A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities
暂无分享,去创建一个
Xenofon Fafoutis | Nicola Dragoni | Koen Tange | Michele De Donno | N. Dragoni | Xenofon Fafoutis | Koen Tange | Michele De Donno
[1] Jöran Beel,et al. Google Scholar’s Ranking Algorithm : An Introductory Overview , 2009 .
[2] Sherali Zeadally,et al. Deploying Fog Computing in Industrial Internet of Things and Industry 4.0 , 2018, IEEE Transactions on Industrial Informatics.
[3] SK Hafizul Islam,et al. Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments , 2018, IEEE Transactions on Industrial Informatics.
[4] Eugen Brenner,et al. A secure hardware module and system concept for local and remote industrial embedded system identification , 2014, Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA).
[5] Stefan Marksteiner,et al. Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing , 2019, ARES.
[6] Jianhua Chen,et al. Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[7] Jameela Al-Jaroodi,et al. Applying Blockchain in Industry 4.0 Applications , 2019, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC).
[8] Petr Novák,et al. Performance Modeling Extension of Directory Facilitator for Enhancing Communication in FIPA-Compliant Multiagent Systems , 2017, IEEE Transactions on Industrial Informatics.
[9] Diego Dujovne,et al. 6TiSCH: deterministic IP-enabled industrial internet (of things) , 2014, IEEE Communications Magazine.
[10] Huaqun Guo,et al. A Survey on IIoT Security , 2019, 2019 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS).
[11] Victor A. Skormin,et al. Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation , 2014, 2014 International Conference on Unmanned Aircraft Systems (ICUAS).
[12] Ing-Ray Chen,et al. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[13] Hong Linh Truong,et al. MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).
[14] Xiaojiang Du,et al. Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach , 2020, Future Gener. Comput. Syst..
[15] Stefan Marksteiner. Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective , 2018, 2018 IEEE 20th Conference on Business Informatics (CBI).
[16] Hans D. Schotten,et al. Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection , 2019, ArXiv.
[17] Elena Sitnikova,et al. An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things , 2019, BDIOT 2019.
[18] Jianhua Li,et al. Efficient Secure Access to IEEE 21451 Based Wireless IIoT Using Optimized TEDS and MIB , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.
[19] Stefano Panzieri,et al. Securing connection between IT and OT: the Fog Intrusion Detection System prospective , 2019, 2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT).
[20] Vyacheslav S. Kharchenko,et al. Challenges in assurance case application for industrial IoT , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
[21] Maryam M. Aldossary,et al. Improving an Identity Authentication Management Protocol in IIoT , 2019, 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS).
[22] Moayad Aloqaily,et al. An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT , 2019, IEEE Access.
[23] Ani Bicaku,et al. Towards a security baseline for IaaS-cloud back-ends in Industry 4.0 , 2017, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST).
[24] Jerker Delsing,et al. Local Cloud Internet of Things Automation: Technology and Business Model Features of Distributed Internet of Things Automation Solutions , 2017, IEEE Industrial Electronics Magazine.
[25] Francisco Fraile,et al. Trustworthy Industrial IoT Gateways for Interoperability Platforms and Ecosystems , 2018, IEEE Internet of Things Journal.
[26] Georgios Mantas,et al. Towards trustworthy end-to-end communication in industry 4.0 , 2017, 2017 IEEE 15th International Conference on Industrial Informatics (INDIN).
[27] Marco Ehrlich,et al. Survey of Security Standards for an automated Industrie 4.0 compatible Manufacturing , 2019, IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society.
[28] Paul Jacob,et al. Access Control Policy Enforcement for Zero-Trust-Networking , 2018, 2018 29th Irish Signals and Systems Conference (ISSC).
[29] Remzi Seker,et al. Cyber resilience protection for industrial internet of things: A software-defined networking approach , 2019, Comput. Ind..
[30] Ali Balador,et al. Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models , 2018, 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[31] Christian Wietfeld,et al. Network Slicing for Critical Communications in Shared 5G Infrastructures - An Empirical Evaluation , 2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft).
[32] Yun Liu,et al. Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing , 2018, IEEE Transactions on Industrial Informatics.
