A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities

被引:217
|
作者
Tange, Koen [1 ]
De Donno, Michele [1 ]
Fafoutis, Xenofon [1 ]
Dragoni, Nicola [1 ,2 ]
机构
[1] Tech Univ Denmark, Embedded Syst Engn Sect, DTU Compute, DK-2800 Lyngby, Denmark
[2] Orebro Univ, Ctr Appl Autonomous Sensor Syst, S-70281 Orebro, Sweden
来源
关键词
Internet of Things; Edge computing; Systematics; Tutorials; Industries; Access control; Industrial Internet of Things; cyber-security; security requirements; fog computing; CERTIFICATELESS SIGNATURE SCHEME; INTRUSION DETECTION; ANOMALY DETECTION; STEALTH ATTACKS; ACCESS-CONTROL; IOT DEVICES; BLOCKCHAIN; PRIVACY; FRAMEWORK; COMMUNICATION;
D O I
10.1109/COMST.2020.3011208
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts. Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry 4.0, promises to revolutionize production and manufacturing through the use of large numbers of networked embedded sensing devices, and the combination of emerging computing technologies, such as Fog/Cloud Computing and Artificial Intelligence. The IIoT is characterized by an increased degree of inter-connectivity, which not only creates opportunities for the industries that adopt it, but also for cyber-criminals. Indeed, IoT security currently represents one of the major obstacles that prevent the widespread adoption of IIoT technology. Unsurprisingly, such concerns led to an exponential growth of published research over the last few years. To get an overview of the field, we deem it important to systematically survey the academic literature so far, and distill from it various security requirements as well as their popularity. This paper consists of two contributions: our primary contribution is a systematic review of the literature over the period 2011-2019 on IIoT Security, focusing in particular on the security requirements of the IIoT. Our secondary contribution is a reflection on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIoT.
引用
收藏
页码:2489 / 2520
页数:32
相关论文
共 50 条
  • [1] A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities
    Alotaibi, Bandar
    [J]. SENSORS, 2023, 23 (17)
  • [2] Fog Computing for the Internet of Things: A Survey
    Puliafito, Carlo
    Mingozzi, Enzo
    Longo, Francesco
    Puliafito, Antonio
    Rana, Omer
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (02)
  • [3] A survey on fog computing for the Internet of Things
    Bellavista, Paolo
    Berrocal, Javier
    Corradi, Antonio
    Das, Sajal K.
    Foschini, Luca
    Zanni, Alessandro
    [J]. PERVASIVE AND MOBILE COMPUTING, 2019, 52 : 71 - 99
  • [4] Security Implications of Fog Computing on the Internet of Things
    Butun, Ismail
    Sari, Alparslan
    Osterberg, Patrik
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2019,
  • [5] Fog computing as enabler for the Industrial Internet of Things
    Steiner, W.
    Poledna, S.
    [J]. ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2016, 133 (07): : 310 - 314
  • [6] Data reduction in fog computing and internet of things: A systematic literature survey
    Sadri, Ali Akbar
    Rahmani, Amir Masoud
    Saberikamarposhti, Morteza
    Hosseinzadeh, Mehdi
    [J]. INTERNET OF THINGS, 2022, 20
  • [7] Intelligent Computing Collaboration for the Security of the Fog Internet of Things
    Zhao, Hong
    Sun, Guowei
    Li, Weiheng
    Zuo, Peiliang
    Li, Zhaobin
    Wei, Zhanzhen
    [J]. SYMMETRY-BASEL, 2023, 15 (05):
  • [8] Fog Computing for the Internet of Things: Security and Privacy Issues
    Alrawais, Arwa
    Alhothaily, Abdulrahman
    Hu, Chunqiang
    Cheng, Xiuzhen
    [J]. IEEE INTERNET COMPUTING, 2017, 21 (02) : 34 - 42
  • [9] Components of Fog Computing in an Industrial Internet of Things Context
    Gazis, Vangelis
    Leonardi, Alessandro
    Mathioudakis, Kostas
    Sasloglou, Konstantinos
    Kikiras, Panayotis
    Sudhaakar, Raghuram
    [J]. 2015 12TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING - WORKSHOPS (SECON WORKSHOPS), 2015, : 37 - 42
  • [10] Security and Privacy Requirements for the Internet of Things: A Survey
    Alhirabi, Nada
    Rana, Omer
    Perera, Charith
    [J]. ACM TRANSACTIONS ON INTERNET OF THINGS, 2021, 2 (01):