A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities

A key application of the Internet of Things (IoT) paradigm lies within industrial contexts. Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry 4.0, promises to revolutionize production and manufacturing through the use of large numbers of networked embedded sensing devices, and the combination of emerging computing technologies, such as Fog/Cloud Computing and Artificial Intelligence. The IIoT is characterized by an increased degree of inter-connectivity, which not only creates opportunities for the industries that adopt it, but also for cyber-criminals. Indeed, IoT security currently represents one of the major obstacles that prevent the widespread adoption of IIoT technology. Unsurprisingly, such concerns led to an exponential growth of published research over the last few years. To get an overview of the field, we deem it important to systematically survey the academic literature so far, and distill from it various security requirements as well as their popularity. This paper consists of two contributions: our primary contribution is a systematic review of the literature over the period 2011–2019 on IIoT Security, focusing in particular on the security requirements of the IIoT. Our secondary contribution is a reflection on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIoT.

[1]  Jöran Beel,et al.  Google Scholar’s Ranking Algorithm : An Introductory Overview , 2009 .

[2]  Sherali Zeadally,et al.  Deploying Fog Computing in Industrial Internet of Things and Industry 4.0 , 2018, IEEE Transactions on Industrial Informatics.

[3]  SK Hafizul Islam,et al.  Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments , 2018, IEEE Transactions on Industrial Informatics.

[4]  Eugen Brenner,et al.  A secure hardware module and system concept for local and remote industrial embedded system identification , 2014, Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA).

[5]  Stefan Marksteiner,et al.  Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing , 2019, ARES.

[6]  Jianhua Chen,et al.  Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[7]  Jameela Al-Jaroodi,et al.  Applying Blockchain in Industry 4.0 Applications , 2019, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC).

[8]  Petr Novák,et al.  Performance Modeling Extension of Directory Facilitator for Enhancing Communication in FIPA-Compliant Multiagent Systems , 2017, IEEE Transactions on Industrial Informatics.

[9]  Diego Dujovne,et al.  6TiSCH: deterministic IP-enabled industrial internet (of things) , 2014, IEEE Communications Magazine.

[10]  Huaqun Guo,et al.  A Survey on IIoT Security , 2019, 2019 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS).

[11]  Victor A. Skormin,et al.  Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation , 2014, 2014 International Conference on Unmanned Aircraft Systems (ICUAS).

[12]  Ing-Ray Chen,et al.  Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[13]  Hong Linh Truong,et al.  MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[14]  Xiaojiang Du,et al.  Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach , 2020, Future Gener. Comput. Syst..

[15]  Stefan Marksteiner Reasoning on Adopting OPC UA for an IoT-Enhanced Smart Energy System from a Security Perspective , 2018, 2018 IEEE 20th Conference on Business Informatics (CBI).

[16]  Hans D. Schotten,et al.  Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection , 2019, ArXiv.

[17]  Elena Sitnikova,et al.  An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things , 2019, BDIOT 2019.

[18]  Jianhua Li,et al.  Efficient Secure Access to IEEE 21451 Based Wireless IIoT Using Optimized TEDS and MIB , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.

[19]  Stefano Panzieri,et al.  Securing connection between IT and OT: the Fog Intrusion Detection System prospective , 2019, 2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT).

[20]  Vyacheslav S. Kharchenko,et al.  Challenges in assurance case application for industrial IoT , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).

[21]  Maryam M. Aldossary,et al.  Improving an Identity Authentication Management Protocol in IIoT , 2019, 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS).

[22]  Moayad Aloqaily,et al.  An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT , 2019, IEEE Access.

[23]  Ani Bicaku,et al.  Towards a security baseline for IaaS-cloud back-ends in Industry 4.0 , 2017, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST).

[24]  Jerker Delsing,et al.  Local Cloud Internet of Things Automation: Technology and Business Model Features of Distributed Internet of Things Automation Solutions , 2017, IEEE Industrial Electronics Magazine.

[25]  Francisco Fraile,et al.  Trustworthy Industrial IoT Gateways for Interoperability Platforms and Ecosystems , 2018, IEEE Internet of Things Journal.

[26]  Georgios Mantas,et al.  Towards trustworthy end-to-end communication in industry 4.0 , 2017, 2017 IEEE 15th International Conference on Industrial Informatics (INDIN).

[27]  Marco Ehrlich,et al.  Survey of Security Standards for an automated Industrie 4.0 compatible Manufacturing , 2019, IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society.

[28]  Paul Jacob,et al.  Access Control Policy Enforcement for Zero-Trust-Networking , 2018, 2018 29th Irish Signals and Systems Conference (ISSC).

[29]  Remzi Seker,et al.  Cyber resilience protection for industrial internet of things: A software-defined networking approach , 2019, Comput. Ind..

[30]  Ali Balador,et al.  Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models , 2018, 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[31]  Christian Wietfeld,et al.  Network Slicing for Critical Communications in Shared 5G Infrastructures - An Empirical Evaluation , 2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft).

[32]  Yun Liu,et al.  Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing , 2018, IEEE Transactions on Industrial Informatics.

[33]  Simon Althoff,et al.  Secure and Time-sensitive Communication for Remote Process Control and Monitoring , 2018, 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA).

[34]  Sinem Alturjman,et al.  Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications , 2018, IEEE Transactions on Industrial Informatics.

[35]  Cristina Alcaraz,et al.  Covert Channels-Based Stealth Attacks in Industry 4.0 , 2019, IEEE Systems Journal.

[36]  Eduardo Jacob,et al.  Cetratus: Towards a live patching supported runtime for mixed-criticality safe and secure systems , 2018, 2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES).

[37]  Hakim Badis,et al.  PulSec: Secure Element based framework for sensors anomaly detection in Industry 4.0 , 2019 .

[38]  Florian Hofer,et al.  Architecture, technologies and challenges for cyber-physical systems in industry 4.0: a systematic mapping study , 2018, ESEM.

[39]  Marta Beltrán,et al.  Federated system-to-service authentication and authorization combining PUFs and tokens , 2017, 2017 12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC).

[40]  Swapnil Paliwal,et al.  Hash-Based Conditional Privacy Preserving Authentication and Key Exchange Protocol Suitable for Industrial Internet of Things , 2019, IEEE Access.

[41]  Shahid Mumtaz,et al.  New Security Mechanisms of High-Reliability IoT Communication Based on Radio Frequency Fingerprint , 2019, IEEE Internet of Things Journal.

[42]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[43]  Min Chen,et al.  Narrow Band Internet of Things , 2017, IEEE Access.

[44]  Mohammed I. Thanoon,et al.  Development of IIoT Monitoring and Control Security Scheme for Cyber Physical Systems , 2019, 2019 SoutheastCon.

[45]  Thiemo Voigt,et al.  6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.

[46]  Hans D. Schotten,et al.  Physical Layer Security for IIoT and CPPS: A Cellular-Network Security Approach , 2019 .

[47]  Gabor Breda,et al.  Information security aspects of Industry 4.0 , 2019, Procedia Manufacturing.

[48]  Florian Skopik,et al.  Protecting cyber physical production systems using anomaly detection to enable self-adaptation , 2018, 2018 IEEE Industrial Cyber-Physical Systems (ICPS).

[49]  Hans A. Hansson,et al.  Applicability of the IEC 62443 standard in Industry 4.0 / IIoT , 2019, ARES.

[50]  Gedare Bloom,et al.  Design patterns for the industrial Internet of Things , 2018, 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS).

[51]  Tim Lackorzynski,et al.  fastvpn – Secure and Flexible Networking for Industry 4 . 0 fastvpn – Sichere und flexible Vernetzung für Industrie 4 . 0 , 2018 .

[52]  Nasir Ghani,et al.  Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations , 2019, IEEE Communications Surveys & Tutorials.

[53]  Awais Rashid,et al.  A Reference Architecture for IIoT and Industrial Control Systems Testbeds , 2019, Living in the Internet of Things (IoT 2019).

[54]  An Braeken,et al.  SEC-BlockEdge: Security Threats in Blockchain-Edge based Industrial IoT Networks , 2019, 2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM).

[55]  Andrea Höller,et al.  Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability , 2018, 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[56]  Huaxiong Wang,et al.  FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things , 2019, IEEE Transactions on Dependable and Secure Computing.

[57]  Michael W. Condry,et al.  Using Smart Edge IoT Devices for Safer, Rapid Response With Industry IoT Control Operations , 2016, Proceedings of the IEEE.

[58]  Imanol Mugarza,et al.  Runtime Vulnerability Discovery as a Service on Industrial Internet of Things (IIoT) Systems , 2018, 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA).

[59]  Angelo Corallo,et al.  Cybersecurity for Industry 4.0 in the current literature: A reference framework , 2018, Comput. Ind..