[33] Simon Althoff,et al. Secure and Time-sensitive Communication for Remote Process Control and Monitoring , 2018, 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA).
[34] Sinem Alturjman,et al. Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications , 2018, IEEE Transactions on Industrial Informatics.
[35] Cristina Alcaraz,et al. Covert Channels-Based Stealth Attacks in Industry 4.0 , 2019, IEEE Systems Journal.
[36] Eduardo Jacob,et al. Cetratus: Towards a live patching supported runtime for mixed-criticality safe and secure systems , 2018, 2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES).
[37] Hakim Badis,et al. PulSec: Secure Element based framework for sensors anomaly detection in Industry 4.0 , 2019 .
[38] Florian Hofer,et al. Architecture, technologies and challenges for cyber-physical systems in industry 4.0: a systematic mapping study , 2018, ESEM.
[39] Marta Beltrán,et al. Federated system-to-service authentication and authorization combining PUFs and tokens , 2017, 2017 12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC).
[40] Swapnil Paliwal,et al. Hash-Based Conditional Privacy Preserving Authentication and Key Exchange Protocol Suitable for Industrial Internet of Things , 2019, IEEE Access.
[41] Shahid Mumtaz,et al. New Security Mechanisms of High-Reliability IoT Communication Based on Radio Frequency Fingerprint , 2019, IEEE Internet of Things Journal.
[42] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[43] Min Chen,et al. Narrow Band Internet of Things , 2017, IEEE Access.
[44] Mohammed I. Thanoon,et al. Development of IIoT Monitoring and Control Security Scheme for Cyber Physical Systems , 2019, 2019 SoutheastCon.
[45] Thiemo Voigt,et al. 6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.
[46] Hans D. Schotten,et al. Physical Layer Security for IIoT and CPPS: A Cellular-Network Security Approach , 2019 .
[47] Gabor Breda,et al. Information security aspects of Industry 4.0 , 2019, Procedia Manufacturing.
[48] Florian Skopik,et al. Protecting cyber physical production systems using anomaly detection to enable self-adaptation , 2018, 2018 IEEE Industrial Cyber-Physical Systems (ICPS).
[49] Hans A. Hansson,et al. Applicability of the IEC 62443 standard in Industry 4.0 / IIoT , 2019, ARES.
[50] Gedare Bloom,et al. Design patterns for the industrial Internet of Things , 2018, 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS).
[51] Tim Lackorzynski,et al. fastvpn – Secure and Flexible Networking for Industry 4 . 0 fastvpn – Sichere und flexible Vernetzung für Industrie 4 . 0 , 2018 .
[52] Nasir Ghani,et al. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations , 2019, IEEE Communications Surveys & Tutorials.
[53] Awais Rashid,et al. A Reference Architecture for IIoT and Industrial Control Systems Testbeds , 2019, Living in the Internet of Things (IoT 2019).
[54] An Braeken,et al. SEC-BlockEdge: Security Threats in Blockchain-Edge based Industrial IoT Networks , 2019, 2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM).
[55] Andrea Höller,et al. Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[56] Huaxiong Wang,et al. FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things , 2019, IEEE Transactions on Dependable and Secure Computing.
[57] Michael W. Condry,et al. Using Smart Edge IoT Devices for Safer, Rapid Response With Industry IoT Control Operations , 2016, Proceedings of the IEEE.
[58] Imanol Mugarza,et al. Runtime Vulnerability Discovery as a Service on Industrial Internet of Things (IIoT) Systems , 2018, 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA).
[59] Angelo Corallo,et al. Cybersecurity for Industry 4.0 in the current literature: A reference framework , 2018, Comput. Ind..
[60] Isabel Praça,et al. CyberFactory#1 — Securing the industry 4.0 with cyber-ranges and digital twins , 2018, 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS).
[61] C. Maple,et al. Development of a capability maturity model for cyber security in IIoT enabled supply chains , 2019 .
[62] Sabu M. Thampi,et al. A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations , 2018, IEEE Access.
[63] Wai-Kong Lee,et al. Accelerating ElGamal Partial Homomorphic Encryption with GPU Platform for Industrial Internet of Things , 2019, 2019 International Conference on Green and Human Information Technology (ICGHIT).
