Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures

Cyber-security countermeasures are important for IIoT (industrial Internet of things) systems in which IT (information technology) and OT (operational technology) are integrated. The appropriate asset management is the key to creating strong security systems to protect from various cyber threats. Ho...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Noritaka Matsumoto, Junya Fujita, Hiromichi Endoh, Tsutomu Yamada, Kenji Sawada, Osamu Kaneko
Formato: article
Lenguaje:EN
Publicado: MDPI AG 2021
Materias:
Acceso en línea:https://doaj.org/article/590fa2989ece4956a38e7f52caf43d85
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:590fa2989ece4956a38e7f52caf43d85
record_format dspace
spelling oai:doaj.org-article:590fa2989ece4956a38e7f52caf43d852021-11-25T17:58:33ZAsset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures10.3390/info121104602078-2489https://doaj.org/article/590fa2989ece4956a38e7f52caf43d852021-11-01T00:00:00Zhttps://www.mdpi.com/2078-2489/12/11/460https://doaj.org/toc/2078-2489Cyber-security countermeasures are important for IIoT (industrial Internet of things) systems in which IT (information technology) and OT (operational technology) are integrated. The appropriate asset management is the key to creating strong security systems to protect from various cyber threats. However, the timely and coherent asset management methods used for conventional IT systems are difficult to be implemented for IIoT systems. This is because these systems are composed of various network protocols, various devices, and open technologies. Besides, it is necessary to guarantee reliable and real-time control and save CPU and memory usage for legacy OT devices. In this study, therefore, (1) we model various asset configurations for IIoT systems and design a data structure based on SCAP (Security Content Automation Protocol). (2) We design the functions to automatically acquire the detailed information from edge devices by “asset configuration management agent”, which ensures a low processing load. (3) We implement the proposed asset management system to real edge devices and evaluate the functions. Our contribution is to automate the asset management method that is valid for the cyber security countermeasures in the IIoT systems.Noritaka MatsumotoJunya FujitaHiromichi EndohTsutomu YamadaKenji SawadaOsamu KanekoMDPI AGarticlecontrol system securityIIoTasset managementSCAPSysMLInformation technologyT58.5-58.64ENInformation, Vol 12, Iss 460, p 460 (2021)
institution DOAJ
collection DOAJ
language EN
topic control system security
IIoT
asset management
SCAP
SysML
Information technology
T58.5-58.64
spellingShingle control system security
IIoT
asset management
SCAP
SysML
Information technology
T58.5-58.64
Noritaka Matsumoto
Junya Fujita
Hiromichi Endoh
Tsutomu Yamada
Kenji Sawada
Osamu Kaneko
Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures
description Cyber-security countermeasures are important for IIoT (industrial Internet of things) systems in which IT (information technology) and OT (operational technology) are integrated. The appropriate asset management is the key to creating strong security systems to protect from various cyber threats. However, the timely and coherent asset management methods used for conventional IT systems are difficult to be implemented for IIoT systems. This is because these systems are composed of various network protocols, various devices, and open technologies. Besides, it is necessary to guarantee reliable and real-time control and save CPU and memory usage for legacy OT devices. In this study, therefore, (1) we model various asset configurations for IIoT systems and design a data structure based on SCAP (Security Content Automation Protocol). (2) We design the functions to automatically acquire the detailed information from edge devices by “asset configuration management agent”, which ensures a low processing load. (3) We implement the proposed asset management system to real edge devices and evaluate the functions. Our contribution is to automate the asset management method that is valid for the cyber security countermeasures in the IIoT systems.
format article
author Noritaka Matsumoto
Junya Fujita
Hiromichi Endoh
Tsutomu Yamada
Kenji Sawada
Osamu Kaneko
author_facet Noritaka Matsumoto
Junya Fujita
Hiromichi Endoh
Tsutomu Yamada
Kenji Sawada
Osamu Kaneko
author_sort Noritaka Matsumoto
title Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures
title_short Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures
title_full Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures
title_fullStr Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures
title_full_unstemmed Asset Management Method of Industrial IoT Systems for Cyber-Security Countermeasures
title_sort asset management method of industrial iot systems for cyber-security countermeasures
publisher MDPI AG
publishDate 2021
url https://doaj.org/article/590fa2989ece4956a38e7f52caf43d85
work_keys_str_mv AT noritakamatsumoto assetmanagementmethodofindustrialiotsystemsforcybersecuritycountermeasures
AT junyafujita assetmanagementmethodofindustrialiotsystemsforcybersecuritycountermeasures
AT hiromichiendoh assetmanagementmethodofindustrialiotsystemsforcybersecuritycountermeasures
AT tsutomuyamada assetmanagementmethodofindustrialiotsystemsforcybersecuritycountermeasures
AT kenjisawada assetmanagementmethodofindustrialiotsystemsforcybersecuritycountermeasures
AT osamukaneko assetmanagementmethodofindustrialiotsystemsforcybersecuritycountermeasures
_version_ 1718411743988809728