SecureOps: Toward Resilience for Security and Privacy in Industrial Applications
Resumo
The SecureOps Lab was established to tackle cybersecurity challenges in Cyber-Physical Systems (CPS), Operational Technology (OT), and the Internet of Things (IoT). Despite the opportunities these technologies offer, their complexity makes them vulnerable to cyber attacks. The lab combines physical and virtual environments to develop, validate, and verify resilient security solutions, simulating real-world scenarios to ensure practical and robust outcomes using the Technology Readiness Level (TRL) framework. As a controlled environment, the lab explores vulnerabilities, tests defense mechanisms, and enhances resilience in security solutions. This work presents initial results and discusses a case study involving a Proof of Concept (PoC) of the Purdue Model using Fortinet’s IoT Solution.
Referências
University of Rhode Island, "Dependable Cyber-Physical Systems Laboratory," College of Engineering. [Online]. Available: [link]. [Accessed: Apr. 25, 2024].
Gachon University, "CPS Security Research Center," Gachon University. [Online]. Available: [link]. [Accessed: Apr. 25, 2024].
Institute of Informatics and Communication, University of Delhi, "CyPSi Lab – Cyber Physical Systems Interconnections Laboratory," Institute of Informatics and Communication, University of Delhi. [Online]. Available: [link]. [Accessed: Apr. 25, 2024].
University of Jeddah. Cyber Physical System Laboratory, [Online]. Available: [link]. [Accessed: April 25, 2024].
K. Zhang, Y. Shi, S. Karnouskos, T. Sauter, H. Fang and A.W. Colombo, "Advancements in Industrial Cyber-Physical Systems: An Overview and Perspectives," in IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 716-729, Jan. 2023, DOI: 10.1109/TII.2022.3199481.
S. Kim, K. -J. Park and C. Lu, "A Survey on Network Security for Cyber– Physical Systems: From Threats to Resilient Design," in IEEE Communications Surveys & Tutorials, vol. 24, no. 3, pp. 1534-1573, thirdquarter 2022, DOI: 10.1109/COMST.2022.3187531.
S. Rho, A. Vasilakos, W. Chen,Cyber physical systems technologies and applications, Future Generation Computer Systems, Volume 56,2016,Pages 436-437, ISSN 0167 DOI: i.org/10.1016/j.future.2015.10.019.
Eric D. Knapp, 4 - Introduction to Industrial Control Systems and Operations, Editor( s): Eric D. Knapp, Industrial Network Security (Third Edition), Syngress, 2024, Pages 65-90, ISBN 9780443137372, DOI: 10.1016/B978-0-443-13737-2.00011-7.
S. H. Mekala, Z. Baig, A. Anwar, S. Zeadally, Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions, Computer Communications, Volume 208, 2023, Pages 294-320, ISSN 0140-3664, DOI: 10.1016/j.comcom.2023.06.020.
R. Ahmad, I. Alsmadi, Machine learning approaches to IoT security: A systematic literature review, Internet of Things, Volume 14, 2021, 100365, ISSN 2542-6605, DOI: 10.1016/j.iot.2021.100365.
P. Raffaini, L. Manfredi, Chapter 15 - Project management, Editor(s): Luigi Manfredi, Endorobotics, Academic Press, 2022, Pages 337-358, ISBN 9780128217504, DOI: 10.1016/B978-0-12-821750-4.00015-3.
H. Silva and R. Moraes. "Privacy-Preserving IoT Intrusion Detection: Challenges and Solutions in Implementing the CSAI-4-CPS Model."CS & IT Conference Proceedings. Vol. 14. No. 7. CS & IT Conference Proceedings, 2024.
K. Armstrong, Chapter 13 - Emerging Industrial Applications, Editor(s): Peter Styring, Elsje Alessandra Quadrelli, Katy Armstrong, Carbon Dioxide Utilisation, Elsevier, 2015, Pages 237-251, ISBN 9780444627469, DOI: 10.1016/B978-0-444-62746-9.00013-X.
Exxer, Launch Smart 4.0. [Online]. Available: [link]. [Accessed: April 28, 2024].
IEEE Innovative. IEEE is Fueling the Fourth Industrial Revolution. [Online]. Available: [link] [Accessed: April 28, 2024].
SMC Internation Training. FMS-200 - Flexible integrated assembling systems. [Online]. Available: [link] [Accessed: April 28, 2024].
L. Wainstein, D. Tarlow, C. McClister, S. Bhar and B. Gold “Microsoft Defender for IoT and your network architecture - Microsoft Defender for IoT,” [online] Available: [link] [Accessed: April 29, 2024].
T.J. Williams, The Purdue Enterprise Reference Architecture, IFAC Proceedings Volumes, Volume 26, Issue 2, Part 4, 1993, Pages 559-564, ISSN 1474-6670, DOI: 10.1016/S1474-6670(17)48532-6.
D. Garton. Purdue Model Framework for Industrial Control Systems & Cybersecurity Segmentation. US Department of Energy, v. 14, p. 2022-10, 2022.
ISO/IEC 27001:2022, “Information technology — Security techniques — Information security management systems — Requirements”, International Organization for Standardization, Geneva, Switzerland, 2022.
National Institute of Standards and Technology, “Framework for Improving Critical Infrastructure Cybersecurity, Version 2.0”, NIST, Gaithersburg, MD, USA, 2022.
International Electrotechnical Commission, "IEC 62443 - Industrial communication networks - Network and system security," IEC Standard 62443, 2018.
ENX Association, "TISAX (Trusted Information Security Assessment Exchange) - Information Security Requirements," TISAX Standard, Version 5.0, 2023.
H. Silva, "CSAI-4-CPS: A Cyber Security characterization model based on Artificial Intelligence For Cyber Physical Systems," 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S), Baltimore, MD, USA, 2022, pp. 47-48, DOI: 10.1109/DSNS54099.2022.00032.