Industrial Networks and IIoT: Now and Future Trends

Connectivity is the one word summary for Industry 4.0 revolution. The importance of Internet of Things (IoT) and Industrial IoT (IIoT) have been increased dramatically with the rise of industrialization and industry 4.0. As new opportunities bring their own challenges, with the massive interconnected devices of the IIoT, cyber security of those networks and privacy of their users have become an important aspect. Specifically, intrusion detection for industrial networks (IIoT) has great importance. For instance, it is a key factor in improving the safe operation of the smart grid systems yet protecting the privacy of the consumers at the same time. In the same manner, data streaming is a valid option when the analysis is to be pushed from the cloud to the fog for industrial networks to provide agile response, since it brings the advantage of fast action on intrusion detection and also can buy time for intrusion mitigation.

[1]  Nuno Pereira,et al.  Analysis of LoRaWAN v1.1 security: research paper , 2018, SmartObjects@MobiHoc.

[2]  Fernando A. Kuipers,et al.  SDN and Virtualization Solutions for the Internet of Things: A Survey , 2016, IEEE Access.

[3]  Ismail Butun,et al.  Detecting Intrusions in Cyber-Physical Systems of Smart Cities : Challenges and Directions , 2019 .

[4]  Emiliano Sisinni,et al.  Evaluation of communication latency in industrial IoT applications , 2017, 2017 IEEE International Workshop on Measurement and Networking (M&N).

[5]  Nuno Pereira,et al.  Security Risk Analysis of LoRaWAN and Future Directions , 2018, Future Internet.

[6]  Olaf Pfeiffer,et al.  Embedded Networking with CAN and CANopen , 2003 .

[7]  Gunnar Prytz,et al.  A performance analysis of EtherCAT and PROFINET IRT , 2008, 2008 IEEE International Conference on Emerging Technologies and Factory Automation.

[8]  Christian Brecher,et al.  Industrial Internet of Things and Cyber Manufacturing Systems , 2017 .

[9]  Jean-Dominique Decotignie,et al.  Ethernet-Based Real-Time and Industrial Communications , 2005, Proceedings of the IEEE.

[10]  Alexios Lekidis,et al.  Design flow for the rigorous development of networked embedded systems. (Flot de conception pour le développement rigoureux des systèmes embarqués en réseau) , 2015 .

[11]  Ismail Butun Privacy and trust relations in Internet of Things from the user point of view , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[12]  J. Mitola,et al.  Software radios: Survey, critical evaluation and future directions , 1992, IEEE Aerospace and Electronic Systems Magazine.

[13]  Ismail Butun,et al.  Security Implications of Fog Computing on the Internet of Things , 2018, 2019 IEEE International Conference on Consumer Electronics (ICCE).

[14]  Ioannis G. Askoxylakis,et al.  The Interoperability of Things: Interoperable solutions as an enabler for IoT and Web 3.0 , 2018, 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[15]  Mustafa Kocakulak,et al.  An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[16]  Daniel Ricardo dos Santos,et al.  Security and Privacy in Smart Grids: Challenges, Current Solutions and Future Opportunities , 2020, ICISSP.

[17]  Michel Robert,et al.  Overview of narrowband IoT in LTE Rel-13 , 2016, 2016 IEEE Conference on Standards for Communications and Networking (CSCN).

[18]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[19]  Seref Sagiroglu,et al.  Big data issues in smart grid systems , 2016, 2016 IEEE International Conference on Renewable Energy Research and Applications (ICRERA).

[20]  Thomas Werner,et al.  Integration of CAN-based Networks into the PROFInet Environment , 2003 .

[21]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[22]  Mikael Gidlund,et al.  A Central Intrusion Detection System for RPL-Based Industrial Internet of Things , 2019, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS).

[23]  Tao Huang,et al.  Big data analytics in smart grids: a review , 2018, Energy Informatics.

[24]  Nuno Pereira,et al.  Formal security analysis of LoRaWAN , 2019, Comput. Networks.

[25]  Tarik Taleb,et al.  A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.

[26]  Fei Tao,et al.  Digital twin-driven product design, manufacturing and service with big data , 2017, The International Journal of Advanced Manufacturing Technology.

[27]  Rafal Rohozinski,et al.  Stuxnet and the Future of Cyber War , 2011 .

[28]  Houbing Song,et al.  Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.

[29]  Hannaneh Najdataei Parallel Data Streaming Analytics in the Context of Internet of Things , 2019 .

[30]  Ravi Sankar,et al.  Prevention and detection of intrusions in wireless sensor networks , 2013 .

[31]  Ian F. Akyildiz,et al.  SDN-based architecture for providing reliable Internet of Things connectivity in 5G systems , 2018, 2018 17th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).

[32]  Amitava Ghosh,et al.  Narrowband LTE-M System for M2M Communication , 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall).

[33]  Jerker Delsing,et al.  IoT Interoperability—On-Demand and Low Latency Transparent Multiprotocol Translator , 2017, IEEE Internet of Things Journal.