About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Ahead of Print article ยท Journal article

A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities

From

Department of Applied Mathematics and Computer Science, Technical University of Denmark1

Embedded Systems Engineering, Department of Applied Mathematics and Computer Science, Technical University of Denmark2

Technical University of Denmark3

A key application of the Internet of Things (IoT) paradigm lies within industrial contexts. Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry 4.0, promises to revolutionize production and manufacturing through the use of large numbers of networked embedded sensing devices, and the combination of emerging computing technologies, such as Fog/Cloud Computing and Artificial Intelligence.

The IIoT is characterized by an increased degree of inter-connectivity, which not only creates opportunities for the industries that adopt it, but also for cyber-criminals. Indeed, IoT security currently represents one of the major obstacles that prevent the widespread adoption of IIoT technology. Unsurprisingly, such concerns led to an exponential growth of published research over the last few years.

To get an overview of the field, we deem it important to systematically survey the academic literature so far, and distill from it various security requirements as well as their popularity. This paper consists of two contributions: our primary contribution is a systematic review of the literature over the period 2011-2019 on IIoT Security, focusing in particular on the security requirements of the IIoT.

Our secondary contribution is a reflection on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIoT.

Language: English
Publisher: IEEE
Year: 2020
Pages: 2489-2520
ISSN: 2373745x and 1553877x
Types: Ahead of Print article and Journal article
DOI: 10.1109/COMST.2020.3011208
ORCIDs: 0000-0001-9056-9281 , Fafoutis, Xenofon , Dragoni, Nicola and Tange, Koen Pieter

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis