Comert, M. orcid.org/0009-0005-6172-1850, Ahmed, A. orcid.org/0000-0002-5101-8134 and Ahmed, H. orcid.org/0000-0001-8952-4190 (2025) Identifying security challenges in the transition from traditional to smart manufacturing through IIoT retrofitting. In: Peltonen, E., Hyrynsalmi, S., Wagner, I., Rellermeyer, J. and Mohan, N., (eds.) IoT '24: Proceedings of the 14th International Conference on the Internet of Things. IoT 2024: 14th International Conference on the Internet of Things, 19-22 Nov 2024, Oulu, Finland. ACM , pp. 285-289. ISBN 9798400712852
Abstract
The integration of Industrial Internet of Things (IIoT) sensors and devices into traditional manufacturing environments offers significant benefits in terms of efficiency, adaptability, and data-driven decision-making. However, the transition from traditional manufacturing systems to smart manufacturing systems, often achieved through retrofitting legacy systems, introduces new security risks that must be carefully addressed to ensure operational resilience. This paper explores the vulnerabilities and threats associated with retrofitting legacy systems with modern Industrial IoT technologies. By examining recent case studies and industry incidents, critical security gaps that emerge from the coexistence of legacy systems and contemporary IoT solutions are identified. These gaps include unauthorized access, data breaches, system manipulation. The research emphasizes the necessity of adopting a proactive cybersecurity approach that is well-suited to the specific vulnerabilities and risks associated with retrofitting traditional manufacturing systems. These measures include updated security protocols, enhanced device management practices, secure software updates, and ongoing system monitoring. By implementing these strategies, manufacturers can mitigate risks, protect their intellectual property, and maintain operational continuity. Outcome of the paper provide manufacturers with strategic insights and practical recommendations to safeguard the integrity and reliability of their smart manufacturing environments against evolving cyber threats. By addressing these security challenges proactively, organizations can realize the full potential of IIoT technologies while minimizing risks to their operations.
Metadata
Item Type: | Proceedings Paper |
---|---|
Authors/Creators: |
|
Editors: |
|
Copyright, Publisher and Additional Information: | © 2024 Copyright held by the owner/author(s). This work is licensed under a Creative Commons Attribution 4.0 International License. (https://creativecommons.org/licenses/by/4.0/) |
Keywords: | Information and Computing Sciences; Manufacturing Engineering; Engineering; Cybersecurity and Privacy; Industry, Innovation and Infrastructure |
Dates: |
|
Institution: | The University of Sheffield |
Academic Units: | The University of Sheffield > Faculty of Engineering (Sheffield) > School of Electrical and Electronic Engineering |
Depositing User: | Symplectic Sheffield |
Date Deposited: | 17 Apr 2025 15:17 |
Last Modified: | 17 Apr 2025 15:17 |
Status: | Published |
Publisher: | ACM |
Refereed: | Yes |
Identification Number: | 10.1145/3703790.3703824 |
Related URLs: | |
Sustainable Development Goals: | |
Open Archives Initiative ID (OAI ID): | oai:eprints.whiterose.ac.uk:225576 |