2021
DOI: 10.3390/s21061976
|View full text |Cite
|
Sign up to set email alerts
|

Improved Mitigation of Cyber Threats in IIoT for Smart Cities: A New-Era Approach and Scheme

Abstract: Cybersecurity in Industrial Internet of Things (IIoT) has become critical as smart cities are becoming increasingly linked to industrial control systems (ICSs) used in critical infrastructure. Consequently, data-driven security systems for analyzing massive amounts of data generated by smart cities have become essential. A representative method for analyzing large-scale data is the game bot detection approach used in massively multiplayer online role-playing games. We reviewed the literature on bot detection m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 45 publications
0
1
0
Order By: Relevance
“…Research from the literature on the standards, protocols, and technologies used in the IoT space further highlight the fragmentation of the landscape, which in turns introduces additional difficulties in implementing an effective strategy against cyber attacks [24][25][26][27]. Recent advances in the cyber threat mitigation strategies increasingly make use of statistical and machine learning methods, which rely on access to large datasets and real time information from the IoT layer [28][29][30][31]. The complexity and lack of transparency in the security aspects of Smart City metropolitan-scale deployments raise concerns related to data privacy, particularly for the data that are related to Personal Identifiable Information [32,33].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Research from the literature on the standards, protocols, and technologies used in the IoT space further highlight the fragmentation of the landscape, which in turns introduces additional difficulties in implementing an effective strategy against cyber attacks [24][25][26][27]. Recent advances in the cyber threat mitigation strategies increasingly make use of statistical and machine learning methods, which rely on access to large datasets and real time information from the IoT layer [28][29][30][31]. The complexity and lack of transparency in the security aspects of Smart City metropolitan-scale deployments raise concerns related to data privacy, particularly for the data that are related to Personal Identifiable Information [32,33].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Encryption with access control can be used for cloud-based IIoT applications [116][117][118]. Different protocols support M2M communication in IIoT, and hence, protocol-based access control can be used in the hybrid method to improve the efficiency of the access control mechanism [119]. It is crucial when considering the operations over different jurisdictions combining heterogeneous networks.…”
mentioning
confidence: 99%