A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead
The concepts brought by Industry 4.0 have been explored and gradually applied.The cybersecurity impacts on the progress of Industry 4.0 implementations and their interactions with other technologies require constant surveillance, and it is important to forecast cybersecurity-related challenges and t...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-07-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/21/15/5189 |
_version_ | 1827600815467003904 |
---|---|
author | Vítor Pedreira Daniel Barros Pedro Pinto |
author_facet | Vítor Pedreira Daniel Barros Pedro Pinto |
author_sort | Vítor Pedreira |
collection | DOAJ |
description | The concepts brought by Industry 4.0 have been explored and gradually applied.The cybersecurity impacts on the progress of Industry 4.0 implementations and their interactions with other technologies require constant surveillance, and it is important to forecast cybersecurity-related challenges and trends to prevent and mitigate these impacts. The contributions of this paper are as follows: (1) it presents the results of a systematic review of industry 4.0 regarding attacks, vulnerabilities and defense strategies, (2) it details and classifies the attacks, vulnerabilities and defenses mechanisms, and (3) it presents a discussion of recent challenges and trends regarding cybersecurity-related areas for Industry 4.0. From the systematic review, regarding the attacks, the results show that most attacks are carried out on the network layer, where dos-related and mitm attacks are the most prevalent ones. Regarding vulnerabilities, security flaws in services and source code, and incorrect validations in authentication procedures are highlighted. These are vulnerabilities that can be exploited by dos attacks and buffer overflows in industrial devices and networks. Regarding defense strategies, Blockchain is presented as one of the most relevant technologies under study in terms of defense mechanisms, thanks to its ability to be used in a variety of solutions, from Intrusion Detection Systems to the prevention of Distributed dos attacks, and most defense strategies are presented as an after-attack solution or prevention, in the sense that the defense mechanisms are only placed or thought, only after the harm has been done, and not as a mitigation strategy to prevent the cyberattack. Concerning challenges and trends, the review shows that digital sovereignty, cyber sovereignty, and data sovereignty are recent topics being explored by researchers within the Industry 4.0 scope, and GAIA-X and International Data Spaces are recent initiatives regarding data sovereignty. A discussion of trends is provided, and future challenges are pointed out. |
first_indexed | 2024-03-09T04:43:28Z |
format | Article |
id | doaj.art-ea63a2fd7823475192829e9146ad614d |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-09T04:43:28Z |
publishDate | 2021-07-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-ea63a2fd7823475192829e9146ad614d2023-12-03T13:18:58ZengMDPI AGSensors1424-82202021-07-012115518910.3390/s21155189A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty AheadVítor Pedreira0Daniel Barros1Pedro Pinto2Instituto Politécnico de Viana do Castelo, 4900-347 Viana do Castelo, PortugalInstituto Politécnico de Viana do Castelo, 4900-347 Viana do Castelo, PortugalInstituto Politécnico de Viana do Castelo, 4900-347 Viana do Castelo, PortugalThe concepts brought by Industry 4.0 have been explored and gradually applied.The cybersecurity impacts on the progress of Industry 4.0 implementations and their interactions with other technologies require constant surveillance, and it is important to forecast cybersecurity-related challenges and trends to prevent and mitigate these impacts. The contributions of this paper are as follows: (1) it presents the results of a systematic review of industry 4.0 regarding attacks, vulnerabilities and defense strategies, (2) it details and classifies the attacks, vulnerabilities and defenses mechanisms, and (3) it presents a discussion of recent challenges and trends regarding cybersecurity-related areas for Industry 4.0. From the systematic review, regarding the attacks, the results show that most attacks are carried out on the network layer, where dos-related and mitm attacks are the most prevalent ones. Regarding vulnerabilities, security flaws in services and source code, and incorrect validations in authentication procedures are highlighted. These are vulnerabilities that can be exploited by dos attacks and buffer overflows in industrial devices and networks. Regarding defense strategies, Blockchain is presented as one of the most relevant technologies under study in terms of defense mechanisms, thanks to its ability to be used in a variety of solutions, from Intrusion Detection Systems to the prevention of Distributed dos attacks, and most defense strategies are presented as an after-attack solution or prevention, in the sense that the defense mechanisms are only placed or thought, only after the harm has been done, and not as a mitigation strategy to prevent the cyberattack. Concerning challenges and trends, the review shows that digital sovereignty, cyber sovereignty, and data sovereignty are recent topics being explored by researchers within the Industry 4.0 scope, and GAIA-X and International Data Spaces are recent initiatives regarding data sovereignty. A discussion of trends is provided, and future challenges are pointed out.https://www.mdpi.com/1424-8220/21/15/5189cybersecurityattacksdefensesindustry 4.0vulnerabilitiessurvey |
spellingShingle | Vítor Pedreira Daniel Barros Pedro Pinto A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead Sensors cybersecurity attacks defenses industry 4.0 vulnerabilities survey |
title | A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead |
title_full | A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead |
title_fullStr | A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead |
title_full_unstemmed | A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead |
title_short | A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead |
title_sort | review of attacks vulnerabilities and defenses in industry 4 0 with new challenges on data sovereignty ahead |
topic | cybersecurity attacks defenses industry 4.0 vulnerabilities survey |
url | https://www.mdpi.com/1424-8220/21/15/5189 |
work_keys_str_mv | AT vitorpedreira areviewofattacksvulnerabilitiesanddefensesinindustry40withnewchallengesondatasovereigntyahead AT danielbarros areviewofattacksvulnerabilitiesanddefensesinindustry40withnewchallengesondatasovereigntyahead AT pedropinto areviewofattacksvulnerabilitiesanddefensesinindustry40withnewchallengesondatasovereigntyahead AT vitorpedreira reviewofattacksvulnerabilitiesanddefensesinindustry40withnewchallengesondatasovereigntyahead AT danielbarros reviewofattacksvulnerabilitiesanddefensesinindustry40withnewchallengesondatasovereigntyahead AT pedropinto reviewofattacksvulnerabilitiesanddefensesinindustry40withnewchallengesondatasovereigntyahead |