Skip to main content
U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock ( ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

On Data Integrity Attacks against Industrial Internet of Things

Published

Author(s)

Hansong Xu, Wei Yu, Xing Liu, David W. Griffith, Nada T. Golmie

Abstract

Industrial Internet of Things (IIoT) is predicted to drive the fourth industrial revolution through massive interconnection of industrial devices, such as sensors, controllers and actuators, integrating advances in smart machinery and data analytics driven by computing, networking and artificial intelligence techniques. The massive interconnections between industrial devices increase not only information exchange, productivity, and resource efficiency, but also cybersecurity risks and their impact to the IIoT system. In this paper, we investigate the evolutionary process, which captures the natural interactions and evolutions of attackers and defenders, as well as their strategies to launch data integrity attacks and protect the IIoT system, respectively. We leverage the wireless cyber-physical simulator (WCPS) as a realistic IIoT testbed to implement and evaluate strategies at different levels of evolution. The experimental results indicate the effectiveness of defensive strategies in guarding against various forms of data integrity attacks with increase in time and knowledge throughout the evolutionary process.
Conference Dates
August 17-October 24, 2020
Conference Location
Calgary, -1
Conference Title
IEEE Cyber Science and Technology Congress (CyberSciTech 2020)

Keywords

Industrial Internet of Things, Data Integrity Attacks, Evolutionary Process, Cyber-Physical System
Created August 23, 2020, Updated October 9, 2020