关键信息基础设施物联网安全发展态势及展望
Internet of Things Security in Critical Information Infrastructure: Trends and Prospects
随着关键信息基础设施物联网加速向规模化应用迈进,其在能源、交通、工业等关键领域的广泛部署,正带来前所未有的安全挑战。物联网技术在推动行业智能转型的同时,也带来了系统性安全隐患,直接关系国家安全、经济运行和社会稳定大局。本文从通用风险与专属场景威胁两个维度切入,系统剖析传统物联网“云 ‒ 管 ‒ 边 ‒ 端”架构中的安全问题,并针对新兴趋势带来的风险展开探讨,覆盖具身智能等五大典型应用场景的安全议题。基于物联网安全现状与发展趋势,本文进一步阐释了关键信息基础设施物联网的安全内涵与核心风险,结合其架构特点与实际应用需求,提出“通域统一保障 + 专域定制增强”的防护理念,倡导构建覆盖全域、动态协同、智能自适应的新一代安全防护体系与治理路径,并从战略、制度、技术、人才与国际合作五个方面系统推进,以实现可持续演进的安全治理能力。
As the Internet of Things (IoT) in critical information infrastructure rapidly scales up, its widespread deployment in sectors such as energy, transportation, and industry is introducing unprecedented security challenges. While driving intelligent transformation across industries, the IoT technology also brings systemic security risks that impact national security, economic operations, and social stability. This study examines security issues in traditional IoT architectures—cloud, pipe, edge, and device—from both general and scenario-specific risk perspectives, and explores emerging threats in trends such as embodied intelligence and four other key application areas. Based on current conditions and development trends, the study clarifies the security implications and core risks of IoT in critical infrastructure. Aligned with its architectural features and practical needs, a "universal guarantee + customized enhancement" protection approach is proposed, advocating a new-generation security system that offers full coverage, dynamic collaboration, and adaptive intelligence. Systematic efforts in strategy, regulation, technology, talent, and international cooperation are recommended to achieve sustainable and evolving security governance.
critical information infrastructure / Internet of Things / security risks / security protection
| [1] |
张弛, 崔占华. 美国关键基础设施安全管理综述 [J]. 信息安全研究, 2017, 3(8): 736‒746. |
| [2] |
Zhang C, Cui Z H. Analysis on American critical infrastructure security management [J]. Journal of Information Security Research, 2017, 3(8): 736‒746. |
| [3] |
杨婷, 左晓栋. 美国提升关键基础设施网联设备安全措施分析 [J]. 工业信息安全, 2023 (1): 11‒17. |
| [4] |
Yang T, Zuo X D. Study on US actions to better secure Internetconnected devices of critical infrastructure [J]. Industry Information Security, 2023 (1): 11‒17. |
| [5] |
Djenna A, Harous S, Saidouni D E. Internet of Things meet Internet of threats: New concern cyber security issues of critical cyber infrastructure [J]. Applied Sciences, 2021, 11(10): 4580. |
| [6] |
Shi W S, Cao J, Zhang Q, et al. Edge computing: Vision and challenges [J]. IEEE Internet of Things Journal, 2016, 3(5): 637‒646. |
| [7] |
Cárdenas A A, Amin S, Sastry S. Research challenges for the security of control systems [R]. San Jose. The 3rd Conference on Hot Topics in Security, 2008. |
| [8] |
Nguyen V L, Lin P C, Cheng B C, et al. Security and privacy for 6G: A survey on prospective technologies and challenges [J]. IEEE Communications Surveys & Tutorials, 2021, 23(4): 2384‒2428. |
| [9] |
Abusaimeh H. Virtual machine escape in cloud computing services [J]. International Journal of Advanced Computer Science and Applications, 2020, 11(7): 327‒331. |
| [10] |
Chen Y, Sambo Y A, Onireti O, et al. A survey on LPWAN-5G integration: Main challenges and potential solutions [J]. IEEE Access, 2022, 10: 32132‒32149. |
| [11] |
Marzano A, Alexander D, Fonseca O, et al. The evolution of bashlite and mirai IoT botnets [R]. Natal: 2018 IEEE Symposium on Computers and Communications (ISCC), 2018. |
| [12] |
Giechaskiel I, Rasmussen K. Taxonomy and challenges of out-of-band signal injection attacks and defenses [J]. IEEE Communications Surveys & Tutorials, 2020, 22(1): 645‒670. |
| [13] |
Yang F C, Dan Z H, Pan K K, et al. ReThink: Reveal the threat of electromagnetic interference on power inverters [EB/OL]. (2024-09-26)[2025-07-08]. https://arxiv.org/abs/2409.17873. |
| [14] |
Luo S Q, Nguyen A, Farooq H, et al. Eavesdropping on controller acoustic emanation for keystroke inference attack in virtual reality [R]. San Diego: 2024 Network and Distributed System Security Symposium, 2024. |
| [15] |
Ba Z J, Zheng T H, Qin Z, et al. Accelerometer-based smartphone eavesdropping [R]. London: The 26th Annual International Conference on Mobile Computing and Networking, 2020. |
| [16] |
Shakib K H, Rahman M, Islam M, et al. Impersonation attack using quantum shor's algorithm against blockchain-based vehicular ad-hoc network [J]. IEEE Transactions on Intelligent Transportation Systems, 2025, 26(5): 6530‒6544. |
| [17] |
Thombre R, Jajodia B. Experimental analysis of attacks on RSA & Rabin cryptosystems using quantum shor's algorithm [R]. Online: International Conference on Women Researchers in Electronics and Computing, 2021. |
| [18] |
Wen C C, Liang J Z, Yuan S H, et al. How secure are large language models (LLMs) for navigation in urban environments? [EB/OL]. (2024-02-14)[2025-07-08]. https://arxiv.org/abs/2402.09546. |
| [19] |
Zhang H T, Zhu C Y, Wang X L, et al. BadRobot: Jailbreaking embodied LLMs in the physical world [EB/OL]. (2024-07-16)[2025-07-08]. https://arxiv.org/abs/2407.20242. |
| [20] |
代玥玥, 辛鑫, 赵薏皓, 空天地一体化通信网络安全 [J]. 移动通信, 2025, 49(10): 136‒147. |
| [21] |
Dai Y Y, Xin X, Zhao Y H, et al. Security of space-air-ground integrated communication networks [J]. Mobile Communications, 2025, 49(10): 136‒147. |
| [22] |
Papadimitratos P, Jovanovic A. GNSS-based positioning: Attacks and countermeasures [R]. San Diego: 2008 IEEE Military Communications Conference, 2009. |
| [23] |
张依, 谢思. 我国低空经济监管的演进逻辑、困境挑战与创新路径 [J]. 中国流通经济, 2025, 39(10): 83‒97. |
| [24] |
Zhang Y, Xie S. The evolutionary logic, challenges and innovative paths of low-altitude economy regulation in China [J]. China Business and Market, 2025, 39(10): 83‒97. |
| [25] |
European Union Agency for Network and Information Security (ENISA). Good practices for security of Internet of Things in the context of smart manufacturing [R]. Heraklion: ENISA, 2018. |
| [26] |
Huitsing P, Chandia R, Papa M, et al. Attack taxonomies for the modbus protocols [J]. International Journal of Critical Infrastructure Protection, 2008, 1: 37‒44. |
| [27] |
Alsabbagh W, Langendörfer P. You are what you attack: Breaking the cryptographically protected S7 protocol [R]. Pavia: 2023 IEEE 19th International Conference on Factory Communication Systems (WFCS), 2023. |
| [28] |
Zhou J, Cao Z F, Dong X L, et al. Security and privacy for cloud-based IoT: Challenges [J]. IEEE Communications Magazine, 2017, 55(1): 26‒33. |
| [29] |
Scarani V, Bechmann-Pasquinucci H, Cerf N J, et al. The security of practical quantum key distribution [J]. Reviews of Modern Physics, 2009, 81(3): 1301‒1350. |
| [30] |
Herder C, Yu M D, Koushanfar F, et al. Physical unclonable functions and applications: A tutorial [J]. Proceedings of the IEEE, 2014, 102(8): 1126‒1141. |
| [31] |
Tan T K, Raghunathan A, Jha N K. EMSIM: An energy simulation framework for an embedded operating system [R]. Phoenix-Scottsdale: 2002 IEEE International Symposium on Circuits and Systems, 2002. |
| [32] |
Chen C, Kande R, Nguyen N, et al. HyPFuzz: Formal-assisted processor fuzzing [EB/OL]. (2023-06-24)[2025-07-08]. https://arxiv.org/abs/2304.02485. |
| [33] |
Sattar D, Matrawy A. Towards secure slicing: Using slice isolation to mitigate DDoS attacks on 5G core network slices [R]. Washington DC: 2019 IEEE Conference on Communications and Network Security (CNS), 2019. |
| [34] |
Dwoskin J S, Lee R B. Hardware-rooted trust for secure key management and transient trust [R]. Alexandria: The 14th ACM Conference on Computer and Communications Security, 2007. |
| [35] |
Sandhu R S. Role-based access control [M]// Zelkowitz M V, ed. Advances in Computers. Amsterdam: Elsevier, 1998: 237‒286. |
| [36] |
Pinto S, Santos N. Demystifying arm TrustZone: A comprehensive survey [J]. ACM Computing Surveys, 2019, 51(6): 1‒36. |
| [37] |
European Union Agency for Network and Information Security (ENISA). Baseline security recommendations for IoT in the context of critical information infrastructures [R]. Heraklion: ENISA, 2017. |
中国工程院咨询项目“网络空间安全新技术新应用风险研究”(2023-JB-01)
国家自然科学基金项目(61925109)
国家自然科学基金项目(62222114)
/
| 〈 |
|
〉 |