Pedreira, Daniel Barros, Pedro Pinto
Format: Article
Language:English
Published: MDPI AG 2021-07-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/21/15/5189
_version_ 1827600815467003904
author Vítor Pedreira
Daniel Barros
Pedro Pinto
author_facet Vítor Pedreira
Daniel Barros
Pedro Pinto
author_sort Vítor Pedreira
collection DOAJ
description The concepts brought by Industry 4.0 have been explored and gradually applied.The cybersecurity impacts on the progress of Industry 4.0 implementations and their interactions with other technologies require constant surveillance, and it is important to forecast cybersecurity-related challenges and trends to prevent and mitigate these impacts. The contributions of this paper are as follows: (1) it presents the results of a systematic review of industry 4.0 regarding attacks, vulnerabilities and defense strategies, (2) it details and classifies the attacks, vulnerabilities and defenses mechanisms, and (3) it presents a discussion of recent challenges and trends regarding cybersecurity-related areas for Industry 4.0. From the systematic review, regarding the attacks, the results show that most attacks are carried out on the network layer, where dos-related and mitm attacks are the most prevalent ones. Regarding vulnerabilities, security flaws in services and source code, and incorrect validations in authentication procedures are highlighted. These are vulnerabilities that can be exploited by dos attacks and buffer overflows in industrial devices and networks. Regarding defense strategies, Blockchain is presented as one of the most relevant technologies under study in terms of defense mechanisms, thanks to its ability to be used in a variety of solutions, from Intrusion Detection Systems to the prevention of Distributed dos attacks, and most defense strategies are presented as an after-attack solution or prevention, in the sense that the defense mechanisms are only placed or thought, only after the harm has been done, and not as a mitigation strategy to prevent the cyberattack. Concerning challenges and trends, the review shows that digital sovereignty, cyber sovereignty, and data sovereignty are recent topics being explored by researchers within the Industry 4.0 scope, and GAIA-X and International Data Spaces are recent initiatives regarding data sovereignty. A discussion of trends is provided, and future challenges are pointed out.
first_indexed 2024-03-09T04:43:28Z
format Article
id doaj.art-ea63a2fd7823475192829e9146ad614d
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-09T04:43:28Z
publishDate 2021-07-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-ea63a2fd7823475192829e9146ad614d2023-12-03T13:18:58ZengMDPI AGSensors1424-82202021-07-012115518910.3390/s21155189A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty AheadVítor Pedreira0Daniel Barros1Pedro Pinto2Instituto Politécnico de Viana do Castelo, 4900-347 Viana do Castelo, PortugalInstituto Politécnico de Viana do Castelo, 4900-347 Viana do Castelo, PortugalInstituto Politécnico de Viana do Castelo, 4900-347 Viana do Castelo, PortugalThe concepts brought by Industry 4.0 have been explored and gradually applied.The cybersecurity impacts on the progress of Industry 4.0 implementations and their interactions with other technologies require constant surveillance, and it is important to forecast cybersecurity-related challenges and trends to prevent and mitigate these impacts. The contributions of this paper are as follows: (1) it presents the results of a systematic review of industry 4.0 regarding attacks, vulnerabilities and defense strategies, (2) it details and classifies the attacks, vulnerabilities and defenses mechanisms, and (3) it presents a discussion of recent challenges and trends regarding cybersecurity-related areas for Industry 4.0. From the systematic review, regarding the attacks, the results show that most attacks are carried out on the network layer, where dos-related and mitm attacks are the most prevalent ones. Regarding vulnerabilities, security flaws in services and source code, and incorrect validations in authentication procedures are highlighted. These are vulnerabilities that can be exploited by dos attacks and buffer overflows in industrial devices and networks. Regarding defense strategies, Blockchain is presented as one of the most relevant technologies under study in terms of defense mechanisms, thanks to its ability to be used in a variety of solutions, from Intrusion Detection Systems to the prevention of Distributed dos attacks, and most defense strategies are presented as an after-attack solution or prevention, in the sense that the defense mechanisms are only placed or thought, only after the harm has been done, and not as a mitigation strategy to prevent the cyberattack. Concerning challenges and trends, the review shows that digital sovereignty, cyber sovereignty, and data sovereignty are recent topics being explored by researchers within the Industry 4.0 scope, and GAIA-X and International Data Spaces are recent initiatives regarding data sovereignty. A discussion of trends is provided, and future challenges are pointed out.https://www.mdpi.com/1424-8220/21/15/5189cybersecurityattacksdefensesindustry 4.0vulnerabilitiessurvey
spellingShingle Vítor Pedreira
Daniel Barros
Pedro Pinto
A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead
Sensors
cybersecurity
attacks
defenses
industry 4.0
vulnerabilities
survey
title A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead
title_full A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead
title_fullStr A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead
title_full_unstemmed A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead
title_short A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead
title_sort review of attacks vulnerabilities and defenses in industry 4 0 with new challenges on data sovereignty ahead
topic cybersecurity
attacks
defenses
industry 4.0
vulnerabilities
survey
url https://www.mdpi.com/1424-8220/21/15/5189
work_keys_str_mv AT vitorpedreira areviewofattacksvulnerabilitiesanddefensesinindustry40withnewchallengesondatasovereigntyahead
AT danielbarros areviewofattacksvulnerabilitiesanddefensesinindustry40withnewchallengesondatasovereigntyahead
AT pedropinto areviewofattacksvulnerabilitiesanddefensesinindustry40withnewchallengesondatasovereigntyahead
AT vitorpedreira reviewofattacksvulnerabilitiesanddefensesinindustry40withnewchallengesondatasovereigntyahead
AT danielbarros reviewofattacksvulnerabilitiesanddefensesinindustry40withnewchallengesondatasovereigntyahead
AT pedropinto reviewofattacksvulnerabilitiesanddefensesinindustry40withnewchallengesondatasovereigntyahead