Assessment of IIoT sensor security vulnerabilities in AI-driven digital manufacturing

Loading...
Thumbnail Image

Supplementary material

Other Title

Authors

Sen, Sachin
Song, Lei

Author ORCID Profiles (clickable)

Degree

Grantor

Date

2026-12

Supervisors

Type

Conference Contribution - Oral Presentation

Ngā Upoko Tukutuku (Māori subject headings)

Keyword

IIoT sensors
Industrial Internet of Things (IIoT)
cyber attacks
AI in digital manufacturing

Citation

Sen, S., & Song, L. (2025, December, 1-5) Assessment of IIoT sensor security vulnerabilities in AI-driven digital manufacturing [Paper presentation]. ITP Rangahau & Research Symposium 2025 + OPSITARA 2025, New Zealand. https://hdl.handle.net/10652/7149

Abstract

The rapid adoption of Artificial Intelligence (AI) in digital manufacturing has transformed industrial operations by enabling higher levels of automation, efficiency, and adaptive decision-making. This transformation integrates Industrial Internet of Things (IIoT) sensors, which provide the critical real-time data streams that fuel AI-driven analytics and control systems. However, the increased dependence on IIoT sensors introduces new layers of cybersecurity risk. At the sensor level, vulnerabilities such as spoofing, tampering, denial-of-service, and data leakage pose significant threats, as even minor compromises can propagate through AI models and lead to severe consequences, including production downtime, reduced product quality, and safety hazards. This research presents a systematic investigation into the security vulnerabilities of IIoT sensors in AI-enabled digital manufacturing environments. Using the Common Vulnerability Scoring System (CVSS) as a quantitative framework, combined with industrial cybersecurity standards such as NIST, the study evaluates the severity of sensor-specific threats and prioritises their impact on operational resilience. The analysis emphasises how corrupted sensor data undermines the reliability of AI-driven decision models, creating a cascading effect on manufacturing processes. In addition, mitigation strategies including secure authentication, real-time anomaly detection, sensor redundancy, and data validation mechanisms are explored as pathways to strengthen defence mechanisms. The findings contribute to advancing a sensor-centric perspective of cybersecurity, highlighting the importance of proactive vulnerability assessment and targeted protection. By addressing these challenges, this work enhances the overall cyber-resilience of AI-driven digital manufacturing and supports the development of more secure, trustworthy industrial ecosystems.

Publisher

Link to ePress publication

DOI

Copyright holder

Authors

Copyright notice

All rights reserved

Copyright license

Available online at

This item appears in: