A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities
<p>Industry 4.0 utilizes various emerging technologies to improve industrial production.</p> "> Figure 2
<p>These papers (i.e., 243 articles) were carefully chosen to write this survey paper.</p> "> Figure 3
<p>The relationships between CPS, IoT, IIoT, industrial internet, and Industry 4.0.</p> "> Figure 4
<p>The interaction between edge platforms; the upper layer (cloud servers) and the lower layer (edge devices).</p> "> Figure 5
<p>Framework of the three traditional IIoT layers: perception, network, and application.</p> ">
Abstract
:1. Introduction
- The security requirements and challenges encountered in IIoT environments are highlighted.
- Solutions based on AI to these security challenges are thoroughly investigated.
- Opportunities and challenges for the secure deployment of IIoT devices at the edge are presented.
2. Research Methodology
3. IoT/IIoT and Edge/Fog Computing Background
3.1. IoT and IIoT
3.2. Edge and Fog Computing
- System performance enhancement: Data processing can be achieved at the network’s edge, improving the system performance of end devices. Edge platforms can accomplish data processing in milliseconds, reducing the latency and communication bandwidth demand, thus enhancing the system’s performance.
- Data security and privacy protection: Edge and fog computing can reduce privacy and security risks, as they transmit and store data in decentralized devices (i.e., near-end devices), as opposed to cloud platforms, which provide centralized data protection solutions. Additionally, data leakage at centralized cloud servers affects many end devices, compared to data leakage at edge/fog devices, involving only a limited number of devices (i.e., the end devices nearby that obtain services from edge/fog platforms).
- Operational cost reduction: When end devices transfer data directly to the cloud, the operational costs related to migrating data, maintaining good bandwidth, and shortening delays are increased. On the other hand, when edge/fog platforms are utilized, the data migration volume, delay, and bandwidth consumption are decreased, leading to reduced operational costs.
4. Related Work
4.1. IoT Security Surveys
4.2. IIoT Security Surveys
4.3. Edge Computing Security Surveys
4.4. Edge Computing in IIoT Surveys
4.5. Secure IIoT-Edge Deployment
5. IIoT Security Requirements
5.1. CIA Triad
- Confidentiality concerns the protection of information in any form. The methods used to satisfy confidentially include access control, encryption, network isolation, and privacy.
- Integrity aims to provide IIoT entities with consistency, authenticity, and accuracy, and allows for building trust with other entities.
- Availability guarantees that the system operates efficiently at all times. Various methods are used to satisfy availability, such as decentralization and redundancy.
5.2. Authentication
5.3. Access Control and Authorization
5.4. Resilience and Maintainability
5.5. Privacy
5.6. Security Monitoring
5.7. Secure Data Sharing
6. IIoT Attack Categories
6.1. Perception Layer Attacks
6.1.1. Node Capture Attacks
6.1.2. Jamming Attacks
6.1.3. Sleep Deprivation Attacks
6.1.4. Replay Attacks
6.2. Network Layer Attacks
6.2.1. Eavesdropping Attacks
6.2.2. Sybil and ID Cloning Attacks
6.2.3. Wormhole Attacks
6.2.4. Denial of Service (DoS) Attacks
- A selective-forwarding attack is a type of DoS attack. In this attack, the attacker may choose to forward certain packets (e.g., RPL control messages) and drop the rest of the packets to disrupt the route [143]. This attack can have more severe consequences when combined with other attacks, such as sinkhole attacks.
- The intruder launches this attack to lure network entities to believe that it is the sink node (i.e., a node in a network with stronger capabilities than other nodes in the network), to forward network traffic to it. The forwarded traffic is eventually transmitted to the attacker, and might not reach the intended receiver [144].
- This attack can be launched by a malicious node that acts as a hole (a node that forces the other network entities to route the packets to it and drop the forwarded packets), to degrade IIoT network performance [145].
