2023
DOI: 10.3390/a16080378
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)

Abstract: The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT). These advancements have had a profound impact on the structures of numerous industrial organizations. The IIoT, a seamless integration of the physical and digital realms with minimal human intervention, has ushered in radical changes in the economy and modern business practices. At the heart of the IIoT lies its ability to gather and analyze vast … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 132 publications
0
5
0
Order By: Relevance
“…Year Systematic Domain Main Goal Ogonji et al [15] ✓ IoT Privacy and security threats, attack surface, vulnerabilities, and countermeasures in IoT. Sarwar et al [25] x IoT and Fog Privacy preservation in IoT and fog-enabled IoT Zainuddin et al [16] x IoT Applications Privacy threats in IoT applications Islam et al [17] ✓ IoT and Big Data Types of privacy attacks and solutions in the IoT and Big Data contexts Zarandi et al [20] x Smart Farming Big Data privacy in smart farming Hireche et al [21] x IoMT Privacy and security in IoMT Shahid et al [23] x IoHT Data breaches and legal regulations in IoHT Alabdulatif et al [24] x IoNT Overview of IoNT and its security and privacy issues Torre et al [18] ✓ IoT Devices Privacy-preservation techniques for IoT devices Tokas et al [26] x IoT Privacy-enhancing technologies and GDPR-specific privacy principles Demertzi et al [27] x IIoT Privacy requirements in the Industrial IoT Fallatah et al [28] x PDS PDS and its advantages and disadvantages Zubaydi et al [29] ✓ IoT and Blockchain Blockchain solutions for IoT security and privacy issues Asqah and Moulahi [30] x…”
Section: Authorsmentioning
confidence: 99%
See 1 more Smart Citation
“…Year Systematic Domain Main Goal Ogonji et al [15] ✓ IoT Privacy and security threats, attack surface, vulnerabilities, and countermeasures in IoT. Sarwar et al [25] x IoT and Fog Privacy preservation in IoT and fog-enabled IoT Zainuddin et al [16] x IoT Applications Privacy threats in IoT applications Islam et al [17] ✓ IoT and Big Data Types of privacy attacks and solutions in the IoT and Big Data contexts Zarandi et al [20] x Smart Farming Big Data privacy in smart farming Hireche et al [21] x IoMT Privacy and security in IoMT Shahid et al [23] x IoHT Data breaches and legal regulations in IoHT Alabdulatif et al [24] x IoNT Overview of IoNT and its security and privacy issues Torre et al [18] ✓ IoT Devices Privacy-preservation techniques for IoT devices Tokas et al [26] x IoT Privacy-enhancing technologies and GDPR-specific privacy principles Demertzi et al [27] x IIoT Privacy requirements in the Industrial IoT Fallatah et al [28] x PDS PDS and its advantages and disadvantages Zubaydi et al [29] ✓ IoT and Blockchain Blockchain solutions for IoT security and privacy issues Asqah and Moulahi [30] x…”
Section: Authorsmentioning
confidence: 99%
“…Demertzi et al [27] reviewed the literature on the privacy requirements of the Industrial Internet of Things (IIoT). They provided an overview of this area, including its advantages, disadvantages, challenges, and primarily privacy issues.…”
Section: Authorsmentioning
confidence: 99%
“…Through the sigmoid function, the output data x ′ are compressed within the (0, 1) interval, resulting in reconstructed data x ′ with the same dimensions as the input x. The detailed process is described in Equation (5).…”
Section: The Dvacnn-based Intrusion Detection Modelmentioning
confidence: 99%
“…By embedding intelligent sensors and controllers in industrial equipment and systems, the IIoT enables real-time data collection, processing, and analysis, thereby optimizing operational efficiency, reducing costs, and increasing productivity. However, with the rapid development and widespread application of the IIoT, its security threats are also increasing, especially with frequent network intrusion events, severely threatening the security operation of industrial systems and data integrity [ 4 , 5 ].…”
Section: Introductionmentioning
confidence: 99%
“…These devices communicate with the system, gathering significant data [8,9]. With the aid of machine learning, they analyze and utilize the accumulated data to schedule operations, predict failures, manage product inventory, and conduct quality inspections [10,11]. As a result, corresponding predictive models are developed and assume an integral role in the decision-making process conducted within smart production system [12,13].…”
Section: Introductionmentioning
confidence: 99%