2019
DOI: 10.1109/jiot.2019.2903242
|View full text |Cite
|
Sign up to set email alerts
|

Secure Industrial Internet of Things Critical Infrastructure Node Design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(26 citation statements)
references
References 62 publications
0
15
0
Order By: Relevance
“…Topic 8 is related to the development of energy-efficient routing protocols that minimize the transmission power for routing between nodes in IoT networks. For instance, a routing protocol for low-power and lossy networks (RPL), a protocol for low-power and low-loss networks, and corresponding security methods have been developed [242][243][244][245][246][247][248][249][250][251][252][253].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…Topic 8 is related to the development of energy-efficient routing protocols that minimize the transmission power for routing between nodes in IoT networks. For instance, a routing protocol for low-power and lossy networks (RPL), a protocol for low-power and low-loss networks, and corresponding security methods have been developed [242][243][244][245][246][247][248][249][250][251][252][253].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…The wide applicability of the IoT devices allows to technify fields of the industry whose technological maturity has been relatively low. Some of the most relevant examples are associated with oil exploitation and electricity production, both fields directly associated with the national cyberdefence [1,2].…”
Section: Introductionmentioning
confidence: 99%
“…For example, the design of technology and architectural solutions associated with new production techniques has had to consider the possibility of strengthening IoT communications and devices to ensure the availability, integrity, and availability of information deployed on these resources. In these cases, it is necessary to establish methodologies and procedures in charge of establishing countermeasures, safeguards, and continuities that allow for the control of data cybersecurity [1,3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Although they can reflect an enhanced level of security capability due to the fine theoretical and experimental analysis, their applicability and feasibility in real-world IIoT systems await verification by future explorations. The main causes involve the following two aspects: on the one hand, most IIoT devices only have low power and limited system resources, and the security add-ons may decrease their work performance by performing the higher or lower computational costs of security operations [20]; on the other hand, IIoT is usually designed to serve industrial control systems, whose requirements on high availability and reliability may be not completely satisfied because of the inefficient adaption between the original system design and some added security services. Differently, anomaly detection in IIoT systems can be widely regarded as a feasible and effective measure to identify unexpected industrial activities [8,[21][22][23], because it can scarcely affect industrial availabilities and real-time requirements by using the bypass monitoring.…”
Section: Introductionmentioning
confidence: 99%