6.2.5. Man in the Middle Attacks
6.3. Application Layer Attacks
6.3.1. Malicious Code Injection Attacks
6.3.2. Cross-Site or Malicious Scripts Attacks
6.3.3. Malware Injection Attacks
6.3.4. Data Distortion Attacks
6.3.5. SQL Injection Attacks
6.3.6. Ransomware Attacks
6.3.7. Side-Channel Attacks
6.3.8. Authorization and Authentication Attacks
7. State-of-the-Art IIoT Secure Deployment on Edge Computing
7.1. Network Layer Security
7.2. Perception Layer Security
7.3. Application Layer Security
8. Opportunities and Future Directions
8.1. Secure Data Sharing
8.2. Security Monitoring
8.3. Authentication and Access Control
8.4. Maintainability and Resilience
9. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
ABC | Artificial Bee Colony |
ACL | Access Control List |
AES | Advanced Encryption Standard |
AI | Artificial Intelligence |
AMI | Advanced Metering Infrastructure |
ANN | Artificial Neural Network |
AP | Access Point |
API | Application Programming Interface |
AT&T | American Telephone and Telegraph |
AUC | Area Under the Curve |
B-LSTM | Bidirectional Long Short-Term Memory |
CC | Cloud Computing |
CFBPNN | Cascade Forward Back-Propagation Neural Network |
CFS | Correlation-based Feature Selection |
CIA | Confidentiality, Integrity, Availability |
CPS | Cyber-Physical System |
CSP | Cloud Service Provider |
CSRF | Cross-Site Request Forgery |
DDoS | Distributed Denial of Service |
DL | Deep Learning |
DNN | Deep Neural Network |
DNS | Domain Name System |
DoS | Denial of Service |
DSI | Device-Side Injection |
DSSS | Direct Sequence Spread Spectrum |
DTW | Dynamic Time Warping |
FDL | Federated Deep Learning |
FHSS | Frequency Hopping Spread Spectrum |
GDE | Global Detection Enactor |
GE | General Electric |
GM | Geometric Mean |
GnuPG | GNU Privacy Guard |
GRU | Gated Recurrent Unit |
HAN | Home Area Network |
HTTP | HyperText Transfer Protocol |
IBM | International Business Machines |
ICS | Industrial Control System |
ICV | Intelligent Connected Vehicles |
IDS | Intrusion Detection System |
IIC | Industrial Internet Consortium |
IIoT | Industrial Internet of Things |
IIRA | Industrial Internet Reference Architecture |
I/O | Input/Output |
IoT | Internet of Things |
IoV | Internet of Vehicles |
IP | Internet Protocol |
IPFS | Interplanetary File System |
IPS | Intrusion Prevention System |
kNN | k-Nearest Neighbors |
LAE | Long short-term memory Autoencoder |
LR | Logistic Regression |
LSTM | Long Short-Term Memory |
MC | Markov Chain |
MCC | Mobile Cloud Computing |
ML | Machine Learning |
MLP | Multi-Layer Perceptron |
NARX | Nonlinear Autoregressive network with eXogenous input |
NFC | Near-field Communication |
OLE | Object Linking and Embedding |
OTA | Over-The-Air |
PEC | Pervasive Edge Computing |
PKI | Public Key Infrastructure |
PLC | Program Logic Controller |
PoV | Proof of Vote |
PSO | Particle Swarm Optimization |
PUF | Physically Unclonable Functions |
RCE | Remote Code Execution |
RFID | Radio Frequency Identification |
RNN | Recurrent Neural Network |
RPL | Routing Protocol for Low-power and lossy networks |
RPT | Requesting Party Token |
RSA | Rivest, Shamir, and Adleman |
RTT | Round Trip Time |
SCADA | Supervisory Control And Data Acquisition |
SDN | Software-Defined Networking |
SQL | Structured Query Language |
SQLI | Structured Query Language Injection |
SPOF | Single Point Of Failure |
SMB | Server Message Block |
SSI | Server-Side Injection |
SSRF | Server-Side Request Forgery |
SVM | Support Vector Machine |
TEE | Trusted Execution Environment |
TPM | Trusted Platform Module |
TTP | Trusted Third Party |
UMA | User-Managed Access |
VCC | Vehicular Cloud Computing |
VNF | Virtual Network Function |
WAF | Web Application Firewall |
Wi-Fi | Wireless Fidelity |
WSN | Wireless Sensor Network |
XGBoost | eXtreme Gradient Boosting |
XML | eXtensible Markup Language |
XSS | Cross-Site Scripting |
References
- Chalapathi, G.S.S.; Chamola, V.; Vaish, A.; Buyya, R. Industrial internet of things (iiot) applications of edge and fog computing: A review and future directions. In Fog/Edge Computing For Security, Privacy, and Applications; Springer: Cham, Switzerland, 2021; pp. 293–325. [Google Scholar]
- Alotaibi, B. Utilizing blockchain to overcome cyber security concerns in the internet of things: A review. IEEE Sens. J. 2019, 19, 10953–10971. [Google Scholar] [CrossRef]
- Shishehgarkhaneh, M.B.; Moehler, R.C.; Moradinia, S.F. Blockchain in the Construction Industry between 2016 and 2022: A Review, Bibliometric, and Network Analysis. Smart Cities 2023, 6, 819–845. [Google Scholar]
- Ahmad, T.; Zhang, D. Using the internet of things in smart energy systems and networks. Sustain. Cities Soc. 2021, 68, 102783. [Google Scholar]
- Tufail, A.; Namoun, A.; Abi Sen, A.A.; Kim, K.H.; Alrehaili, A.; Ali, A. Moisture computing-based internet of vehicles (Iov) architecture for smart cities. Sensors 2021, 21, 3785. [Google Scholar] [CrossRef]
- Sisinni, E.; Saifullah, A.; Han, S.; Jennehag, U.; Gidlund, M. Industrial internet of things: Challenges, opportunities, and directions. IEEE Trans. Ind. Inform. 2018, 14, 4724–4734. [Google Scholar]
- Xu, H.; Yu, W.; Griffith, D.; Golmie, N. A survey on industrial Internet of Things: A cyber-physical systems perspective. IEEE Access 2018, 6, 78238–78259. [Google Scholar] [CrossRef]
- Basir, R.; Qaisar, S.; Ali, M.; Aldwairi, M.; Ashraf, M.I.; Mahmood, A.; Gidlund, M. Fog computing enabling industrial internet of things: State-of-the-art and research challenges. Sensors 2019, 19, 4807. [Google Scholar]
- Stefanescu, D.; Galán-García, P.; Montalvillo, L.; Unzilla, J.; Urbieta, A. Industrial Data Homogenization and Monitoring Scheme with Blockchain Oracles. Smart Cities 2023, 6, 263–290. [Google Scholar]
- Tange, K.; De Donno, M.; Fafoutis, X.; Dragoni, N. A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities. IEEE Commun. Surv. Tutor. 2020, 22, 2489–2520. [Google Scholar]
- Daugherty, P.; Berthon, B. Winning with the Industrial Internet of Things: How to Accelerate the Journey to Productivity and Growth; Accenture: Dublín, Ireland, 2015. [Google Scholar]
- Rabbani, M.M.; Dushku, E.; Vliegen, J.; Braeken, A.; Dragoni, N.; Mentens, N. Reserve: Remote attestation of intermittent iot devices. In Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, 15–17 November 2021; pp. 578–580. [Google Scholar]
- Fernández-Carrasco, J.Á.; Echeberria-Barrio, X.; Paredes-García, D.; Zola, F.; Orduna-Urrutia, R. ChronoEOS 2.0: Device Fingerprinting and EOSIO Blockchain Technology for On-Running Forensic Analysis in an IoT Environment. Smart Cities 2023, 6, 897–912. [Google Scholar] [CrossRef]
- Xenofontos, C.; Zografopoulos, I.; Konstantinou, C.; Jolfaei, A.; Khan, M.K.; Choo, K.K.R. Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies. IEEE Internet Things J. 2021, 9, 199–221. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Friha, O.; Hamouda, D.; Maglaras, L.; Janicke, H. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 2022, 10, 40281–40306. [Google Scholar] [CrossRef]
- Botta, A.; De Donato, W.; Persico, V.; Pescapé, A. Integration of cloud computing and internet of things: A survey. Future Gener. Comput. Syst. 2016, 56, 684–700. [Google Scholar] [CrossRef]
- Díaz, M.; Martín, C.; Rubio, B. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing. J. Netw. Comput. Appl. 2016, 67, 99–117. [Google Scholar] [CrossRef]
- Javadzadeh, G.; Rahmani, A.M. Fog computing applications in smart cities: A systematic survey. Wirel. Netw. 2020, 26, 1433–1457. [Google Scholar] [CrossRef]
- Hussain, M.M.; Beg, M.S. Fog computing for internet of things (IoT)-aided smart grid architectures. Big Data Cogn. Comput. 2019, 3, 8. [Google Scholar] [CrossRef]
- Alzoubi, Y.I.; Osmanaj, V.H.; Jaradat, A.; Al-Ahmad, A. Fog computing security and privacy for the Internet of Thing applications: State-of-the-art. Secur. Priv. 2021, 4, e145. [Google Scholar] [CrossRef]
- Qiu, T.; Chi, J.; Zhou, X.; Ning, Z.; Atiquzzaman, M.; Wu, D.O. Edge computing in industrial internet of things: Architecture, advances and challenges. IEEE Commun. Surv. Tutor. 2020, 22, 2462–2488. [Google Scholar] [CrossRef]
- Touqeer, H.; Zaman, S.; Amin, R.; Hussain, M.; Al-Turjman, F.; Bilal, M. Smart home security: Challenges, issues and solutions at different IoT layers. J. Supercomput. 2021, 77, 14053–14089. [Google Scholar] [CrossRef]
- Hazra, A.; Adhikari, M.; Amgoth, T.; Srirama, S.N. A comprehensive survey on interoperability for IIoT: Taxonomy, standards, and future directions. ACM Comput. Surv. 2021, 55, 1–35. [Google Scholar] [CrossRef]
- Alguliyev, R.; Imamverdiyev, Y.; Sukhostat, L. Cyber-physical systems and their security issues. Comput. Ind. 2018, 100, 212–223. [Google Scholar] [CrossRef]
- Ortiz, A.M.; Hussein, D.; Park, S.; Han, S.N.; Crespi, N. The cluster between internet of things and social networks: Review and research challenges. IEEE Internet Things J. 2014, 1, 206–215. [Google Scholar] [CrossRef]
- Pivoto, D.G.; de Almeida, L.F.; da Rosa Righi, R.; Rodrigues, J.J.; Lugli, A.B.; Alberti, A.M. Cyber-physical systems architectures for industrial internet of things applications in Industry 4.0: A literature review. J. Manuf. Syst. 2021, 58, 176–192. [Google Scholar] [CrossRef]
- Nunes, D.S.; Zhang, P.; Silva, J.S. A survey on human-in-the-loop applications towards an internet of all. IEEE Commun. Surv. Tutor. 2015, 17, 944–965. [Google Scholar] [CrossRef]
- Stojmenovic, I. Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyber-physical systems. IEEE Internet Things J. 2014, 1, 122–128. [Google Scholar] [CrossRef]
- Dai, Y.; Guan, Y.L.; Leung, K.K.; Zhang, Y. Reconfigurable intelligent surface for low-latency edge computing in 6G. IEEE Wirel. Commun. 2021, 28, 72–79. [Google Scholar] [CrossRef]
- Gasmi, K.; Dilek, S.; Tosun, S.; Ozdemir, S. A survey on computation offloading and service placement in fog computing-based IoT. J. Supercomput. 2022, 78, 1983–2014. [Google Scholar] [CrossRef]
- Sofla, M.S.; Kashani, M.H.; Mahdipour, E.; Mirzaee, R.F. Towards effective offloading mechanisms in fog computing. Multimed. Tools Appl. 2022, 81, 1997. [Google Scholar] [CrossRef]
- Meneghello, F.; Calore, M.; Zucchetto, D.; Polese, M.; Zanella, A. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 2019, 6, 8182–8201. [Google Scholar] [CrossRef]
- Neshenko, N.; Bou-Harb, E.; Crichigno, J.; Kaddoum, G.; Ghani, N. Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations. IEEE Commun. Surv. Tutor. 2019, 21, 2702–2733. [Google Scholar] [CrossRef]
- Kouicem, D.E.; Bouabdallah, A.; Lakhlef, H. Internet of things security: A top-down survey. Comp. Netw. 2018, 141, 199–221. [Google Scholar] [CrossRef]
- Lezzi, M.; Lazoi, M.; Corallo, A. Cybersecurity for Industry 4.0 in the current literature: A reference framework. Comp. Ind. 2018, 103, 97–110. [Google Scholar] [CrossRef]
