To Örebro University

oru.seÖrebro University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities
Embedded Systems Engineering Section, Dtu Compute, Technical University of Denmark, Lyngby, Denmark.
Embedded Systems Engineering Section, Dtu Compute, Technical University of Denmark, Lyngby, Denmark.
Embedded Systems Engineering Section, Dtu Compute, Technical University of Denmark, Lyngby, Denmark.ORCID iD: 0000-0002-9871-0013
Örebro University, School of Science and Technology. Embedded Systems Engineering Section, Dtu Compute, Technical University of Denmark, Lyngby, Denmark. (Center for Applied Autonomous Sensor Systems (AASS))ORCID iD: 0000-0001-9575-2990
2020 (English)In: IEEE Communications Surveys and Tutorials, E-ISSN 1553-877X, Vol. 22, no 4, p. 2489-2520Article in journal (Refereed) Published
Abstract [en]

A key application of the Internet of Things (IoT) paradigm lies within industrial contexts. Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry 4.0, promises to revolutionize production and manufacturing through the use of large numbers of networked embedded sensing devices, and the combination of emerging computing technologies, such as Fog/Cloud Computing and Artificial Intelligence. The IIoT is characterized by an increased degree of inter-connectivity, which not only creates opportunities for the industries that adopt it, but also for cyber-criminals. Indeed, IoT security currently represents one of the major obstacles that prevent the widespread adoption of IIoT technology. Unsurprisingly, such concerns led to an exponential growth of published research over the last few years. To get an overview of the field, we deem it important to systematically survey the academic literature so far, and distill from it various security requirements as well as their popularity. This paper consists of two contributions: our primary contribution is a systematic review of the literature over the period 2011-2019 on IIoT Security, focusing in particular on the security requirements of the IIoT. Our secondary contribution is a reflection on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIoT.

Place, publisher, year, edition, pages
IEEE, 2020. Vol. 22, no 4, p. 2489-2520
Keywords [en]
Internet of Things, Edge computing, Systematics, Tutorials, Industries, Access control, Industrial Internet of Things, cyber-security, security requirements, fog computing
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:oru:diva-88386DOI: 10.1109/COMST.2020.3011208ISI: 000593999900013Scopus ID: 2-s2.0-85091841797OAI: oai:DiVA.org:oru-88386DiVA, id: diva2:1515364
Note

Funding Agencies:

European Union (EU) 764785

Poul V. Andersen Fund 

Available from: 2021-01-08 Created: 2021-01-08 Last updated: 2024-04-05Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Dragoni, Nicola

Search in DiVA

By author/editor
Fafoutis, XenofonDragoni, Nicola
By organisation
School of Science and Technology
In the same journal
IEEE Communications Surveys and Tutorials
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 177 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf