oru.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Towards a Systematic Survey of Industrial IoT Security Requirements: Research Method and Quantitative Analysis
Technical University of Denmark, Lyngby, Denmark.
Technical University of Denmark, Lyngby, Denmark.
Technical University of Denmark, Lyngby, Denmark.
Örebro University, School of Science and Technology. (AASS)ORCID iD: 0000-0001-9575-2990
2019 (English)In: Proceedings of the 2019 Workshop on Fog Computing and the IoT (IOT-FOG '19) / [ed] Ramachandran, GS; Ortiz, J, Association for Computing Machinery (ACM), 2019, p. 56-63Conference paper, Published paper (Refereed)
Abstract [en]

Industry 4.0 and, in particular, Industrial Internet of Things (IIoT) represent two of the major automation and data exchange trends of the 21st century, driving a steady increase in the number of smart embedded devices used by industrial applications. However, IoT devices suffer from numerous security flaws, resulting in a number of large scale cyber-attacks. In this light, Fog computing, a relatively new paradigm born from the necessity of bridging the gap between Cloud computing and IoT, can be used as a security solution for the IIoT. To achieve this, the first step is to clearly identify the security requirements of the IIoT that can be subsequently used to design security solutions based on Fog computing. With this in mind, our paper represents a preliminary work towards a systematic literature review of IIoT security requirements. We focus on two key steps of the review: (1) the research method that will be used in the systematic work and (2) a quantitative analysis of the results produced by the study selection process. This lays the necessary foundations to enable the use of Fog computing as a security solution for the IIoT.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2019. p. 56-63
Keywords [en]
Industrial Internet of Things, IIoT, Industry 4.0, Security, Fog Computing, Systematic Literature Review
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:oru:diva-75280DOI: 10.1145/3313150.3313228ISI: 000473542200012Scopus ID: 2-s2.0-85066055366ISBN: 978-1-4503-6698-4 (print)OAI: oai:DiVA.org:oru-75280DiVA, id: diva2:1338784
Conference
2019 Workshop on Fog Computing and the IoT (IoT-Fog 2019), Montreal, Canada, April 15, 2019
Note

Funding Agency:

European Union  764785

Available from: 2019-07-24 Created: 2019-07-24 Last updated: 2019-07-24Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records BETA

Dragoni, Nicola

Search in DiVA

By author/editor
Dragoni, Nicola
By organisation
School of Science and Technology
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 14 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf