A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities

被引:15
|
作者
Alotaibi, Bandar [1 ]
机构
[1] Univ Tabuk, Dept Informat Technol, Tabuk 47731, Saudi Arabia
关键词
Internet of Things; fog computing; edge computing; Industrial Internet of Things; Industry; 4.0; cyber-physical systems; cybersecurity; CYBER-PHYSICAL SYSTEMS; OF-THE-ART; INTRUSION DETECTION SYSTEMS; ACCESS-CONTROL; AUTHENTICATION PROTOCOL; MALWARE DETECTION; ANOMALY DETECTION; CHANNEL ATTACKS; DDOS MITIGATION; SENSITIVE DATA;
D O I
10.3390/s23177470
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing and production, through the employment of various embedded sensing devices connected by an IoT network, along with a collection of enabling technologies, such as artificial intelligence (AI) and edge/fog computing. One of the unrivaled characteristics of IIoT is the inter-connectivity provided to industries; however, this characteristic might open the door for cyber-criminals to launch various attacks. In fact, one of the major challenges hindering the prevalent adoption of the IIoT paradigm is IoT security. Inevitably, there has been an inevitable increase in research proposals over the last decade to overcome these security concerns. To obtain an overview of this research area, conducting a literature survey of the published research is necessary, eliciting the various security requirements and their considerations. This paper provides a literature survey of IIoT security, focused on the period from 2017 to 2023. We identify IIoT security threats and classify them into three categories, based on the IIoT layer they exploit to launch these attacks. Additionally, we characterize the security requirements that these attacks violate. Finally, we highlight how emerging technologies, such as AI and edge/fog computing, can be adopted to address security concerns and enhance IIoT security.
引用
收藏
页数:49
相关论文
共 50 条
  • [11] Security and Privacy Requirements for the Internet of Things: A Survey
    Alhirabi, Nada
    Rana, Omer
    Perera, Charith
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2021, 2 (01):
  • [12] Green AI for IIoT: Energy Efficient Intelligent Edge Computing for Industrial Internet of Things
    Zhu, Sha
    Ota, Kaoru
    Dong, Mianxiong
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (01): : 79 - 88
  • [13] Trusted computing and advanced security in edge computing and Internet of Things
    Cang, Li Shan
    Al-Dubai, Ahmed
    Song, Houbing
    Mumtaz, Shahid
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06):
  • [14] Meeting the Requirements of Internet of Things: The Promise of Edge Computing
    Hazra, Abhishek
    Kalita, Alakesh
    Gurusamy, Mohan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (05): : 7474 - 7498
  • [15] Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications
    Abosata, Nasr
    Al-Rubaye, Saba
    Inalhan, Gokhan
    Emmanouilidis, Christos
    SENSORS, 2021, 21 (11)
  • [16] Resource Allocation Algorithm in Industrial Internet of Things Based on Edge Computing
    Wei J.-Y.
    Wu J.-J.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2023, 44 (08): : 1072 - 1077and1110
  • [17] Sensor anomaly detection in the industrial internet of things based on edge computing
    Kong, Dequan
    Liu, Desheng
    Zhang, Lei
    He, Lili
    Shi, Qingwu
    Ma, Xiaojun
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2020, 28 (01) : 331 - 346
  • [18] Security in the Internet of Things Supported by Mobile Edge Computing
    He, Daojing
    Chan, Sammy
    Guizani, Mohsen
    IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (08) : 56 - 61
  • [19] Explainable AI-based Intrusion Detection in the Internet of Things
    Siganos, Marios
    Radoglou-Grammatikis, Panagiotis
    Kotsiuba, Igor
    Markakis, Evangelos
    Moscholios, Ioannis
    Goudos, Sotirios
    Sarigiannidis, Panagiotis
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [20] Enabling Industrial Internet of Things by Leveraging Distributed Edge-to-Cloud Computing: Challenges and Opportunities
    Jamil, Mohammad Newaj
    Schelen, Olov
    Monrat, Ahmed Afif
    Andersson, Karl
    IEEE ACCESS, 2024, 12 : 127294 - 127308