- Hofer, F. Architecture, technologies and challenges for cyber-physical systems in industry 4.0: A systematic mapping study. In Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, New Orleans, LA, USA, 26–27 October 2018; pp. 1–10. [Google Scholar]
- Hansch, G.; Schneider, P.; Fischer, K.; Böttinger, K. A unified architecture for industrial IoT security requirements in open platform communications. In Proceedings of the 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Zaragoza, Spain, 10–13 September 2019; pp. 325–332. [Google Scholar]
- Sadeghi, A.R.; Wachsmann, C.; Waidner, M. Security and privacy challenges in industrial Internet of things. In Proceedings of the 52nd Annual Design Automation Conference, San Fransisco, CA, USA, 7–11 June 2015; pp. 1–6. [Google Scholar]
- Sajid, A.; Abbas, H.; Saleem, K. Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access 2016, 4, 1375–1384. [Google Scholar] [CrossRef]
- Tan, S.F.; Samsudin, A. Recent technologies, security countermeasure and ongoing challenges of Industrial Internet of Things (IIoT): A survey. Sensors 2021, 21, 6647. [Google Scholar] [CrossRef] [PubMed]
- Serror, M.; Hack, S.; Henze, M.; Schuba, M.; Wehrle, K. Challenges and opportunities in securing the industrial internet of things. IEEE Trans. Ind. Inform. 2020, 17, 2985–2996. [Google Scholar] [CrossRef]
- Jayalaxmi, P.; Saha, R.; Kumar, G.; Kumar, N.; Kim, T.H. A taxonomy of security issues in Industrial Internet-of-Things: Scoping review for existing solutions, future implications, and research challenges. IEEE Access 2021, 9, 25344–25359. [Google Scholar] [CrossRef]
- Ni, J.; Lin, X.; Shen, X.S. Toward edge-assisted Internet of Things: From security and efficiency perspectives. IEEE Netw. 2019, 33, 50–57. [Google Scholar] [CrossRef]
- Guan, Y.; Shao, J.; Wei, G.; Xie, M. Data security and privacy in fog computing. IEEE Netw. 2018, 32, 106–111. [Google Scholar] [CrossRef]
- Zhang, J.; Chen, B.; Zhao, Y.; Cheng, X.; Hu, F. Data security and privacy-preserving in edge computing paradigm: Survey and open issues. IEEE Access 2018, 6, 18209–18237. [Google Scholar] [CrossRef]
- Georgakopoulos, D.; Jayaraman, P.P.; Fazia, M.; Villari, M.; Ranjan, R. Internet of Things and edge cloud computing roadmap for manufacturing. IEEE Cloud Comp. 2016, 3, 66–73. [Google Scholar] [CrossRef]
- Seitz, A.; Buchinger, D.; Bruegge, B. The conjunction of fog computing and the industrial Internet of things-an applied approach. In Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Athens, Greece, 19–23 March 2018; pp. 812–817. [Google Scholar]
- Sittón-Candanedo, I.; Alonso, R.S.; Rodríguez-González, S.; García Coria, J.A.; De La Prieta, F. Edge computing architectures in industry 4.0: A general survey and comparison. In Proceedings of the 14th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2019), Seville, Spain, 13–15 May 2019; Springer International Publishing: Berlin/Heidelberg, Germany, 2020; pp. 121–131. [Google Scholar]
- Steiner, W.; Poledna, S. Fog computing as enabler for the Industrial Internet of Things. Elektrotechnik Informationstechnik 2016, 133, 310–314. [Google Scholar] [CrossRef]
- Aazam, M.; Zeadally, S.; Harras, K.A. Deploying fog computing in industrial Internet of things and industry 4.0. IEEE Trans. Ind. Inform. 2018, 14, 4674–4682. [Google Scholar] [CrossRef]
- Hassanzadeh, A.; Modi, S.; Mulchandani, S. Towards effective security control assignment in the Industrial Internet of Things. In Proceedings of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, 14–16 December 2015; pp. 795–800. [Google Scholar]
- Ferrag, M.A.; Maglaras, L.A.; Janicke, H.; Jiang, J.; Shu, L. Authentication protocols for Internet of things: A comprehensive survey. Secur. Commun. Netw. 2017, 2017, 6562953. [Google Scholar] [CrossRef]
- Pereira, T.; Barreto, L.; Amaral, A. Network and information security challenges within Industry 4.0 paradigm. Procedia Manuf. 2017, 13, 1253–1260. [Google Scholar] [CrossRef]
- Khurshid, A.; Khan, A.N.; Khan, F.G.; Ali, M.; Shuja, J.; Khan, A.U.R. Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs. Concurr. Comput. Pract. Exp. 2019, 31, e4729. [Google Scholar] [CrossRef]
- Dammak, M.; Boudia, O.R.M.; Messous, M.A.; Senouci, S.M.; Gransart, C. Token-based lightweight authentication to secure IoT networks. In Proceedings of the 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2019; pp. 1–4. [Google Scholar]
- Wang, F.; Cui, J.; Zhang, Q.; He, D.; Gu, C.; Zhong, H. Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things. IEEE Trans. Dependable Secur. Comput. 2023, PrePrints. [Google Scholar] [CrossRef]
- Falco, G.; Caldera, C.; Shrobe, H. IIoT cybersecurity risk modeling for SCADA systems. IEEE Internet Things J. 2018, 5, 4486–4495. [Google Scholar] [CrossRef]
- Riad, K.; Hamza, R.; Yan, H. Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access 2019, 7, 86384–86393. [Google Scholar] [CrossRef]
- Stallings, W.; Brown, L. Computer Security Principles and Practice, 3rd ed.; Pearson: Upper Saddle River, NJ, USA, 2015. [Google Scholar]
- Machulak, M.; Richer, J.; Maler, E. User-Managed Access (UMA) 2.0 Grant for OAuth 2.0 Authorization; Kantara Initiative: Richmond, VA, USA, 2018. [Google Scholar]
- Ragothaman, K.; Wang, Y.; Rimal, B.; Lawrence, M. Access control for IoT: A survey of existing research, dynamic policies and future directions. Sensors 2023, 23, 1805. [Google Scholar] [CrossRef]
- Dwivedi, S.K.; Amin, R.; Vollala, S. Smart contract and ipfs-based trustworthy secure data storage and device authentication scheme in fog computing environment. Peer–Peer Netw. Appl. 2023, 16, 1–21. [Google Scholar] [CrossRef]
- Hameed, S.; Khan, F.I.; Hameed, B. Understanding security requirements and challenges in Internet of Things (IoT): A review. J. Comput. Netw. Commun. 2019, 2019, 9629381. [Google Scholar] [CrossRef]
- Wu, H.; Miao, Y.; Zhang, P.; Tian, Y.; Tian, H. Resilience in Industrial Internet of Things Systems: A Communication Perspective. arXiv 2022, arXiv:2206.00217. [Google Scholar]
- Laszka, A.; Abbas, W.; Vorobeychik, Y.; Koutsoukos, X. Synergistic security for the industrial internet of things: Integrating redundancy, diversity, and hardening. In Proceedings of the 2018 IEEE International Conference on Industrial Internet (ICII), Seattle, WA, USA, 21–23 October 2018; pp. 153–158. [Google Scholar]
- Zhou, L.; Guo, H. Anomaly detection methods for IIoT networks. In Proceedings of the 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singpapore, 31 July–2 August 2018; pp. 214–219. [Google Scholar]
- Zhao, Y.; Liu, Y.; Tian, A.; Yu, Y.; Du, X. Blockchain based privacy-preserving software updates with proof-of-delivery for internet of things. J. Parallel Distrib. Comput. 2019, 132, 141–149. [Google Scholar] [CrossRef]
- Bakhshi, Z.; Balador, A.; Mustafa, J. Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Barcelona, Spain, 15–18 April 2018; pp. 173–178. [Google Scholar]
- Solangi, Z.A.; Solangi, Y.A.; Chandio, S.; bin Hamzah, M.S.; Shah, A. The future of data privacy and security concerns in Internet of Things. In Proceedings of the 2018 IEEE International Conference on Innovative Research and Development (ICIRD), Bangkok, Thailand, 11–12 May 2018; pp. 1–4. [Google Scholar]
- Khan, W.Z.; Aalsalem, M.Y.; Khan, M.K. Communal acts of IoT consumers: A potential threat to security and privacy. IEEE Trans. Consum. Electron. 2018, 65, 64–72. [Google Scholar] [CrossRef]
- Niu, S.; Hu, Y.; Su, Y.; Yan, S.; Zhou, S. Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things. J. Syst. Archit. 2023, 139, 102889. [Google Scholar] [CrossRef]
- Zhou, L.; Yeh, K.H.; Hancke, G.; Liu, Z.; Su, C. Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints. IEEE Signal Process. Mag. 2018, 35, 76–87. [Google Scholar] [CrossRef]
- Settanni, G.; Skopik, F.; Karaj, A.; Wurzenberger, M.; Fiedler, R. Protecting cyber physical production systems using anomaly detection to enable self-adaptation. In Proceedings of the 2018 IEEE Industrial Cyber-Physical Systems (ICPS), Saint Petersburg, Russia, 15–18 May 2018; pp. 173–180. [Google Scholar]
- Zolanvari, M.; Teixeira, M.A.; Jain, R. Effect of imbalanced datasets on security of industrial IoT using machine learning. In Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), Miami, FL, USA, 9–11 November 2018; pp. 112–117. [Google Scholar]
- Zugasti, E.; Iturbe, M.; Garitano, I.; Zurutuza, U. Null is not always empty: Monitoring the null space for field-level anomaly detection in industrial IoT environments. In Proceedings of the 2018 Global Internet of Things Summit (GIoTS), Bilbao, Spain, 4–7 June 2018; pp. 1–6. [Google Scholar]
- Elrawy, M.F.; Awad, A.I.; Hamed, H.F. Intrusion detection systems for IoT-based smart environments: A survey. J. Cloud Comput. 2018, 7, 21. [Google Scholar] [CrossRef]
- Rubio-Loyola, J.; Sala, D.; Ali, A.I. Accurate real-time monitoring of bottlenecks and performance of packet trace collection. In Proceedings of the 2008 33rd IEEE Conference on Local Computer Networks (LCN), Montreal, AB, Canada, 14–17 October 2018; pp. 884–891. [Google Scholar]
- Rubio-Loyola, J.; Sala, D.; Ali, A.I. Maximizing packet loss monitoring accuracy for reliable trace collections. In Proceedings of the 2008 16th IEEE Workshop on Local and Metropolitan Area Networks, Transylvania, Romania, 3–6 September 2008; pp. 61–66. [Google Scholar]
- Ghorbani, A.A.; Lu, W.; Tavallaee, M. Network Intrusion Detection and Prevention; Advances in Information Security; Springer: New York, NY, USA, 2010; 223p. [Google Scholar]
- Anwar, S.; Mohamad Zain, J.; Zolkipli, M.F.; Inayat, Z.; Khan, S.; Anthony, B.; Chang, V. From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions. Algorithms 2017, 10, 39. [Google Scholar] [CrossRef]
- Bul’ajoul, W.; James, A.; Pannu, M. Improving network intrusion detection system performance through quality of service configuration and parallel technology. J. Comput. Syst. Sci. 2015, 81, 981–999. [Google Scholar] [CrossRef]
- Meng, W.; Li, W.; Kwok, L.F. EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comp. Secur. 2014, 43, 189–204. [Google Scholar] [CrossRef]
- Abduvaliyev, A.; Pathan, A.S.K.; Zhou, J.; Roman, R.; Wong, W.C. On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 2013, 15, 1223–1237. [Google Scholar] [CrossRef]
- Nisioti, A.; Mylonas, A.; Yoo, P.D.; Katos, V. From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods. IEEE Commun. Surv. Tutor. 2018, 20, 3369–3388. [Google Scholar] [CrossRef]
- Bhuyan, M.H.; Bhattacharyya, D.K.; Kalita, J.K. Network anomaly detection: Methods, systems and tools. IEEE Commun. Surv. Tutor. 2013, 16, 303–336. [Google Scholar] [CrossRef]
- Hong, J.; Liu, C.C.; Govindarasu, M. Integrated anomaly detection for cyber security of the substations. IEEE Trans. Smart Grid 2014, 5, 1643–1653. [Google Scholar] [CrossRef]
