Research Article

Securing LLM-Integrated Critical Infrastructure A Technical Framework for Industrial Control Systems and IoT

by  Rajeshkumar Golani, Bhooshan Ravikumar Gadkari
journal cover
Journal of Advanced Artificial Intelligence
Foundation of Computer Science (FCS), NY, USA
Volume 2 - Issue 2
Published: September 2025
Authors: Rajeshkumar Golani, Bhooshan Ravikumar Gadkari
10.5120/jaai202445
PDF

Rajeshkumar Golani, Bhooshan Ravikumar Gadkari . Securing LLM-Integrated Critical Infrastructure A Technical Framework for Industrial Control Systems and IoT. Journal of Advanced Artificial Intelligence. 2, 2 (September 2025), 11-17. DOI=10.5120/jaai202445

                        @article{ 10.5120/jaai202445,
                        author  = { Rajeshkumar Golani,Bhooshan Ravikumar Gadkari },
                        title   = { Securing LLM-Integrated Critical Infrastructure A Technical Framework for Industrial Control Systems and IoT },
                        journal = { Journal of Advanced Artificial Intelligence },
                        year    = { 2025 },
                        volume  = { 2 },
                        number  = { 2 },
                        pages   = { 11-17 },
                        doi     = { 10.5120/jaai202445 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2025
                        %A Rajeshkumar Golani
                        %A Bhooshan Ravikumar Gadkari
                        %T Securing LLM-Integrated Critical Infrastructure A Technical Framework for Industrial Control Systems and IoT%T 
                        %J Journal of Advanced Artificial Intelligence
                        %V 2
                        %N 2
                        %P 11-17
                        %R 10.5120/jaai202445
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

The integration of Large Language Models into critical infrastructure systems creates unprecedented security challenges that extend beyond traditional cybersecurity paradigms. Contemporary industrial environments face emerging threats where linguistic manipulations can directly trigger physical consequences through prompt-to-physical attack vectors. The convergence of Information Technology, Operational Technology, and Artificial Intelligence establishes complex attack surfaces where conventional security frameworks prove inadequate. Hallucination-induced failures and data poisoning attacks represent particularly insidious threats that can compromise industrial operations through gradual behavioral modifications. The probabilistic nature of LLM outputs introduces fundamental uncertainty into deterministic control systems, necessitating specialized defensive architectures. AI-aware segmentation strategies provide essential isolation boundaries while maintaining operational connectivity through controlled communication channels. Human-in-the-loop governance mechanisms serve as critical safety barriers, requiring explicit validation before executing AI-generated commands affecting physical systems. Comprehensive output verification systems employ formal methods to validate AI recommendations against predetermined safety constraints. Independent redundant safety systems operate without AI dependencies, ensuring continued operation during system failures or compromises. Digital twin environments enable safe evaluation of defensive mechanisms without exposing operational infrastructure to potential harm. Contemporary risk assessment frameworks require specialized metrics capturing AI-specific failure modes, including attack success rates and safety violation frequencies. The article presents a comprehensive framework addressing the unique vulnerabilities of LLM-enabled industrial systems while proposing resilient architectures for safe AI deployment in critical infrastructure environments.

References
  • Shiza Malik et al., "Artificial intelligence and industrial applications-A revolution in modern industries," ScienceDirect,2024.[Online].Available: https://www.sciencedirect.com/science/article/pii/S2090447924002612
  • Wenxiu Zhang et al., "A Study on Prompt Injection Attack Against LLM-Integrated Mobile Robotic Systems," arrive,2024.[Online].Available: https://arxiv.org/html/2408.03515v1
  • Abdulruhman Abomakhelb et al., "A Comprehensive Review of Adversarial Attacks and Defense Strategies in Deep Neural Networks," MDPI, 2025. [Online]. Available: https://www.mdpi.com/2227-7080/13/5/202
  • Svitla, "Common AI Security Risks and Ways to Mitigate Them,"2025.[Online].Available: https://svitla.com/blog/common-ai-security-risks/
  • Ebuka Mmaduekwe Paul et al., "Zero trust architecture and AI: A synergistic approach to next-generation cybersecurity frameworks," International Journal of Science and Research Archive, 2024. [Online]. Available: https://ijsra.net/sites/default/files/IJSRA-2024-2583.pdf
  • Secoda, "What is Human-in-the-Loop Governance," 2025. [Online].Available: https://www.secoda.co/glossary/what-is-human-in-the-loop-governance
  • Nikin Tharan, "Designing Fault-Tolerant Embedded Systems For Critical Applications," IJCRT, 2025. [Online].Available: https://www.ijcrt.org/papers/IJCRT2503083.pdf
  • Heng Zeng et al., "Towards a conceptual framework for AI-driven anomaly detection in smart city IoT networks for enhanced cybersecurity," ScienceDirect, 2024. [Online].Available: https://www.sciencedirect.com/science/article/pii/S2444569X24001409
  • SentinelOne, "AI Risk Management: A Comprehensive Guide 101," 2025. [Online]. Available: https://www.sentinelone.com/cybersecurity-101/cybersecurity/ai-risk-management/.
  • Richard J. Somers et al., "Digital-twin-based testing for cyber–physical systems: A systematic literature review," ScienceDirect,2023.[Online].Available: https://www.sciencedirect.com/science/article/pii/S0950584922002543
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Large Language Models Critical Infrastructure Security Cyber-Physical-AI Systems Prompt Injection Attacks Human-in-the-Loop Control Industrial Control Systems

Powered by PhDFocusTM