[60]  Isabel Praça,et al.  CyberFactory#1 — Securing the industry 4.0 with cyber-ranges and digital twins , 2018, 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS).

[61]  C. Maple,et al.  Development of a capability maturity model for cyber security in IIoT enabled supply chains , 2019 .

[62]  Sabu M. Thampi,et al.  A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations , 2018, IEEE Access.

[63]  Wai-Kong Lee,et al.  Accelerating ElGamal Partial Homomorphic Encryption with GPU Platform for Industrial Internet of Things , 2019, 2019 International Conference on Green and Human Information Technology (ICGHIT).

[64]  Ilsun You,et al.  Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT) , 2018, IEEE Access.

[65]  Angelo Spognardi,et al.  DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation , 2018, Secur. Commun. Networks.

[66]  Lunzhi Deng,et al.  Anonymous Aggregate Encryption Scheme for Industrial Internet of Things , 2020, IEEE Systems Journal.

[67]  Yan Peng,et al.  A Dynamic Multipath Scheme for Protecting Source-Location Privacy Using Multiple Sinks in WSNs Intended for IIoT , 2020, IEEE Transactions on Industrial Informatics.

[68]  Nicola Dragoni,et al.  ANTIBIOTIC 2.0: A Fog-based Anti-Malware for Internet of Things , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[69]  Xiangjian He,et al.  A Distributed and Anonymous Data Collection Framework Based on Multilevel Edge Computing Architecture , 2020, IEEE Transactions on Industrial Informatics.

[70]  Mikael Gidlund,et al.  Key Distribution Protocol for Industrial Internet of Things Without Implicit Certificates , 2019, IEEE Internet of Things Journal.

[71]  Carlo Fischione,et al.  Using a Large Data Set to Improve Industrial Wireless Communications: Latency, Reliability, and Security , 2019, IEEE Industrial Electronics Magazine.

[72]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[73]  Eduardo Jacob,et al.  Dynamic Software Updates to Enhance Security and Privacy in High Availability Energy Management Applications in Smart Cities , 2019, IEEE Access.

[74]  Lav Gupta,et al.  Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things , 2019, IEEE Internet of Things Journal.

[75]  Tim Lackorzynski,et al.  A Comparative Study on Virtual Private Networks for Future Industrial Communication Systems , 2019, 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS).

[76]  Angel Soriano,et al.  BRAIN-IoT: Model-Based Framework for Dependable Sensing and Actuation in Intelligent Decentralized IoT Systems , 2019, 2019 4th International Conference on Computing, Communications and Security (ICCCS).

[77]  Sylvain Frey,et al.  The Forgotten I in IIoT: A Vulnerability Scanner for Industrial Internet of Things , 2019 .

[78]  Ioannis G. Askoxylakis,et al.  Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).

[79]  Kolin Paul,et al.  PatchRank: Ordering updates for SCADA systems , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).

[80]  Peter Priller,et al.  Securing smart maintenance services: Hardware-security and TLS for MQTT , 2015, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN).

[81]  Haider Abbas,et al.  Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges , 2016, IEEE Access.

[82]  António Amaral,et al.  Network and information security challenges within Industry 4.0 paradigm , 2017 .

[83]  Yi Mu,et al.  Fully Secure Lightweight Certificateless Signature Scheme for IIoT , 2019, IEEE Access.

[84]  Béla Genge,et al.  A Multi-Model-based Approach to Detect Cyber Stealth Attacks in Industrial Internet of Things , 2019, 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM).

[85]  Peng Hu A System Architecture for Software-Defined Industrial Internet of Things , 2015, 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).

[86]  Johannes Winter,et al.  Hardware-security technologies for industrial IoT: TrustZone and security controller , 2015, IECON 2015 - 41st Annual Conference of the IEEE Industrial Electronics Society.

[87]  Ping Wang,et al.  Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks , 2014, Ad Hoc Networks.

[88]  Heikki Laaki,et al.  Prototyping a Digital Twin for Real Time Remote Control Over Mobile Networks: Application of Remote Surgery , 2019, IEEE Access.

[89]  Jürgen Jasperneite,et al.  Performance evaluation of MAC algorithms for real-time Ethernet communication systems , 2013, 2013 11th IEEE International Conference on Industrial Informatics (INDIN).

[90]  Stefan Biffl,et al.  Security Development Lifecycle for Cyber-Physical Production Systems , 2019, IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society.

[91]  Moritz Loske,et al.  Context-Aware Authentication: State-of-the-Art Evaluation and Adaption to the IIoT , 2019, 2019 IEEE 5th World Forum on Internet of Things (WF-IoT).

[92]  Bernhard Dieber,et al.  Security Considerations in Modular Mobile Manipulation , 2019, 2019 Third IEEE International Conference on Robotic Computing (IRC).

[93]  Elias Z. Tragos,et al.  RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects , 2014, 2014 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[94]  Vyacheslav Kharchenko,et al.  Integrated Cyber Safety & Security Management System: Industry 4.0 Issue , 2019, 2019 10th International Conference on Dependable Systems, Services and Technologies (DESSERT).

[95]  Harald Ruess,et al.  On Computer-Aided Techniques for Supporting Safety and Security Co-Engineering , 2019, 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW).

[96]  Shyan-Ming Yuan,et al.  SMAP Fog/Edge: A Secure Mutual Authentication Protocol for Fog/Edge , 2019, IEEE Access.

[97]  Antonio Bucchiarone,et al.  Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era , 2019, Future Internet.

[98]  Rainer Matischek,et al.  Secured remote configuration approach for industrial cyber-physical systems , 2018, 2018 IEEE Industrial Cyber-Physical Systems (ICPS).

[99]  Jason M. McGinthy,et al.  Secure Industrial Internet of Things Critical Infrastructure Node Design , 2019, IEEE Internet of Things Journal.

[100]  Chun Chen,et al.  Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.

[101]  Mohammad Abdullah Al Faruque,et al.  Security trends and advances in manufacturing systems in the era of industry 4.0 , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[102]  Andrew A. West,et al.  An industrial evaluation of an Industry 4.0 reference architecture demonstrating the need for the inclusion of security and human components , 2019, Comput. Ind..

[103]  D. John Morrow,et al.  Securing the Industrial Internet of Things for Critical Infrastructure (IIoT-CI) , 2019, 2019 IEEE 5th World Forum on Internet of Things (WF-IoT).

[104]  Hong-Ning Dai,et al.  UAV-enabled friendly jamming scheme to secure industrial Internet of Things , 2019, Journal of Communications and Networks.

[105]  Tiago M. Fernández-Caramés,et al.  A Review on the Application of Blockchain to the Next Generation of Cybersecure Industry 4.0 Smart Factories , 2019, IEEE Access.

[106]  Howard Shrobe,et al.  IIoT Cybersecurity Risk Modeling for SCADA Systems , 2018, IEEE Internet of Things Journal.

[107]  Fernando Cores,et al.  Agent-based PKI for Distributed Control System , 2015, 2015 World Congress on Industrial Control Systems Security (WCICSS).

[108]  Peter Hofmann,et al.  Challenges and Solutions for Industry-Grade Secure Connectivity , 2019, 2019 International Conference on Networked Systems (NetSys).

[109]  Carolyn Talcott,et al.  Formal Security Verification of Industry 4.0 Applications , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).

[110]  Ingmar Posner,et al.  Long-Term Driving Behaviour Modelling for Driver Identification , 2018, 2018 21st International Conference on Intelligent Transportation Systems (ITSC).

[111]  Pekka Nikander,et al.  Interledger for the Industrial Internet of Things , 2019, 2019 IEEE 17th International Conference on Industrial Informatics (INDIN).

[112]  Hong Liu,et al.  An Attribute Credential Based Public Key Scheme for Fog Computing in Digital Manufacturing , 2019, IEEE Transactions on Industrial Informatics.

[113]  Quan Pan,et al.  Network Data Analysis and Anomaly Detection Using CNN Technique for Industrial Control Systems Security , 2019, 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC).

[114]  Song Han,et al.  Industrial Internet of Things: Challenges, Opportunities, and Directions , 2018, IEEE Transactions on Industrial Informatics.

[115]  Kim-Kwang Raymond Choo,et al.  Cloud Manufacturing: Security, Privacy, and Forensic Concerns , 2016, IEEE Cloud Computing.

[116]  Miroslav Pajic,et al.  Detection of cyber-attacks in electro-pneumatic positioning system with distributed control , 2019, 2019 27th Telecommunications Forum (TELFOR).

[117]  Wee Siong Ng,et al.  An efficient authorization framework for securing industrial Internet of Things , 2017, TENCON 2017 - 2017 IEEE Region 10 Conference.

[118]  Fagen Li,et al.  Efficient certificateless access control for industrial Internet of Things , 2017, Future Gener. Comput. Syst..

