Information Security Protection System for Networked OT Environments of Industrial Control in Smart Manufacturing
DOI:
https://doi.org/10.46604/ijeti.2024.14743Keywords:
Smart manufacturing, OT security, endpoint protection, cybersecurity, Industry 4.0Abstract
This study develops an innovative information security protection system for end devices in smart manufacturing industrial control environments. By employing six key functionalities—lightweight identity authentication, traffic analysis, key management, personnel authorization control, system status monitoring, and an alarm mechanism—the system addresses the limitations of traditional firewalls. Experimental procedures involved testing the system against common threats, including phishing (fraud), physical intrusion, and Denial of Service attacks. Results demonstrate over 90% success in mitigating these attacks while maintaining operational efficiency. Furthermore, real-time monitoring and alert features enhance data protection and ensure reliable factory operations.
References
P. Lipnicki, D. Lewandowski, D. Pareschi, W. Pakos, and E. Ragaini, “Future of IoTSP – IT and OT Integration,” Proceedings of IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 203-207, 2018.
I. Ivanković, A. Kekelj, R. Rubeša and I. Kuzle, “SCADA Maintenance and Refurbishment with Security Issue in Modern IT and OT Environment,” Proceedings of Mediterranean Conference on Power Generation, Transmission, Distribution and Energy Conversion (MEDPOWER 2018), pp. 1-6, 2018.
R. Paes, D. C. Mazur, B. K. Venne, and J. Ostrzenski, “A Guide to Securing Industrial Control Networks: Integrating IT and OT Systems,” IEEE Industry Applications Magazine, vol. 26, no. 2, pp. 47-53, 2020.
IBM, “IBM X-Force Threat Intelligence Index 2024,” https://github.com/jacobdjwilson/awesome-annual-security-reports/blob/main/Annual%20Security%20Reports/2024/IBM-X-Force-Threat-Intelligence-Index-2024.pdf, accessed in 2024.
IBM Security, “Cost of a Data Breach Report 2025: The AI Oversight Gap,” https://www.ibm.com/reports/data-breach, accessed in 2025.
M. Marali, S. D. Sudarsan, and A. Gogioneni, “Cyber Security Threats in Industrial Control Systems and Protection,” Proceedings of International Conference on Advances in Computing and Communication Engineering (ICACCE), pp. 1-7, 2019.
B. Leander, A. Čaušević, and H. Hansson, “Applicability of the IEC 62443 Standard in Industry 4.0/IIoT,” Proceedings of the 14th International Conference Availability, Reliability and Security (ARES), article no. 101, pp. 1-8, 2019.
N. A. Kamaruddin, I. Mohamed, A. D. Jarno, and M. Daud, “Cloud Security Pre-assessment Model for Cloud Service Provider Based On ISO/IEC 27017:2015 Additional Control,” International Journal of Innovation and Industrial Revolution, vol. 2, no. 5, pp. 1-17, 2020.
P. de Hert, V. Papakonstantinou, and I. Kamara, “The New Cloud Computing ISO/IEC 27018 Standard Through the Lens of the EU Legislation on Data Protection,” vol. 32, no. 1, pp. 16-30, 2014.
J. Ni, G. Fang, Y. Zhao, J. Ren, L. Chen, and Y. Ren, “Distributed Group Key Management Based on Blockchain,” Electronics, vol. 13, no. 11, article no. 2216, 2024.
O. Pal, B. Alam, V. Thakur, and S. Singh, “Key Management for Blockchain Technology,” ICT Express, vol. 7, no. 1, pp. 76-80, 2021.
J. Liu, X. Tong, Z. Wang, M. Zhang, and J. Ma, “A Centralized Key Management Scheme Based on McEliece PKC for Space Network,” IEEE Access, vol. 8, pp. 42708-42719, 2020.
W. Zhou, Y. Xu, and G. Wang, “Decentralized Group Key Management for Hierarchical Access Control Using Multilinear Forms,” Concurrency and Computation: Practice and Experience, vol. 28, no. 3, pp. 631-645, 2016.
S. E. Nyssanbayeva, N. A. Kapalova, and A. Haumen, “On a Certain Model of Cryptographic Key Management,” Eurasian Journal of Mathematical and Computer Applications, vol. 8, no. 4, pp. 15-22, 2022.
G. J. Simmons, “Symmetric and Asymmetric Encryption,” ACM Computing Surveys, vol. 11, no. 4, pp. 305-330, 1979.
A. Garba, D. Khoury, P. Balian, S. Haddad, J. Sayah, and Z. Chen, “LightCert4IoTs: Blockchain-Based Lightweight Certificates Authentication for IoT Applications,” IEEE Access, vol. 11, pp. 28370-28383, 2023.
E. Lara, L. Aguilar, M. A. Sanchez, and J. A. García “Lightweight Authentication Protocol for M2M Communications of Resource-constrained Devices in Industrial Internet of Things,” Sensors, vol. 20, no. 2, article no. 501, 2020.
A. Esfahani, G. Mantas, R. Matischek, F. B. Saghezchi, J. Rodriguez, and A. Bicaku, “A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment,” IEEE Internet of Things Journal, vol. 6, no. 1, pp. 288-296, 2019.
C. Wang, “IoT Anomaly Detection Method in Intelligent Manufacturing Industry Based on Trusted Evaluation,” The International Journal of Advanced Manufacturing Technology, vol. 107, pp. 993-1005, 2020.
INFO SECURITY, “The Greatest Threat to Information Security—Personnel Security, ” https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=672, accessed in 2024.
K. Cooney, “Operational Technology Intrusion Detection Application for Power Grid Security Operations Centres,” Master Thesis, National College of Ireland, Dublin, Ireland, 2021.
S. B. Sarvaiya and D. N. Satange, “Security in IP-Based IoT Node and Device Authentication,” Proceedings of IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), pp. 1-5, 2022.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Pin-Kuan Chiang, Shang-Liang Chen, Je-Chiao Ku

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright Notice
Submission of a manuscript implies: that the work described has not been published before that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication. Authors can retain copyright in their articles with no restrictions. Also, author can post the final, peer-reviewed manuscript version (postprint) to any repository or website.

Since Jan. 01, 2019, IJETI will publish new articles with Creative Commons Attribution Non-Commercial License, under Creative Commons Attribution Non-Commercial 4.0 International (CC BY-NC 4.0) License.
The Creative Commons Attribution Non-Commercial (CC-BY-NC) License permits use, distribution and reproduction in any medium, provided the original work is properly cited and is not used for commercial purposes.


.jpg)
