Book Image

Practical Industrial Internet of Things Security

By : Sravani Bhattacharjee
Book Image

Practical Industrial Internet of Things Security

By: Sravani Bhattacharjee

Overview of this book

Securing connected industries and autonomous systems is of primary concern to the Industrial Internet of Things (IIoT) community. Unlike cybersecurity, cyber-physical security directly ties to system reliability as well as human and environmental safety. This hands-on guide begins by establishing the foundational concepts of IIoT security with the help of real-world case studies, threat models, and reference architectures. You’ll work with practical tools to design risk-based security controls for industrial use cases and gain practical knowledge of multi-layered defense techniques, including identity and access management (IAM), endpoint security, and communication infrastructure. You’ll also understand how to secure IIoT lifecycle processes, standardization, and governance. In the concluding chapters, you’ll explore the design and implementation of resilient connected systems with emerging technologies such as blockchain, artificial intelligence, and machine learning. By the end of this book, you’ll be equipped with the all the knowledge required to design industry-standard IoT systems confidently.
Table of Contents (22 chapters)
Title Page
Copyright and Credits
Dedication
Packt Upsell
Foreword
Contributors
Disclaimer
Preface
I
I
Index

Establishing endpoint trust during operations


Integrating robust trust mechanisms during the operations phase is crucial for industrial endpoints, which are expected to run uninterrupted for extended periods. Firmware is the most fundamental piece of code that runs on any device and interfaces directly with the hardware. It is important to ensure that the firmware and software are updated on a regular basis, to incorporate security bug fixes. 

Although the consequences of loading an infected firmware are typically irreversible, it is important to secure the update process for both software and firmware. In this section, we shall delve into secure update processes, and the mechanisms to establish endpoint trust during the operations phase.

Secure updates

Software and firmware are never fully devoid of vulnerabilities and defects; thus, regular upgrades to incorporate bug fixes and security updates are required.

Attackers can exploit vulnerabilities in the update or in the update process, or can...