2020
DOI: 10.1109/comst.2020.3011208
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities

Abstract: A key application of the Internet of Things (IoT) paradigm lies within industrial contexts. Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry 4.0, promises to revolutionize production and manufacturing through the use of large numbers of networked embedded sensing devices, and the combination of emerging computing technologies, such as Fog/Cloud Computing and Artificial Intelligence. The IIoT is characterized by an increased degree of inter-connectivity, which not only… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
112
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 277 publications
(145 citation statements)
references
References 238 publications
0
112
0
Order By: Relevance
“…Cybersecurity is an integral path of Industry 4.0 efforts [70], [71], especially considering that several systems are utilized in critical infrastructures that can be targeted even for political reasons, as the operationalization of Stuxnet [72] has shown. As envisioned in Industry 4.0, the majority of the developed systems, applications, and services go beyond their utilization in controlled environments, e.g., factories, and may expand towards consumer systems and interaction with them.…”
Section: F Cybersecuritymentioning
confidence: 99%
See 1 more Smart Citation
“…Cybersecurity is an integral path of Industry 4.0 efforts [70], [71], especially considering that several systems are utilized in critical infrastructures that can be targeted even for political reasons, as the operationalization of Stuxnet [72] has shown. As envisioned in Industry 4.0, the majority of the developed systems, applications, and services go beyond their utilization in controlled environments, e.g., factories, and may expand towards consumer systems and interaction with them.…”
Section: F Cybersecuritymentioning
confidence: 99%
“…Traditional research focusing on the pillars of information security, i.e., addressing confidentiality, availability, and integrity, is expected to continue. This implies, for instance, the development of new algorithms for encryption, authentication/authorization, attack detection, etc., that increasingly takes into consideration the unique characteristics, needs, and emerging trends on infrastructures for ICPS [70]. In parallel, additional evolutionary steps are expected that takes the state of the art research and development and advances it around ICPS and their ecosystem.…”
Section: F Cybersecuritymentioning
confidence: 99%
“…With the explosive growth of industrial information, the large amount of data generated in the industrial production is a challenge for IIoT. How to effectively process, analyze, and record these data, and extract the results of guiding suggestions for industrial production, is the core difficulty of IIoT [3].…”
Section: Introductionmentioning
confidence: 99%
“…It is necessary to find a method to deal with the data generated by IoT devices effectively. Cisco proposed the concept of fog computing in 2012 and regarded fog computing as an extension of cloud computing to meet strict latency requirements and intensive computing needs [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%