[64] Ilsun You,et al. Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT) , 2018, IEEE Access.
[65] Angelo Spognardi,et al. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation , 2018, Secur. Commun. Networks.
[66] Lunzhi Deng,et al. Anonymous Aggregate Encryption Scheme for Industrial Internet of Things , 2020, IEEE Systems Journal.
[67] Yan Peng,et al. A Dynamic Multipath Scheme for Protecting Source-Location Privacy Using Multiple Sinks in WSNs Intended for IIoT , 2020, IEEE Transactions on Industrial Informatics.
[68] Nicola Dragoni,et al. ANTIBIOTIC 2.0: A Fog-based Anti-Malware for Internet of Things , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[69] Xiangjian He,et al. A Distributed and Anonymous Data Collection Framework Based on Multilevel Edge Computing Architecture , 2020, IEEE Transactions on Industrial Informatics.
[70] Mikael Gidlund,et al. Key Distribution Protocol for Industrial Internet of Things Without Implicit Certificates , 2019, IEEE Internet of Things Journal.
[71] Carlo Fischione,et al. Using a Large Data Set to Improve Industrial Wireless Communications: Latency, Reliability, and Security , 2019, IEEE Industrial Electronics Magazine.
[72] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[73] Eduardo Jacob,et al. Dynamic Software Updates to Enhance Security and Privacy in High Availability Energy Management Applications in Smart Cities , 2019, IEEE Access.
[74] Lav Gupta,et al. Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things , 2019, IEEE Internet of Things Journal.
[75] Tim Lackorzynski,et al. A Comparative Study on Virtual Private Networks for Future Industrial Communication Systems , 2019, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS).
[76] Angel Soriano,et al. BRAIN-IoT: Model-Based Framework for Dependable Sensing and Actuation in Intelligent Decentralized IoT Systems , 2019, 2019 4th International Conference on Computing, Communications and Security (ICCCS).
[77] Sylvain Frey,et al. The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things , 2019 .
[78] Ioannis G. Askoxylakis,et al. Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).
[79] Kolin Paul,et al. PatchRank: Ordering updates for SCADA systems , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).
[80] Peter Priller,et al. Securing smart maintenance services: Hardware-security and TLS for MQTT , 2015, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN).
[81] Haider Abbas,et al. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges , 2016, IEEE Access.
[82] António Amaral,et al. Network and information security challenges within Industry 4.0 paradigm , 2017 .
[83] Yi Mu,et al. Fully Secure Lightweight Certificateless Signature Scheme for IIoT , 2019, IEEE Access.
[84] Béla Genge,et al. A Multi-Model-based Approach to Detect Cyber Stealth Attacks in Industrial Internet of Things , 2019, 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM).
[85] Peng Hu. A System Architecture for Software-Defined Industrial Internet of Things , 2015, 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).
[86] Johannes Winter,et al. Hardware-security technologies for industrial IoT: TrustZone and security controller , 2015, IECON 2015 - 41st Annual Conference of the IEEE Industrial Electronics Society.
[87] Ping Wang,et al. Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks , 2014, Ad Hoc Networks.
[88] Heikki Laaki,et al. Prototyping a Digital Twin for Real Time Remote Control Over Mobile Networks: Application of Remote Surgery , 2019, IEEE Access.
[89] Jürgen Jasperneite,et al. Performance evaluation of MAC algorithms for real-time Ethernet communication systems , 2013, 2013 11th IEEE International Conference on Industrial Informatics (INDIN).
[90] Stefan Biffl,et al. Security Development Lifecycle for Cyber-Physical Production Systems , 2019, IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society.
[91] Moritz Loske,et al. Context-Aware Authentication: State-of-the-Art Evaluation and Adaption to the IIoT , 2019, 2019 IEEE 5th World Forum on Internet of Things (WF-IoT).
[92] Bernhard Dieber,et al. Security Considerations in Modular Mobile Manipulation , 2019, 2019 Third IEEE International Conference on Robotic Computing (IRC).
[93] Elias Z. Tragos,et al. RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects , 2014, 2014 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[94] Vyacheslav Kharchenko,et al. Integrated Cyber Safety & Security Management System: Industry 4.0 Issue , 2019, 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT).
