8 CONCLUSION
The paper shows the importance of an IIoT context
on basis of three different use cases. Furthermore, it
provides formal definitions for the IIoT context, sub-
contexts and the rules, which are used for the context
evaluation. Beside definitions, a generic approach for
gathering attributes is shown. This generic approach
is split into two generic categories: user and manu-
factury company attributes. Both use their own in-
dependent contexts like user context, order context,
machine context, etc. to extract attributes. The pa-
per also suggests a distributed context infrastructure,
which uses the defined subcontexts combined with the
rules to improve the industrial internet of things secu-
rity by a rule-based approach. For the approach eval-
uation, a simplified order tracking scenario was taken
and shown, that a malicious behaviour could be pre-
vented.
Further research include the enhancement of the
existing infrastructure, so that each context module
could add additional context for evaluation. Using
content information for the rule templates, rule gen-
eration and rule evaluation will be another research
topic. In addition to the improved rules, machine
learning algorithms will be used to detect suspicious
behaviour in the system.
REFERENCES
Biondi, P. (2016). Scapy. http://www.secdev.org/projects/
scapy/.
Chen, G. and Kotz, D. (2000). A Survey of Context-
Aware Mobile Computing Research. Technical report,
Hanover, NH, USA.
Cohn, R. J., Coppen, R. J., Banks, A., and Rahul Gupta
(2014). MQTT Version 3.1.1. OASIS Standard.
Conti, M., Nguyen, V. T. N., and Crispo, B. (2011).
CRePE: Context-Related Policy Enforcement for An-
droid, pages 331–345. Springer Berlin Heidelberg,
Berlin, Heidelberg.
Fielding, R. T. (2000). Architectural Styles and the Design
of Network-based Software Architectures. PhD thesis.
AAI9980887.
Fielding, R. T., Gettys, J., Mogul, J. C., Nielsen, H. F.,
Masinter, L., Leach, P. J., and Berners-Lee, T. (1999).
Hypertext Transfer Protocol – HTTP/1.1. RFC 2616,
RFC Editor. http://www.rfc-editor.org/rfc/rfc2616.txt.
Gartner (2017). Gartner Says 8.4 Billion Connected
”Things” Will Be in Use in 2017, Up 31 Percent From
2016. http://www.gartner.com/newsroom/id/3598917.
Hankel, M. and Rexroth, B. (2015). Industrie 4.0: The Ref-
erence Architectural Model Industrie 4.0 (RAMI 4.0).
ZVEI: Die Elektroindustrie.
IEC (2008). IEC 62541: OPC Unified Architecture Speci-
fication - Parts 1-100.
(ITU-T), I. T. U. (2015). X.690 - ASN.1 encoding rules:
Specification of Basic Encoding Rules (BER), Canon-
ical Encoding Rules (CER) and Distinguished Encod-
ing Rules (DER). ITU-T 690, ITU-T.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., and Qiu, D.
(2014). Security of the Internet of Things: perspec-
tives and challenges. Wireless Networks, 20(8):2481–
2501.
Monir, S. (2017). A Lightweight Attribute-Based Access
Control System for IoT. Master’s thesis, University of
Saskatchewan.
OASIS Standard (2013). eXtensible Access Con-
trol Markup Language (XACML) Version 3.0.
http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-
spec-os-en.html.
Ramos, J. L. H., Bernabe, J. B., and Skarmeta, A. F. (2015).
Managing Context Information for Adaptive Security
in IoT Environments. In 2015 IEEE 29th International
Conference on Advanced Information Networking and
Applications Workshops, pages 676–681.
Rodskar, E., Volden, R., and Skjong, E. (2017). Sailing into
the Future: Industrial Internet of Things at Sea with
X-Connect. IEEE Electrification Magazine, 5(3):33–
39.
Rouse, M. (2015). Industrial Internet of Things (IIoT).
http://internetofthingsagenda.techtarget.com/definition/
Industrial-Internet-of-Things-IIoT.
Schilit, B., Adams, N., and Want, R. (1994). Context-Aware
Computing Applications. In Proceedings of the 1994
First Workshop on Mobile Computing Systems and
Applications, WMCSA ’94, pages 85–90, Washing-
ton, DC, USA. IEEE Computer Society.
Shelby, Z., Hartke, K., and Bormann, C. (2014). The Con-
strained Application Protocol (CoAP). (7252).
Son, J., Kim, J.-D., Na, H.-S., and Baik, D.-K. (2015). CB-
DAC: Context-Based Dynamic Access Control Model
Using Intuitive 5W1H for Ubiquitous Sensor Net-
work. International Journal of Distributed Sensor
Networks, 11(9):836546.
Tudoric, C. A. and Gheorghe, L. (2016). Context-Aware Se-
curity Framework for Android. In 2016 International
Workshop on Secure Internet of Things (SIoT), pages
11–19.
Winograd, T. (2001). Architectures for Context. Hum.-
Comput. Interact., 16(2):401–419.