A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities

被引:15
作者
Alotaibi, Bandar [1 ]
机构
[1] Univ Tabuk, Dept Informat Technol, Tabuk 47731, Saudi Arabia
关键词
Internet of Things; fog computing; edge computing; Industrial Internet of Things; Industry; 4.0; cyber-physical systems; cybersecurity; CYBER-PHYSICAL SYSTEMS; OF-THE-ART; INTRUSION DETECTION SYSTEMS; ACCESS-CONTROL; AUTHENTICATION PROTOCOL; MALWARE DETECTION; ANOMALY DETECTION; CHANNEL ATTACKS; DDOS MITIGATION; SENSITIVE DATA;
D O I
10.3390/s23177470
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing and production, through the employment of various embedded sensing devices connected by an IoT network, along with a collection of enabling technologies, such as artificial intelligence (AI) and edge/fog computing. One of the unrivaled characteristics of IIoT is the inter-connectivity provided to industries; however, this characteristic might open the door for cyber-criminals to launch various attacks. In fact, one of the major challenges hindering the prevalent adoption of the IIoT paradigm is IoT security. Inevitably, there has been an inevitable increase in research proposals over the last decade to overcome these security concerns. To obtain an overview of this research area, conducting a literature survey of the published research is necessary, eliciting the various security requirements and their considerations. This paper provides a literature survey of IIoT security, focused on the period from 2017 to 2023. We identify IIoT security threats and classify them into three categories, based on the IIoT layer they exploit to launch these attacks. Additionally, we characterize the security requirements that these attacks violate. Finally, we highlight how emerging technologies, such as AI and edge/fog computing, can be adopted to address security concerns and enhance IIoT security.
引用
收藏
页数:49
相关论文
共 243 条
  • [1] Aarika K., 2020, PROCEDIA COMPUT SCI, V175, P591, DOI DOI 10.1016/J.PROCS.2020.07.085
  • [2] Deploying Fog Computing in Industrial Internet of Things and Industry 4.0
    Aazam, Mohammad
    Zeadally, Sherali
    Harras, Khaled A.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) : 4674 - 4682
  • [3] A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective
    Abdul-Ghani, Hezam Akram
    Konstantas, Dimitri
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (02)
  • [4] Abdul-Ghani HA, 2018, INT J ADV COMPUT SC, V9, P355
  • [5] Abdullah A, 2019, 2019 2 INT C COMP, DOI [10.1109/cais.2019.8769560, DOI 10.1109/cais.2019.8769560]
  • [6] On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
    Abduvaliyev, Abror
    Pathan, Al-Sakib Khan
    Zhou, Jianying
    Roman, Rodrigo
    Wong, Wai-Choong
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03): : 1223 - 1237
  • [7] Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications
    Abosata, Nasr
    Al-Rubaye, Saba
    Inalhan, Gokhan
    Emmanouilidis, Christos
    [J]. SENSORS, 2021, 21 (11)
  • [8] Web-based Attacks to Discover and Control Local IoT Devices
    Acar, Gunes
    Huang, Danny Yuxing
    Li, Frank
    Narayanan, Arvind
    Feamster, Nick
    [J]. PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18), 2018, : 29 - 35
  • [9] An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks
    Adil, Muhammad
    Almaiah, Mohammed Amin
    Alsayed, Alhuseen Omar
    Almomani, Omar
    [J]. SENSORS, 2020, 20 (08)
  • [10] SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT
    Aghili, Seyed Farhad
    Mala, Hamid
    Kaliyar, Pallavi
    Conti, Mauro
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 621 - 634