Abstract
<jats:p>The concept of the Industrial Internet of Things (IIoT) was first mentioned in 2011 as part of Industry 4.0 at an international exhibition in Hannover. It was the result of the work of German scientists who combined the use of a large number of sensors and controllers connected to a network to achieve a specific production result. This concept combines the power of a global information network with traditional industry. Modern manufacturing enterprises are increasingly integrating digital technologies, transforming into complex systems that combine physical and cybernetic components. This increases production efficiency but at the same time creates new risks because IIoT systems are much more vulnerable to cyberattacks than conventional computer networks. This is due to the following factors: complexity and scale, diversity of protocols, outdated equipment, insufficient attention to security, the lack of qualified specialists, and the absence of a single security standard. The consequences of cyberattacks on IIoT systems can be catastrophic and result in production stoppages, equipment damage, leaks of confidential information about production processes, technologies, etc., and reputational damage. To achieve their goals, attackers use the following methods: password guessing attacks, man-in-the-middle attacks, identifier spoofing, use of unprotected ports and protocols, search for software vulnerabilities, use of computer viruses, and denial-of-service attacks. Targeted and distributed attacks can render the IIoT system inaccessible, which in turn will lead to production stoppages. A comprehensive approach to protecting IIoT systems is proposed and its measures are described. A general architecture for protecting IIoT systems is presented, combining three hardware protection methods (PUF, TRM, HSM) to create multi-layered data protection. Each of these methods plays a unique role, complementing each other and ensuring a high level of cybersecurity.</jats:p>