[95] Harald Ruess,et al. On Computer-Aided Techniques for Supporting Safety and Security Co-Engineering , 2019, 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW).
[96] Shyan-Ming Yuan,et al. SMAP Fog/Edge: A Secure Mutual Authentication Protocol for Fog/Edge , 2019, IEEE Access.
[97] Antonio Bucchiarone,et al. Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era , 2019, Future Internet.
[98] Rainer Matischek,et al. Secured remote configuration approach for industrial cyber-physical systems , 2018, 2018 IEEE Industrial Cyber-Physical Systems (ICPS).
[99] Jason M. McGinthy,et al. Secure Industrial Internet of Things Critical Infrastructure Node Design , 2019, IEEE Internet of Things Journal.
[100] Chun Chen,et al. Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.
[101] Mohammad Abdullah Al Faruque,et al. Security trends and advances in manufacturing systems in the era of industry 4.0 , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[102] Andrew A. West,et al. An industrial evaluation of an Industry 4.0 reference architecture demonstrating the need for the inclusion of security and human components , 2019, Comput. Ind..
[103] D. John Morrow,et al. Securing the Industrial Internet of Things for Critical Infrastructure (IIoT-CI) , 2019, 2019 IEEE 5th World Forum on Internet of Things (WF-IoT).
[104] Hong-Ning Dai,et al. UAV-enabled friendly jamming scheme to secure industrial Internet of Things , 2019, Journal of Communications and Networks.
[105] Tiago M. Fernández-Caramés,et al. A Review on the Application of Blockchain to the Next Generation of Cybersecure Industry 4.0 Smart Factories , 2019, IEEE Access.
[106] Howard Shrobe,et al. IIoT Cybersecurity Risk Modeling for SCADA Systems , 2018, IEEE Internet of Things Journal.
[107] Fernando Cores,et al. Agent-based PKI for Distributed Control System , 2015, 2015 World Congress on Industrial Control Systems Security (WCICSS).
[108] Peter Hofmann,et al. Challenges and Solutions for Industry-Grade Secure Connectivity , 2019, 2019 International Conference on Networked Systems (NetSys).
[109] Carolyn Talcott,et al. Formal Security Verification of Industry 4.0 Applications , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).
[110] Ingmar Posner,et al. Long-Term Driving Behaviour Modelling for Driver Identification , 2018, 2018 21st International Conference on Intelligent Transportation Systems (ITSC).
[111] Pekka Nikander,et al. Interledger for the Industrial Internet of Things , 2019, 2019 IEEE 17th International Conference on Industrial Informatics (INDIN).
[112] Hong Liu,et al. An Attribute Credential Based Public Key Scheme for Fog Computing in Digital Manufacturing , 2019, IEEE Transactions on Industrial Informatics.
[113] Quan Pan,et al. Network Data Analysis and Anomaly Detection Using CNN Technique for Industrial Control Systems Security , 2019, 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC).
[114] Song Han,et al. Industrial Internet of Things: Challenges, Opportunities, and Directions , 2018, IEEE Transactions on Industrial Informatics.
[115] Kim-Kwang Raymond Choo,et al. Cloud Manufacturing: Security, Privacy, and Forensic Concerns , 2016, IEEE Cloud Computing.
[116] Miroslav Pajic,et al. Detection of cyber-attacks in electro-pneumatic positioning system with distributed control , 2019, 2019 27th Telecommunications Forum (TELFOR).
[117] Wee Siong Ng,et al. An efficient authorization framework for securing industrial Internet of Things , 2017, TENCON 2017 - 2017 IEEE Region 10 Conference.
[118] Fagen Li,et al. Efficient certificateless access control for industrial Internet of Things , 2017, Future Gener. Comput. Syst..
[119] Robert H. Deng,et al. Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices , 2018, IEEE Transactions on Industrial Informatics.
[120] Yang Liu,et al. EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid , 2020, IEEE Transactions on Industrial Informatics.
[121] Massimiliano Masi,et al. Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach , 2019, 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[122] Kai Petersen,et al. Guidelines for conducting systematic mapping studies in software engineering: An update , 2015, Inf. Softw. Technol..