[119]  Robert H. Deng,et al.  Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices , 2018, IEEE Transactions on Industrial Informatics.

[120]  Yang Liu,et al.  EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid , 2020, IEEE Transactions on Industrial Informatics.

[121]  Massimiliano Masi,et al.  Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach , 2019, 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[122]  Kai Petersen,et al.  Guidelines for conducting systematic mapping studies in software engineering: An update , 2015, Inf. Softw. Technol..

[123]  Cristina Alcaraz,et al.  Security of industrial sensor network-based remote substations in the context of the Internet of Things , 2013, Ad Hoc Networks.

[124]  Manuel Mazzara,et al.  AntibIoTic: Protecting IoT Devices Against DDoS Attacks , 2016, SEDA.

[125]  Mingdong Tang,et al.  A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things , 2019, IEEE Transactions on Industrial Informatics.

[126]  Seung-Hoon Hwang,et al.  A survey on LPWA technology: LoRa and NB-IoT , 2017, ICT Express.

[127]  Georges Kaddoum,et al.  Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0 , 2020, IEEE Internet of Things Journal.

[128]  Manuel Mazzara,et al.  The Internet of Hackable Things , 2016, SEDA.

[129]  Matthias Niedermaier,et al.  PropFuzz — An IT-security fuzzing framework for proprietary ICS protocols , 2017, 2017 International Conference on Applied Electronics (AE).

[130]  Yong Xiang,et al.  Serious Challenges and Potential Solutions for the Industrial Internet of Things with Edge Intelligence , 2019, IEEE Network.

[131]  Jin Wang,et al.  Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[132]  Fabio Martinelli,et al.  Obligation Management in Usage Control Systems , 2019, 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP).

[133]  Luying Zhou,et al.  A fog computing based approach to DDoS mitigation in IIoT systems , 2019, Comput. Secur..

[134]  Giuseppe Piro,et al.  Optimal and secure protocols in the IETF 6TiSCH communication stack , 2014, 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE).

[135]  Christian Diedrich,et al.  Development of Injection Attacks Toolbox in MATLAB/Simulink for Attacks Simulation in Industrial Control System Applications , 2019, 2019 IEEE 17th International Conference on Industrial Informatics (INDIN).

[136]  Nabil Sahli,et al.  SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS , 2013 .

[137]  Fernando M. V. Ramos,et al.  Secure multi-cloud virtual network embedding , 2017, Comput. Commun..

[138]  Edgar Weippl,et al.  Avoiding Risky Designs When Using Blockchain Technologies in Cyber-Physical Systems , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).

[139]  Elisa Bertino,et al.  Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[140]  Yu-Lun Huang,et al.  3aRAM: A 3-Layer AHP-Based Risk Assessment Model and its Implementation for an Industrial IoT Cloud , 2019, 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[141]  Asadullah Shah,et al.  The future of data privacy and security concerns in Internet of Things , 2018, 2018 IEEE International Conference on Innovative Research and Development (ICIRD).

[142]  Gerhard Hansch,et al.  A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).

[143]  Chunhua Su,et al.  Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints , 2018, IEEE Signal Processing Magazine.

[144]  Tomoaki Ohtsuki,et al.  Secrecy Performance Analysis of Wireless Sensor Networks , 2019, IEEE Sensors Letters.

[145]  Luis Gomes,et al.  Improving Attack Trees Analysis using Petri Net modeling of Cyber-Attacks , 2019, 2019 IEEE 28th International Symposium on Industrial Electronics (ISIE).

[146]  Ani Bicaku,et al.  Monitoring Industry 4.0 applications for security and safety standard compliance , 2018, 2018 IEEE Industrial Cyber-Physical Systems (ICPS).

[147]  Hai Jin,et al.  Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks , 2018, IEEE Transactions on Industrial Informatics.

[148]  Emilio Tissato Nakamura,et al.  A Privacy, Security, Safety, Resilience and Reliability Focused Risk Assessment Methodology for IIoT Systems Steps to Build and Use Secure IIoT Systems , 2018, 2018 Global Internet of Things Summit (GIoTS).

[149]  Lei Shu,et al.  Challenges and Research Issues of Data Management in IoT for Large-Scale Petrochemical Plants , 2018, IEEE Systems Journal.

[150]  Ludwig Martin,et al.  Current Significance of IT-Infrastructure Enabling Industry 4.0 in Large Companies , 2018, 2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC).

[151]  Yannan Li,et al.  Toward Data Security in Edge Intelligent IIoT , 2019, IEEE Network.

[152]  Adlen Ksentini,et al.  Formally verified latency-aware VNF placement in industrial Internet of things , 2018, 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS).

[153]  Raj Jain,et al.  Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning , 2018, 2018 IEEE International Conference on Intelligence and Security Informatics (ISI).

[154]  Mounir Rifi,et al.  An Evaluation of Machine Learning Algorithms To Detect Attacks in Scada Network , 2019, 2019 7th Mediterranean Congress of Telecommunications (CMT).

[155]  Athanasios V. Vasilakos,et al.  BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 , 2018, J. Netw. Comput. Appl..

[156]  Béla Genge,et al.  Anomaly Detection in Aging Industrial Internet of Things , 2019, IEEE Access.

[157]  Jason P. Jue,et al.  All One Needs to Know about Fog Computing and Related Edge Computing Paradigms , 2019 .

[158]  Athanasios V. Vasilakos,et al.  Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment , 2018, IEEE Internet of Things Journal.

[159]  Peter Kieseberg,et al.  Security in cyber-physical production systems: A roadmap to improving IT-security in the production system lifecycle , 2017, 2017 AEIT International Annual Conference.

[160]  Rainer Matischek,et al.  Bring your own key for the industrial Internet of Things , 2017, 2017 IEEE International Conference on Industrial Technology (ICIT).

[161]  Yi Mu,et al.  On the Security of an Efficient and Robust Certificateless Signature Scheme for IIoT Environments , 2019, IEEE Access.

[162]  Bo Peng,et al.  An Efficient Image Encryption Scheme for Industrial Internet-of-Things Devices , 2019, IoT S&P@CCS.

[163]  Supika Mashiro,et al.  Determining a security roadmap for the microelectronics industry , 2018, 2018 29th Annual SEMI Advanced Semiconductor Manufacturing Conference (ASMC).

[164]  Adriano Valenzano,et al.  Leveraging SDN to improve security in industrial networks , 2017, 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS).

[165]  Wanli Ma,et al.  On an IT Security Framework , 2005, KES.

[166]  Joarder Kamruzzaman,et al.  Robust Malware Defense in Industrial IoT Applications Using Machine Learning With Selective Adversarial Samples , 2020, IEEE Transactions on Industry Applications.

[167]  Jie Xu,et al.  Massive-Scale Automation in Cyber-Physical Systems: Vision & Challenges , 2017, 2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS).

[168]  Andreas Seitz,et al.  Fog Computing as Enabler for Blockchain-Based IIoT App Marketplaces - A Case Study , 2018, 2018 Fifth International Conference on Internet of Things: Systems, Management and Security.

[169]  Jerker Delsing,et al.  An AAA solution for securing industrial IoT devices using next generation access control , 2018, 2018 IEEE Industrial Cyber-Physical Systems (ICPS).

[170]  Winning with the Industrial Internet of Things , 2015 .

[171]  Eugen Brenner,et al.  ESTADO — Enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).

[172]  Nicola Dragoni,et al.  Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog , 2019, IEEE Access.

[173]  Haralambos Mouratidis,et al.  A Security Analysis Method for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[174]  Kim-Kwang Raymond Choo,et al.  Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data , 2019, IEEE Transactions on Emerging Topics in Computing.

[175]  Angelos P. Markopoulos,et al.  A review on the readiness level and cyber-security challenges in Industry 4.0 , 2017, 2017 South Eastern European Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM).

[176]  F. Richard Yu,et al.  A Multi-Level DDoS Mitigation Framework for the Industrial Internet of Things , 2018, IEEE Communications Magazine.

[177]  Jeongnyeo Kim,et al.  RIPPLE: Adaptive fine-grained access control in multi-hop LLNs , 2018, 2018 International Conference on Information Networking (ICOIN).

[178]  Hicham Lakhlef,et al.  Internet of things security: A top-down survey , 2018, Comput. Networks.

[179]  Yuna Jiang,et al.  Smart Contract-Based Data Commodity Transactions for Industrial Internet of Things , 2019, IEEE Access.

[180]  Alireza Esfahani,et al.  A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment , 2019, IEEE Internet of Things Journal.

[181]  Flavio Esposito,et al.  A Policy Checker Approach for Secure Industrial SDN , 2018, 2018 2nd Cyber Security in Networking Conference (CSNet).

[182]  Mohamed Amine Ferrag,et al.  Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.

