The Impact of Edge Computing on the Industrial Internet of Things

被引:0
作者
Sekonya, Nkata [1 ]
Sithungu, Siphesihle [1 ]
机构
[1] Univ Johannesburg, Johannesburg, South Africa
来源
PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS | 2023年
关键词
Industrial Internet Of Things; Edge Computing; Critical Infrastructure; Cybersecurity; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The emergence of the Industrial Internet of Things (IIoT) has improved the management of industrial operations and processes. IIoT involves collecting and processing data from a vast array of sensors deployed across industrial complexes. This enables the measurement of the efficiency of industrial processes, monitoring the health of machinery, optimisation of operations, and response to real-time events. In its application, IIoT underpins the operation of critical infrastructure in sectors including manufacturing and utilities. Maintaining the availability and resilience of critical infrastructure against internal and external threats is essential to minimise disruptions that could have a debilitating effect on a nation's economy. Although internal threats can lead to a critical infrastructure's downtime, external threats through cyberattacks also pose a significant threat. Historical events have demonstrated that the successful disruption of critical infrastructure can lead to the loss of human life, the interruption of necessary economic activities and national security concerns. Therefore, the availability of resilient critical infrastructures is vital to the well-being of a country. In this context, the paper compares the deployment of traditional IIoT to that of edge computing for the storage and processing of data. Traditional IIoT relies on a centralised server for data storage and processing, which is insufficient as IIoT environments cannot tolerate delays in responding to real-time events. Conversely, edge computing allows for data processing at the edge, closer to the data source, which plays a crucial role in enabling IIoT devices to respond to real-time events by reducing decision-making latency. Moreover, the decentralised nature of edge computing reduces the reliance on a centralised server by only sending required data to the cloud for further processing. Although edge computing enhances IIoT deployments, a notable concern is a resultant increase in the attack surface of IIoT environments, which consequently restricts its implementation. Exploratory research is conducted to explore the integration of edge computing into IIoT environments with a focus on improving the management and operation of critical infrastructures. A review of the current literature is performed to identify and discuss security concerns prevalent in edge computing-enabled IIoT environments and proposed mitigation strategies.
引用
收藏
页码:360 / 368
页数:9
相关论文
共 29 条
[1]   An Overview of Fog Computing and Edge Computing Security and Privacy Issues [J].
Alwakeel, Ahmed M. .
SENSORS, 2021, 21 (24)
[2]   Recent Advances in Evolving Computing Paradigms: Cloud, Edge, and Fog Technologies [J].
Angel, Nancy A. ;
Ravindran, Dakshanamoorthy ;
Vincent, P. M. Durai Raj ;
Srinivasan, Kathiravan ;
Hu, Yuh-Chung .
SENSORS, 2022, 22 (01)
[3]  
[Anonymous], 2019, The Industrial Internet of Things Volume G1: Reference Architecture
[4]   Requirements for Testing and Validating the Industrial Internet of Things [J].
Antao, Liliana ;
Pinto, Rui ;
Reis, Joao ;
Goncalves, Gil .
2018 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), 2018, :110-115
[5]   Fog Computing Enabling Industrial Internet of Things: State-of-the-Art and Research Challenges [J].
Basir, Rabeea ;
Qaisar, Saad ;
Ali, Mudassar ;
Aldwairi, Monther ;
Ashraf, Muhammad Ikram ;
Mahmood, Aamir ;
Gidlund, Mikael .
SENSORS, 2019, 19 (21)
[6]  
Bhaiyat H., 2022, Eur. Conf. Cyber Warf. Secur., V21, P46, DOI [10.34190/eccws.21.1.248, DOI 10.34190/ECCWS.21.1.248]
[7]   Fog computing at industrial level, architecture, latency, energy, and security: A review [J].
Caiza, Gustavo ;
Saeterosa, Morelva ;
Onate, William ;
Garcia, Marcelo V. .
HELIYON, 2020, 6 (04)
[8]   An Overview on Edge Computing Research [J].
Cao, Keyan ;
Liu, Yefan ;
Meng, Gongjie ;
Sun, Qimeng .
IEEE ACCESS, 2020, 8 :85714-85728
[9]  
Chalapathi G.S.S., 2021, Fog/edge Comput. for Secur., P293, DOI DOI 10.1007/978-3-030-57328-7_12
[10]  
Gaidarski I., 2021, Studies in Big Data, P381, DOI DOI 10.1007/978-3-030-65722-2_24