[123] Cristina Alcaraz,et al. Security of industrial sensor network-based remote substations in the context of the Internet of Things , 2013, Ad Hoc Networks.
[124] Manuel Mazzara,et al. AntibIoTic: Protecting IoT Devices Against DDoS Attacks , 2016, SEDA.
[125] Mingdong Tang,et al. A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things , 2019, IEEE Transactions on Industrial Informatics.
[126] Seung-Hoon Hwang,et al. A survey on LPWA technology: LoRa and NB-IoT , 2017, ICT Express.
[127] Georges Kaddoum,et al. Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0 , 2020, IEEE Internet of Things Journal.
[128] Manuel Mazzara,et al. The Internet of Hackable Things , 2016, SEDA.
[129] Matthias Niedermaier,et al. PropFuzz — An IT-security fuzzing framework for proprietary ICS protocols , 2017, 2017 International Conference on Applied Electronics (AE).
[130] Yong Xiang,et al. Serious Challenges and Potential Solutions for the Industrial Internet of Things with Edge Intelligence , 2019, IEEE Network.
[131] Jin Wang,et al. Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[132] Fabio Martinelli,et al. Obligation Management in Usage Control Systems , 2019, 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP).
[133] Luying Zhou,et al. A fog computing based approach to DDoS mitigation in IIoT systems , 2019, Comput. Secur..
[134] Giuseppe Piro,et al. Optimal and secure protocols in the IETF 6TiSCH communication stack , 2014, 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE).
[135] Christian Diedrich,et al. Development of Injection Attacks Toolbox in MATLAB/Simulink for Attacks Simulation in Industrial Control System Applications , 2019, 2019 IEEE 17th International Conference on Industrial Informatics (INDIN).
[136] Nabil Sahli,et al. SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS , 2013 .
[137] Fernando M. V. Ramos,et al. Secure multi-cloud virtual network embedding , 2017, Comput. Commun..
[138] Edgar Weippl,et al. Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).
[139] Elisa Bertino,et al. Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[140] Yu-Lun Huang,et al. 3aRAM: A 3-Layer AHP-Based Risk Assessment Model and its Implementation for an Industrial IoT Cloud , 2019, 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C).
[141] Asadullah Shah,et al. The future of data privacy and security concerns in Internet of Things , 2018, 2018 IEEE International Conference on Innovative Research and Development (ICIRD).
[142] Gerhard Hansch,et al. A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).
[143] Chunhua Su,et al. Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints , 2018, IEEE Signal Processing Magazine.
[144] Tomoaki Ohtsuki,et al. Secrecy Performance Analysis of Wireless Sensor Networks , 2019, IEEE Sensors Letters.
[145] Luis Gomes,et al. Improving Attack Trees Analysis using Petri Net modeling of Cyber-Attacks , 2019, 2019 IEEE 28th International Symposium on Industrial Electronics (ISIE).
[146] Ani Bicaku,et al. Monitoring Industry 4.0 applications for security and safety standard compliance , 2018, 2018 IEEE Industrial Cyber-Physical Systems (ICPS).
[147] Hai Jin,et al. Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks , 2018, IEEE Transactions on Industrial Informatics.
[148] Emilio Tissato Nakamura,et al. A Privacy, Security, Safety, Resilience and Reliability Focused Risk Assessment Methodology for IIoT Systems Steps to Build and Use Secure IIoT Systems , 2018, 2018 Global Internet of Things Summit (GIoTS).
[149] Lei Shu,et al. Challenges and Research Issues of Data Management in IoT for Large-Scale Petrochemical Plants , 2018, IEEE Systems Journal.
[150] Ludwig Martin,et al. Current Significance of IT-Infrastructure Enabling Industry 4.0 in Large Companies , 2018, 2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC).
[151] Yannan Li,et al. Toward Data Security in Edge Intelligent IIoT , 2019, IEEE Network.
[152] Adlen Ksentini,et al. Formally verified latency-aware VNF placement in industrial Internet of things , 2018, 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS).
[153] Raj Jain,et al. Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning , 2018, 2018 IEEE International Conference on Intelligence and Security Informatics (ISI).
[154] Mounir Rifi,et al. An Evaluation of Machine Learning Algorithms To Detect Attacks in Scada Network , 2019, 2019 7th Mediterranean Congress of Telecommunications (CMT).
[155] Athanasios V. Vasilakos,et al. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 , 2018, J. Netw. Comput. Appl..
[156] Béla Genge,et al. Anomaly Detection in Aging Industrial Internet of Things , 2019, IEEE Access.
[157] Jason P. Jue,et al. All One Needs to Know about Fog Computing and Related Edge Computing Paradigms , 2019 .
[158] Athanasios V. Vasilakos,et al. Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment , 2018, IEEE Internet of Things Journal.
[159] Peter Kieseberg,et al. Security in cyber-physical production systems: A roadmap to improving IT-security in the production system lifecycle , 2017, 2017 AEIT International Annual Conference.
[160] Rainer Matischek,et al. Bring your own key for the industrial Internet of Things , 2017, 2017 IEEE International Conference on Industrial Technology (ICIT).
[161] Yi Mu,et al. On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments , 2019, IEEE Access.
[162] Bo Peng,et al. An Efficient Image Encryption Scheme for Industrial Internet-of-Things Devices , 2019, IoT S&P@CCS.
[163] Supika Mashiro,et al. Determining a security roadmap for the microelectronics industry , 2018, 2018 29th Annual SEMI Advanced Semiconductor Manufacturing Conference (ASMC).
[164] Adriano Valenzano,et al. Leveraging SDN to improve security in industrial networks , 2017, 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS).
[165] Wanli Ma,et al. On an IT Security Framework , 2005, KES.
[166] Joarder Kamruzzaman,et al. Robust Malware Defense in Industrial IoT Applications Using Machine Learning With Selective Adversarial Samples , 2020, IEEE Transactions on Industry Applications.
[167] Jie Xu,et al. Massive-Scale Automation in Cyber-Physical Systems: Vision & Challenges , 2017, 2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS).
[168] Andreas Seitz,et al. Fog Computing as Enabler for Blockchain-Based IIoT App Marketplaces - A Case Study , 2018, 2018 Fifth International Conference on Internet of Things: Systems, Management and Security.
[169] Jerker Delsing,et al. An AAA solution for securing industrial IoT devices using next generation access control , 2018, 2018 IEEE Industrial Cyber-Physical Systems (ICPS).
[170] Winning with the Industrial Internet of Things , 2015 .
[171] Eugen Brenner,et al. ESTADO — Enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).
[172] Nicola Dragoni,et al. Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog , 2019, IEEE Access.
[173] Haralambos Mouratidis,et al. A Security Analysis Method for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[174] Kim-Kwang Raymond Choo,et al. Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data , 2019, IEEE Transactions on Emerging Topics in Computing.
[175] Angelos P. Markopoulos,et al. A review on the readiness level and cyber-security challenges in Industry 4.0 , 2017, 2017 South Eastern European Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM).
[176] F. Richard Yu,et al. A Multi-Level DDoS Mitigation Framework for the Industrial Internet of Things , 2018, IEEE Communications Magazine.
[177] Jeongnyeo Kim,et al. RIPPLE: Adaptive fine-grained access control in multi-hop LLNs , 2018, 2018 International Conference on Information Networking (ICOIN).
[178] Hicham Lakhlef,et al. Internet of things security: A top-down survey , 2018, Comput. Networks.
[179] Yuna Jiang,et al. Smart Contract-Based Data Commodity Transactions for Industrial Internet of Things , 2019, IEEE Access.
[180] Alireza Esfahani,et al. A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment , 2019, IEEE Internet of Things Journal.
[181] Flavio Esposito,et al. A Policy Checker Approach for Secure Industrial SDN , 2018, 2018 2nd Cyber Security in Networking Conference (CSNet).
[182] Mohamed Amine Ferrag,et al. Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.
[183] Christian Esposito,et al. Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures , 2018, IEEE Transactions on Industrial Informatics.
[184] Henning Trsek,et al. Analysis of the Cyber-Security of industry 4.0 technologies based on RAMI 4.0 and identification of requirements , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).