[183]  Christian Esposito,et al.  Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures , 2018, IEEE Transactions on Industrial Informatics.

[184]  Henning Trsek,et al.  Analysis of the Cyber-Security of industry 4.0 technologies based on RAMI 4.0 and identification of requirements , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).

[185]  Shehzad Ashraf Chaudhry,et al.  Comments on “Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment” , 2019, IEEE Internet of Things Journal.

[186]  Fábio Januário,et al.  Security challenges in SCADA systems over Wireless Sensor and Actuator Networks , 2016, 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).

[187]  Anis Laouiti,et al.  DRMF: A Distributed Resource Management Framework for Industry 4.0 Environments , 2019, 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA).

[188]  Joe Cunningham,et al.  The industrial internet of things (IIoT): An analysis framework , 2018, Comput. Ind..

[189]  Robert Heinrich,et al.  Modeling of dynamic trust contracts for industry 4.0 systems , 2018, ECSA.

[190]  Chen Ling,et al.  Security challenges and risk evaluation framework for industrial wireless sensor networks , 2017, 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT).

[191]  Laurence T. Yang,et al.  Privacy-Preserving Tensor-Based Multiple Clusterings on Cloud for Industrial IoT , 2019, IEEE Transactions on Industrial Informatics.

[192]  Jiankun Hu,et al.  A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems , 2018, IEEE Access.

[193]  Holger Bock,et al.  Hardware-secured and transparent multi-stakeholder data exchange for industrial IoT , 2016, 2016 IEEE 14th International Conference on Industrial Informatics (INDIN).

[194]  Chien-Ming Chen,et al.  Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments , 2019, IEEE Access.

[195]  Meriem SMACHE,et al.  Autonomous Detection of Synchronization Attacks in the Industrial Internet Of Things , 2019, 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC).

[196]  Vladimir Sklyar,et al.  ENISA Documents in Cybersecurity Assurance for Industry 4.0: IIoT Threats and Attacks Scenarios , 2019, 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).

[197]  Wouter Joosen,et al.  Data Protection Compliance Regulations and Implications for Smart Factories of the Future , 2016, 2016 12th International Conference on Intelligent Environments (IE).

[198]  Srinivasan Seshan,et al.  Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things , 2015, HotNets.

[199]  Wouter Joosen,et al.  Identity management for cyber-physical production workflows and individualized manufacturing in industry 4.0 , 2017, SAC.

[200]  Yevgeniy Vorobeychik,et al.  Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening , 2018, 2018 IEEE International Conference on Industrial Internet (ICII).

[201]  Shilin Wen,et al.  Blockchain-Enabled Data Collection and Sharing for Industrial IoT With Deep Reinforcement Learning , 2019, IEEE Transactions on Industrial Informatics.

[202]  Luying Zhou,et al.  Anomaly Detection Methods for IIoT Networks , 2018, 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI).

[203]  Georg Sigl,et al.  Network Scanning and Mapping for IIoT Edge Node Device Security , 2019, 2019 International Conference on Applied Electronics (AE).

[204]  Robert H. Deng,et al.  Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things , 2019, IEEE Internet of Things Journal.

[205]  Didier Stricker,et al.  Addressing security challenges in industrial augmented reality systems , 2017, 2017 IEEE 15th International Conference on Industrial Informatics (INDIN).

[206]  Julian Schütte,et al.  LUCON: Data Flow Control for Message-Based IoT Systems , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[207]  Andreas Mauthe,et al.  Towards a Security Cost Model for Cyber-Physical Systems , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[208]  Yousung Kang,et al.  Abnormal Traffic Detection Mechanism for Protecting IIoT Environments , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).

[209]  Elena Sitnikova,et al.  Industrial Internet of Things Based Ransomware Detection using Stacked Variational Neural Network , 2019, BDIOT 2019.

[210]  Hussein T. Mouftah,et al.  Cloud-Centric Collaborative Security Service Placement for Advanced Metering Infrastructures , 2019, IEEE Transactions on Smart Grid.

[211]  Christoph Reich,et al.  Adaption of a Privilege Management Infrastructure (PMI) Approach to Industry 4.0 , 2017, 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).

[212]  Andrea Zanella,et al.  IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices , 2019, IEEE Internet of Things Journal.

[213]  Maxim O. Kalinin,et al.  Prevention of false data injections in smart infrastructures , 2019, 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom).

[214]  Pearl Brereton,et al.  Performing systematic literature reviews in software engineering , 2006, ICSE.

[215]  Zhendong Ma,et al.  Security Viewpoint in a Reference Architecture Model for Cyber-Physical Production Systems , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[216]  Nicola Dragoni,et al.  Combining AntibIoTic with Fog Computing: AntibIoTic 2.0 , 2019, 2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC).

[217]  Karl-Heinz Niemann IT security extensions for PROFINET , 2019, 2019 IEEE 17th International Conference on Industrial Informatics (INDIN).

[218]  Ani Bicaku,et al.  Towards flexible and secure end-to-end communication in industry 4.0 , 2017, 2017 IEEE 15th International Conference on Industrial Informatics (INDIN).

[219]  N. Jazdi,et al.  Cyber physical systems in the context of Industry 4.0 , 2014, 2014 IEEE International Conference on Automation, Quality and Testing, Robotics.

[220]  M. Omair Shafiq,et al.  Analyzing Adversarial Attacks against Deep Learning for Intrusion Detection in IoT Networks , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[221]  Hans Dieter Schotten,et al.  Securing Industrial Wireless Networks: Enhancing SDN with PhySec , 2019, 2019 Conference on Next Generation Computing Applications (NextComp).

[222]  Masaya Yoshikawa,et al.  Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack , 2019, 2019 Cybersecurity and Cyberforensics Conference (CCC).

[223]  Jianying Zhou,et al.  Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things , 2020, IEEE Transactions on Industrial Informatics.

[224]  Xue Liu,et al.  Towards Secure Industrial IoT: Blockchain System With Credit-Based Consensus Mechanism , 2019, IEEE Transactions on Industrial Informatics.

[225]  Mauro Conti,et al.  MimePot: a Model-based Honeypot for Industrial Control Networks , 2019, 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC).

[226]  Andrew P. Martin,et al.  Threat-Based Security Analysis for the Internet of Things , 2014, 2014 International Workshop on Secure Internet of Things.

[227]  Rainer Matischek,et al.  Sneakernet on wheels: Trustworthy NFC-based robot to machine communication , 2017, 2017 IEEE International Conference on RFID Technology & Application (RFID-TA).

[228]  Yi Mu,et al.  Building Redactable Consortium Blockchain for Industrial Internet-of-Things , 2019, IEEE Transactions on Industrial Informatics.

[229]  Mikel Iturbe,et al.  Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments , 2018, 2018 Global Internet of Things Summit (GIoTS).

[230]  Fan Wu,et al.  A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[231]  Sayan Kumar Ray,et al.  Securing RPL routing protocol from blackhole attacks using a trust-based mechanism , 2016, 2016 26th International Telecommunication Networks and Applications Conference (ITNAC).

[232]  Anfeng Liu,et al.  A Unified Trustworthy Environment Establishment Based on Edge Computing in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.

[233]  Reiner Anderl,et al.  Security by Design as an Approach to Design a Secure Industry 4.0-Capable Machine Enabling Online-Trading of Technology Data , 2018, 2018 International Conference on System Science and Engineering (ICSSE).

[234]  Kagermann Henning Recommendations for implementing the strategic initiative INDUSTRIE 4.0 , 2013 .

[235]  Miklós Kozlovszky,et al.  Security Survey of Dedicated IoT Networks in the Unlicensed ISM Bands , 2018, 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI).

[236]  Haipeng Yao,et al.  Hybrid Intrusion Detection System for Edge-Based IIoT Relying on Machine-Learning-Aided Detection , 2019, IEEE Network.

[237]  Joaquim Ferreira,et al.  Self-Sovereign Identity: Use-cases, Technologies, and Challenges for Industrial IoT , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).

[238]  Fan Wu,et al.  A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things , 2018, IEEE Internet of Things Journal.

[239]  Joongheon Kim,et al.  Internet of Things for Smart Manufacturing System: Trust Issues in Resource Allocation , 2018, IEEE Internet of Things Journal.

[240]  C. Bormann,et al.  Simple Keys for Simple Smart Objects , 2012 .

[241]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[242]  Laurent Nana,et al.  A Hybrid Intrusion Detection System in Industry 4.0 Based on ISA95 Standard , 2019, 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA).

[243]  Amin Hassanzadeh,et al.  Towards effective security control assignment in the Industrial Internet of Things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[244]  Anurag Agarwal,et al.  The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.

[245]  Peter Priller,et al.  Case study: From legacy to connectivity migrating industrial devices into the world of smart services , 2014, Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA).