EVALUATING AN ANALYTICAL MODEL OF CYBERATTACK EFFECTS ON AN IIoT SYSTEM WITH EDGE COMPUTING CAPABILITIES

Authors

DOI:

https://doi.org/10.37943/22DOKU3034

Keywords:

Industrial Internet of Things, edge computing, cybersecurity, threat model, attacks, physical attacks, software and information attacks, analytical model

Abstract

The Industrial Internet of Things (IIoT) is an important component of future industrial systems. Implementing edge computing in the IIoT can significantly reduce decision latency, save bandwidth resources, and protect privacy to some extent. But it is important to realize that edge computing is often resource-constrained, and devices are often spread across vast geographic areas, including intermittent network connectivity. Such conditions increase security vulnerabilities due to increased attack surfaces and physical availability. This paper addresses the problem of securing IIoT systems utilizing the concept of edge computing. An analytical model of attack influences is proposed, including typical scenarios and individual steps of attacks, both physical and software-informational in nature. The presented analytical model is designed to assess and analyze attack impacts on IIoT, implements the concept of boundary calculations, allows to analyze vulnerabilities of IIoT systems more effectively and develop measures to protect them. The model is designed to provide a comprehensive tool for securing critical infrastructures. The model includes typical attack scenarios, detailed attack steps, and impact classification. The developed model can be used for risk analysis, development of protection strategies, and security testing of IIoT systems. The conducted experimental study confirmed the relevance and practical significance of the developed model. The results of the study showed that IIoT-systems using edge computing are subject to a wide range of threats. The most critical are DoS attacks and Data Integrity Attacks. The obtained results emphasize the need to apply comprehensive security measures for IIoT systems with edge computing and confirm the effectiveness of the proposed analytical model.

Author Biographies

Tamara Zhukabayeva, L.N. Gumilyov Eurasian National University, Kazakhstan

PhD, Professor, Department of Information Systems

Aigul Adamova, L.N. Gumilyov Eurasian National University, Kazakhstan

PhD, Researcher, Department of Computer Science

Assel Abdildayeva, L.N. Gumilyov Eurasian National University, Kazakhstan

PhD, Researcher

Nurdaulet Karabayev, L.N. Gumilyov Eurasian National University, Kazakhstan

PhD student, Department of Information Systems

References

Kolapo, R., Kawu, F.M., Abdulmalik, A.D., Edem, U.A., Young, M.A., & Mordi, E.C. (2024). Edge computing: Revolutionizing data processing for IoT applications. International Journal of Science and Research Archive.

Turner, D., Ricciuto, A., Lewis, A., D’amico, F., Dhaliwal, J., Griffiths, A. M., ... & Dignass, A. (2021). STRIDE-II: an update on the Selecting Therapeutic Targets in Inflammatory Bowel Disease (STRIDE) Initiative of the International Organization for the Study of IBD (IOIBD): determining therapeutic goals for treat-to-target strategies in IBD. Gastroenterology, 160(5), 1570-1583.

Kim, K. H., Kim, K., & Kim, H. K. (2022). STRIDE‐based threat modeling and DREAD evaluation for the distributed control system in the oil refinery. ETRI Journal, 44(6), 991-1003.

Xiong, W., Legrand, E., Åberg, O., & Lagerström, R. (2022). Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix. Software and Systems Modeling, 21(1), 157-177.

Zhukabayeva, T., Zholshiyeva, L., & Karabayev, N. (2024, October). Future Directions of Cybersecurity in Industrial Internet of Things Through Edge Computing. In 2024 9th International Conference on Computer Science and Engineering (UBMK) (pp. 1-6). IEEE.

Alotaibi, B. (2023). A survey on industrial Internet of Things security: Requirements, attacks, AI-based solutions, and edge computing opportunities. Sensors, 23(17), 7470.

Hosen, A. S., Sharma, P. K., Puthal, D., Ra, I. H., & Cho, G. H. (2023, July). SECBlock-IIoT: A Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things. In Proceedings of the Third International Symposium on Advanced Security on Software and Systems (pp. 1-14).

Kim, H. M., & Lee, K. H. (2022). IIoT malware detection using edge computing and deep learning for cybersecurity in smart factories. Applied Sciences, 12(15), 7679

Abosata, N., Al-Rubaye, S., Inalhan, G., & Emmanouilidis, C. (2021). Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications. Sensors, 21(11), 3654

Shukla, D., & Sawarkar, S. D. (2025). Enhancing energy efficiency and QoS in 5G networks with dynamic resource optimisation green communication protocol. International Journal of Wireless and Mobile Computing, 28(1), 68-85

Xiao, X., Tang, Z., Li, C., Xiao, B., & Li, K. (2022). SCA: Sybil-based collusion attacks of IIoT data poisoning in federated learning. IEEE Transactions on Industrial Informatics, 19(3), 2608-2618.

Zainudin, A., Ahakonye, L. A. C., Akter, R., Kim, D. S., & Lee, J. M. (2022). An efficient hybrid-dnn for ddos detection and classification in software-defined iiot networks. IEEE Internet of Things Journal, 10(10), 8491-8504.

Laghari, S. U. A., Manickam, S., Al-Ani, A. K., Rehman, S. U., & Karuppayah, S. (2021). SECS/GEMsec: A mechanism for detection and prevention of cyber-attacks on SECS/GEM communications in industry 4.0 landscape. IEEE Access, 9, 154380-154394

Tanveer, M., Abd El-Latif, A. A., Ahmad, M., & Ateya, A. A. (2024). LEAF-IIoT: Lightweight and efficient authentication framework for the industrial internet of things. IEEE Access, 12, 31771-31787.

Gueriani, A., Kheddar, H., & Mazari, A. C. (2024, December). Adaptive Cyber-Attack Detection in IIoT Using Attention-Based LSTM-CNN Models. In 2024 International Conference on Telecommunications and Intelligent Systems (ICTIS) (pp. 1-6). IEEE.

Alkhafaji, N., Viana, T., & Al-Sherbaz, A. (2024). Integrated Genetic Algorithm and Deep Learning Approach for Effective Cyber-Attack Detection and Classification in Industrial Internet of Things (IIoT) Environments. Arabian Journal for Science and Engineering, 1-25.

Ghiasvand, E., Ray, S., Iqbal, S., Dadkhah, S., & Ghorbani, A. A. (2024). CICAPT-IIOT: A provenance-based APT attack dataset for IIoT environment. arXiv preprint arXiv:2407.11278.

Aslam, S., Alshoweky, M. M., & Saad, M. (2024, June). Binary and multiclass classification of attacks in edge iiot networks. In 2024 Advances in Science and Engineering Technology International Conferences (ASET) (pp. 01-05). IEEE.

Arsalan, M., Mubeen, M., Bilal, M., & Abbasi, S. F. (2024, August). 1D-CNN-IDS: 1D CNN-based intrusion detection system for IIoT. In 2024 29th International Conference on Automation and Computing (ICAC) (pp. 1-4). IEEE.

Hoang, T. M., Nguyen, T. T., Pham, T. A., & Nguyen, V. N. (2023, October). An IDS-Based DNN Model Deployed on the Edge Network to Detect Industrial IoT Attacks. In International Conference on Intelligence of Things (pp. 307-319). Cham: Springer Nature Switzerland.

Sezgin, A., & Boyacı, A. (2023, May). A survey of privacy and security challenges in industrial settings. In 2023 11th international symposium on digital forensics and security (ISDFS) (pp. 1-7). IEEE.

Singhal, S., Medeira, P.A., Singhal, P., & Khorajiya, M. (2020). Detection of application layer DDoS attacks using big data technologies. Journal of Discrete Mathematical Sciences and Cryptography, 23, 563 - 571.

Corallo, A., Lazoi, M., Lezzi, M., & Luperto, A. (2022). Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review. Computers in Industry, 137, 103614.

Mirani, A. A., Velasco-Hernandez, G., Awasthi, A., & Walsh, J. (2022). Key challenges and emerging technologies in industrial IoT architectures: A review. Sensors, 22(15), 5836.

Tariq, U., Ahanger, T. A., Ibrahim, A., & Bouteraa, Y. S. (2022). The industrial internet of things (iiot): an anomaly identification and countermeasure method. Journal of Circuits, Systems and Computers, 31(12), 2250219.

Xiao, W., Miao, Y., Fortino, G., Wu, D., Chen, M., & Hwang, K. (2021). Collaborative cloud-edge service cognition framework for DNN configuration toward smart IIoT. IEEE Transactions on Industrial Informatics, 18(10), 7038-7047.

Ahmed, A. A., Hasan, M. K., Alqahtani, A., Islam, S., Pandey, B., Rzayeva, L., ... & Alqahtani, N. (2024). Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks. Tsinghua Science and Technology, 30(3), 1012-1026.

Alli, A. A., Kassim, K., Mutwalibi, N., Hamid, H., & Ibrahim, L. (2021). Secure fog-cloud of things: architectures, opportunities and challenges. Secure edge computing, 3-20.

R. Uddin, S. A. P. Kumar, and V. Chamola, “Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions,” Ad Hoc Networks, vol. 152, p. 103322, Jan. 2024, doi: 10.1016/j.adhoc.2023.103322.

Swati, S. Roy, J. Singh, and J. Mathew, “Securing IIoT systems against DDoS attacks with adaptive moving target defense strategies,” Scientific Reports, vol. 15, no. 1, Mar. 2025, doi: 10.1038/s41598-025-93138-7.

Chaudhary S., Mishra P. K. DDoS attacks in Industrial IoT: A survey //Computer Networks. – 2023. – Т. 236. – С. 110015.

Mahadevappa P., Murugesan R. K. Review of data integrity attacks and mitigation methods in edge computing //International Conference on Advances in Cyber Security. – Singapore : Springer Singapore, 2021. – С. 505-514.

Jayalaxmi P., Saha R., Kumar G., Kumar N., Kim T. -H. "A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges," in IEEE Access, vol. 9, pp. 25344-25359, 2021, doi: 10.1109/ACCESS.2021.3057766.

Downloads

Published

2025-06-30

How to Cite

Zhukabayeva, T., Adamova, A., Abdildayeva, A., & Karabayev, N. (2025). EVALUATING AN ANALYTICAL MODEL OF CYBERATTACK EFFECTS ON AN IIoT SYSTEM WITH EDGE COMPUTING CAPABILITIES. Scientific Journal of Astana IT University, 22, 163–173. https://doi.org/10.37943/22DOKU3034

Issue

Section

Information Technologies