[185] Shehzad Ashraf Chaudhry,et al. Comments on “Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment” , 2019, IEEE Internet of Things Journal.
[186] Fábio Januário,et al. Security challenges in SCADA systems over Wireless Sensor and Actuator Networks , 2016, 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).
[187] Anis Laouiti,et al. DRMF: A Distributed Resource Management Framework for Industry 4.0 Environments , 2019, 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA).
[188] Joe Cunningham,et al. The industrial internet of things (IIoT): An analysis framework , 2018, Comput. Ind..
[189] Robert Heinrich,et al. Modeling of dynamic trust contracts for industry 4.0 systems , 2018, ECSA.
[190] Chen Ling,et al. Security challenges and risk evaluation framework for industrial wireless sensor networks , 2017, 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT).
[191] Laurence T. Yang,et al. Privacy-Preserving Tensor-Based Multiple Clusterings on Cloud for Industrial IoT , 2019, IEEE Transactions on Industrial Informatics.
[192] Jiankun Hu,et al. A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems , 2018, IEEE Access.
[193] Holger Bock,et al. Hardware-secured and transparent multi-stakeholder data exchange for industrial IoT , 2016, 2016 IEEE 14th International Conference on Industrial Informatics (INDIN).
[194] Chien-Ming Chen,et al. Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments , 2019, IEEE Access.
[195] Meriem SMACHE,et al. Autonomous Detection of Synchronization Attacks in the Industrial Internet Of Things , 2019, 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC).
[196] Vladimir Sklyar,et al. ENISA Documents in Cybersecurity Assurance for Industry 4.0: IIoT Threats and Attacks Scenarios , 2019, 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
[197] Wouter Joosen,et al. Data Protection Compliance Regulations and Implications for Smart Factories of the Future , 2016, 2016 12th International Conference on Intelligent Environments (IE).
[198] Srinivasan Seshan,et al. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things , 2015, HotNets.
[199] Wouter Joosen,et al. Identity management for cyber-physical production workflows and individualized manufacturing in industry 4.0 , 2017, SAC.
[200] Yevgeniy Vorobeychik,et al. Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening , 2018, 2018 IEEE International Conference on Industrial Internet (ICII).
[201] Shilin Wen,et al. Blockchain-Enabled Data Collection and Sharing for Industrial IoT With Deep Reinforcement Learning , 2019, IEEE Transactions on Industrial Informatics.
[202] Luying Zhou,et al. Anomaly Detection Methods for IIoT Networks , 2018, 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI).
[203] Georg Sigl,et al. Network Scanning and Mapping for IIoT Edge Node Device Security , 2019, 2019 International Conference on Applied Electronics (AE).
[204] Robert H. Deng,et al. Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things , 2019, IEEE Internet of Things Journal.
[205] Didier Stricker,et al. Addressing security challenges in industrial augmented reality systems , 2017, 2017 IEEE 15th International Conference on Industrial Informatics (INDIN).
[206] Julian Schütte,et al. LUCON: Data Flow Control for Message-Based IoT Systems , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[207] Andreas Mauthe,et al. Towards a Security Cost Model for Cyber-Physical Systems , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[208] Yousung Kang,et al. Abnormal Traffic Detection Mechanism for Protecting IIoT Environments , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).
[209] Elena Sitnikova,et al. Industrial Internet of Things Based Ransomware Detection using Stacked Variational Neural Network , 2019, BDIOT 2019.
[210] Hussein T. Mouftah,et al. Cloud-Centric Collaborative Security Service Placement for Advanced Metering Infrastructures , 2019, IEEE Transactions on Smart Grid.
[211] Christoph Reich,et al. Adaption of a Privilege Management Infrastructure (PMI) Approach to Industry 4.0 , 2017, 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).
[212] Andrea Zanella,et al. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices , 2019, IEEE Internet of Things Journal.
[213] Maxim O. Kalinin,et al. Prevention of false data injections in smart infrastructures , 2019, 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom).
[214] Pearl Brereton,et al. Performing systematic literature reviews in software engineering , 2006, ICSE.
[215] Zhendong Ma,et al. Security Viewpoint in a Reference Architecture Model for Cyber-Physical Production Systems , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[216] Nicola Dragoni,et al. Combining AntibIoTic with Fog Computing: AntibIoTic 2.0 , 2019, 2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC).
[217] Karl-Heinz Niemann. IT security extensions for PROFINET , 2019, 2019 IEEE 17th International Conference on Industrial Informatics (INDIN).
[218] Ani Bicaku,et al. Towards flexible and secure end-to-end communication in industry 4.0 , 2017, 2017 IEEE 15th International Conference on Industrial Informatics (INDIN).
[219] N. Jazdi,et al. Cyber physical systems in the context of Industry 4.0 , 2014, 2014 IEEE International Conference on Automation, Quality and Testing, Robotics.
[220] M. Omair Shafiq,et al. Analyzing Adversarial Attacks against Deep Learning for Intrusion Detection in IoT Networks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[221] Hans Dieter Schotten,et al. Securing Industrial Wireless Networks: Enhancing SDN with PhySec , 2019, 2019 Conference on Next Generation Computing Applications (NextComp).
[222] Masaya Yoshikawa,et al. Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack , 2019, 2019 Cybersecurity and Cyberforensics Conference (CCC).
[223] Jianying Zhou,et al. Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things , 2020, IEEE Transactions on Industrial Informatics.
[224] Xue Liu,et al. Towards Secure Industrial IoT: Blockchain System With Credit-Based Consensus Mechanism , 2019, IEEE Transactions on Industrial Informatics.
[225] Mauro Conti,et al. MimePot: a Model-based Honeypot for Industrial Control Networks , 2019, 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC).
[226] Andrew P. Martin,et al. Threat-Based Security Analysis for the Internet of Things , 2014, 2014 International Workshop on Secure Internet of Things.
[227] Rainer Matischek,et al. Sneakernet on wheels: Trustworthy NFC-based robot to machine communication , 2017, 2017 IEEE International Conference on RFID Technology & Application (RFID-TA).
[228] Yi Mu,et al. Building Redactable Consortium Blockchain for Industrial Internet-of-Things , 2019, IEEE Transactions on Industrial Informatics.
[229] Mikel Iturbe,et al. Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments , 2018, 2018 Global Internet of Things Summit (GIoTS).
[230] Fan Wu,et al. A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[231] Sayan Kumar Ray,et al. Securing RPL routing protocol from blackhole attacks using a trust-based mechanism , 2016, 2016 26th International Telecommunication Networks and Applications Conference (ITNAC).
[232] Anfeng Liu,et al. A Unified Trustworthy Environment Establishment Based on Edge Computing in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.
[233] Reiner Anderl,et al. Security by Design as an Approach to Design a Secure Industry 4.0-Capable Machine Enabling Online-Trading of Technology Data , 2018, 2018 International Conference on System Science and Engineering (ICSSE).
[234] Kagermann Henning. Recommendations for implementing the strategic initiative INDUSTRIE 4.0 , 2013 .
[235] Miklós Kozlovszky,et al. Security Survey of Dedicated IoT Networks in the Unlicensed ISM Bands , 2018, 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI).
[236] Haipeng Yao,et al. Hybrid Intrusion Detection System for Edge-Based IIoT Relying on Machine-Learning-Aided Detection , 2019, IEEE Network.
[237] Joaquim Ferreira,et al. Self-Sovereign Identity: Use-cases, Technologies, and Challenges for Industrial IoT , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).
[238] Fan Wu,et al. A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things , 2018, IEEE Internet of Things Journal.
[239] Joongheon Kim,et al. Internet of Things for Smart Manufacturing System: Trust Issues in Resource Allocation , 2018, IEEE Internet of Things Journal.
[240] C. Bormann,et al. Simple Keys for Simple Smart Objects , 2012 .
[241] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[242] Laurent Nana,et al. A Hybrid Intrusion Detection System in Industry 4.0 Based on ISA95 Standard , 2019, 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA).
[243] Amin Hassanzadeh,et al. Towards effective security control assignment in the Industrial Internet of Things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[244] Anurag Agarwal,et al. The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.
[245] Peter Priller,et al. Case study: From legacy to connectivity migrating industrial devices into the world of smart services , 2014, Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA).