2021
DOI: 10.3390/s21113901
|View full text |Cite
|
Sign up to set email alerts
|

Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap

Abstract: Industrial IoT (IIoT) is a novel concept of a fully connected, transparent, automated, and intelligent factory setup improving manufacturing processes and efficiency. To achieve this, existing hierarchical models must transition to a fully connected vertical model. Since IIoT is a novel approach, the environment is susceptible to cyber threat vectors, standardization, and interoperability issues, bridging the gaps at the IT/OT ICS (industrial control systems) level. IIoT M2M communication relies on new communi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
81
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 88 publications
(82 citation statements)
references
References 52 publications
0
81
0
1
Order By: Relevance
“…Dhirani et al [22] discuss various cyberthreats and risks which the Industrial IoT (IIoT/I4.0) is exposed to, regardless of implementing cybersecurity standards and security protocols. IIoT/I4.0 is a fully connected autonomous factory which requires interoperable and universal standards, bringing convergence and mitigating the security gaps that exist between the standards and controls.…”
Section: Sensor Network and Smart/intelligent Sensorsmentioning
confidence: 99%
“…Dhirani et al [22] discuss various cyberthreats and risks which the Industrial IoT (IIoT/I4.0) is exposed to, regardless of implementing cybersecurity standards and security protocols. IIoT/I4.0 is a fully connected autonomous factory which requires interoperable and universal standards, bringing convergence and mitigating the security gaps that exist between the standards and controls.…”
Section: Sensor Network and Smart/intelligent Sensorsmentioning
confidence: 99%
“…This paper is organized as follows: Section 2 discusses related research about the cyber security [7][8][9][10], automation [11][12][13], and asset management [14][15][16][17] for IIoT and OT systems. Section 3 proposes the modeling method and data structure for IIoT systems, and Section 4 designs the asset configuration management method.…”
Section: (C) High Reliability and High Availabilitymentioning
confidence: 99%
“…We investigate the existing studies related to cyber security issues in IIoT and OT systems. The studies are categorized by advanced security taxonomy for machine-tomachine communications [7], cyber threats and standards landscape for IIoT [8], trust management, privacy, authentication, threats and access control [9], and secure locationbased authentication scheme in fog computing environments [10]. In addition, we refer to studies related to automation in IIoT and OT systems below.…”
Section: Related Researchmentioning
confidence: 99%
“…The first three industrial revolutions were brought about by mechanization, electrification, and the use of information systems [ 6 ]. Currently, the introduction of technologies and solutions associated with the Internet of Things (IoT), Cloud Computing, and Cyber-Physical Systems drives the Fourth Industrial Revolution [ 7 ]. These technologies have particular applications in the digitization of manufacturing and logistics processes and current mapping, diagnosis, and analysis of those processes [ 8 ].…”
Section: Introductionmentioning
confidence: 99%