Assessment of IIoT Sensor Security Vulnerabilities in Digital Wine Manufacturing Leveraging the CVSS

被引:0
|
作者
Sen, Sachin K. [1 ,2 ]
Karmakar, Gour C. [1 ]
Pang, Shaoning [1 ]
机构
[1] Federat Univ Australia, Inst Innovat Sci & Sustainabil, Ballarat, Vic 3350, Australia
[2] Unitec Inst Technol, Sch Comp Elect & Appl Technol, Auckland 1025, New Zealand
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Industrial Internet of Things; Sensors; Production; Sensor systems; Sensor phenomena and characterization; Security; Computer security; Smart manufacturing; Cybersecurity; IIoT sensor node; criticality assessment; security vulnerability; data criticality; digital manufacturing; INDUSTRIAL INTERNET; FRAMEWORK;
D O I
10.1109/ACCESS.2024.3467248
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Integrating IIoT into manufacturing has significantly enhanced connectivity and production precision, but it also introduces a complex cybersecurity landscape, particularly in digital manufacturing systems. Current vulnerability assessment tools are often system-specific and need more scalability for large IIoT networks. While CVSS offers a standardized framework for assessing vulnerabilities across entire systems, practical adaptations for specific manufacturing contexts are yet to be developed. To address this gap, we present a novel framework to evaluate CVSS impact metrics tailored to the unique environmental and operational contexts of wine manufacturing. This approach leverages the correlation between wine characteristics and quality to assess potential threats and vulnerability exposures in IIoT wine sensors. Our findings show that vulnerability scores derived from CVSS 4.0 demonstrate greater resilience against cyber-attacks than CVSS 3.1 due to the incorporation of newly developed system impact and threat metric assessments. A pair-wise t-test reveals a significant difference between CVSS 4.0 and 3.1 scores, with a p-value of 0.002, highlighting the comprehensiveness of CVSS 4.0 that incorporates system impact and threat metric values assessed by our proposed framework. The proposed methodology is adaptable for evaluating security vulnerabilities in various manufacturing systems, tailored to their specific applications and deployment contexts.
引用
收藏
页码:141489 / 141513
页数:25
相关论文
共 1 条
  • [1] Fortifying Federated Learning in IIoT: Leveraging Blockchain and Digital Twin Innovations for Enhanced Security and Resilience
    Prathiba, Sahaya Beni
    Govindarajan, Yeshwanth
    Pranav Amirtha Ganesan, Vishal
    Ramachandran, Anirudh
    Selvaraj, Arikumar K.
    Kashif Bashir, Ali
    Reddy Gadekallu, Thippa
    IEEE ACCESS, 2024, 12 : 68968 - 68980