A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities.

Sensors (Basel)

Department of Information Technology, University of Tabuk, Tabuk 47731, Saudi Arabia.

Published: August 2023

The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing and production, through the employment of various embedded sensing devices connected by an IoT network, along with a collection of enabling technologies, such as artificial intelligence (AI) and edge/fog computing. One of the unrivaled characteristics of IIoT is the inter-connectivity provided to industries; however, this characteristic might open the door for cyber-criminals to launch various attacks. In fact, one of the major challenges hindering the prevalent adoption of the IIoT paradigm is IoT security. Inevitably, there has been an inevitable increase in research proposals over the last decade to overcome these security concerns. To obtain an overview of this research area, conducting a literature survey of the published research is necessary, eliciting the various security requirements and their considerations. This paper provides a literature survey of IIoT security, focused on the period from 2017 to 2023. We identify IIoT security threats and classify them into three categories, based on the IIoT layer they exploit to launch these attacks. Additionally, we characterize the security requirements that these attacks violate. Finally, we highlight how emerging technologies, such as AI and edge/fog computing, can be adopted to address security concerns and enhance IIoT security.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10490764PMC
http://dx.doi.org/10.3390/s23177470DOI Listing

Publication Analysis

Top Keywords

internet things
12
security requirements
12
iiot security
12
security
9
industrial internet
8
requirements attacks
8
iiot
8
iiot paradigm
8
edge/fog computing
8
launch attacks
8

Similar Publications

This study presents a blockchain-based traceability system designed specifically for the olive oil supply chain, addressing key challenges in transparency, quality assurance, and fraud prevention. The system integrates Internet of Things (IoT) technology with a decentralized blockchain framework to provide real-time monitoring of critical quality metrics. A practical web application, linked to the Ethereum blockchain, enables stakeholders to track each stage of the supply chain via tamper-proof records.

View Article and Find Full Text PDF

Calibration and Performance Evaluation of Cost-Effective Capacitive Moisture Sensor in Slope Model Experiments.

Sensors (Basel)

December 2024

Graduate School of Information Science and Electrical Engineering, Kyushu University, Fukuoka 819-0395, Japan.

Understanding the factors that contribute to slope failures, such as soil saturation, is essential for mitigating rainfall-induced landslides. Cost-effective capacitive soil moisture sensors have the potential to be widely implemented across multiple sites for landslide early warning systems. However, these sensors need to be calibrated for specific applications to ensure high accuracy in readings.

View Article and Find Full Text PDF

One of the most promising applications for electroencephalogram (EEG)-based brain-computer interfaces (BCIs) is motor rehabilitation through motor imagery (MI) tasks. However, current MI training requires physical attendance, while remote MI training can be applied anywhere, facilitating flexible rehabilitation. Providing remote MI training raises challenges to ensuring an accurate recognition of MI tasks by healthcare providers, in addition to managing computation and communication costs.

View Article and Find Full Text PDF

The rapid integration of Internet of Things (IoT) systems in various sectors has escalated security risks due to sophisticated multilayer attacks that compromise multiple security layers and lead to significant data loss, personal information theft, financial losses etc. Existing research on multilayer IoT attacks exhibits gaps in real-world applicability, due to reliance on outdated datasets with a limited focus on adaptive, dynamic approaches to address multilayer vulnerabilities. Additionally, the complete reliance on automated processes without integrating human expertise in feature selection and weighting processes may affect the reliability of detection models.

View Article and Find Full Text PDF

Automated systems, regulated by algorithmic protocols and predefined set-points for feedback control, require the oversight and fine tuning of skilled technicians. This necessity is particularly pronounced in automated greenhouses, where optimal environmental conditions depend on the specialized knowledge of dedicated technicians, emphasizing the need for expert involvement during installation and maintenance. To address these challenges, this study proposes the integration of data acquisition technologies using Internet of Things (IoT) protocols and optimization services via reinforcement learning (RL) methodologies.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!