- Mishra, P.; Pilli, E.S.; Varadharajan, V.; Tupakula, U. Intrusion detection techniques in cloud environment: A survey. J. Netw. Comput. Appl. 2017, 77, 18–47. [Google Scholar]
- Javeed, D.; Gao, T.; Saeed, M.S.; Khan, M.T. FOG-empowered Augmented Intelligence-based Proactive Defensive Mechanism for IoT-enabled Smart Industries. IEEE Internet Things J. 2023. preprint. [Google Scholar] [CrossRef]
- Lesjak, C.; Ruprechter, T.; Bock, H.; Haid, J.; Brenner, E. ESTADO—Enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online. In Proceedings of the 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, UK, 8–10 December 2014; pp. 171–177. [Google Scholar]
- Autenrieth, P.; Lörcher, C.; Pfeiffer, C.; Winkens, T.; Martin, L. Current significance of IT-infrastructure enabling industry 4.0 in large companies. In Proceedings of the 2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC), Stuttgart, Germany, 17–20 June 2018; pp. 1–8. [Google Scholar]
- Jazdi, N. Cyber physical systems in the context of Industry 4.0. In Proceedings of the 2014 IEEE International Conference on Automation, Quality and Testing, Robotics, Cluj-Napoca, Romania, 22–24 May 2014; pp. 1–4. [Google Scholar]
- Moyne, J.; Mashiro, S.; Gross, D. Determining a security roadmap for the microelectronics industry. In Proceedings of the 2018 29th Annual SEMI Advanced Semiconductor Manufacturing Conference (ASMC), Saratoga Springs, NY, USA, 30 April–3 May 2018; pp. 291–294. [Google Scholar]
- Benias, N.; Markopoulos, A.P. A review on the readiness level and cyber-security challenges in Industry 4.0. In Proceedings of the 2017 South Eastern European Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), Kastoria, Greece, 23–25 September 2017; pp. 1–5. [Google Scholar]
- Drias, Z.; Serhrouchni, A.; Vogel, O. Analysis of cyber security for industrial control systems. In Proceedings of the 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), Shanghai, China, 5–7 August 2015; pp. 1–8. [Google Scholar]
- Oztemel, E.; Gursev, S. Literature review of Industry 4.0 and related technologies. J. Intell. Manuf. 2020, 31, 127–182. [Google Scholar]
- Zhou, K.; Liu, T.; Zhou, L. Industry 4.0: Towards future industrial opportunities and challenges. In Proceedings of the 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Zhangjiajie, China, 15–17 August 2015; pp. 2147–2152. [Google Scholar]
- Putra, F.A.; Ramli, K.; Hayati, N.; Gunawan, T.S. PURA-SCIS protocol: A novel solution for cloud-based information sharing protection for sectoral organizations. Symmetry 2021, 13, 2347. [Google Scholar] [CrossRef]
- Esposito, C.; Castiglione, A.; Martini, B.; Choo, K.K.R. Cloud manufacturing: Security, privacy, and forensic concerns. IEEE Cloud Comput. 2016, 3, 16–22. [Google Scholar] [CrossRef]
- Abba Ari, A.A.; Ngangmo, O.K.; Titouna, C.; Thiare, O.; Mohamadou, A.; Gueroui, A.M. Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges. Appl. Comput. Inform. 2020. ahead-of-print. [Google Scholar]
- Hosen, A.S.; Sharma, P.K.; Puthal, D.; Ra, I.H.; Cho, G.H. SECBlock-IIoT: A Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things. In Proceedings of the Third International Symposium on Advanced Security on Software and Systems, Melbourne, Australia, 10 July 2023; pp. 1–14. [Google Scholar]
- Abosata, N.; Al-Rubaye, S.; Inalhan, G.; Emmanouilidis, C. Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications. Sensors 2021, 21, 3654. [Google Scholar] [CrossRef]
- Chakrabarty, S.; Engels, D.W.; Thathapudi, S. Black SDN for the Internet of Things. In Proceedings of the 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems, Dallas, TX, USA, 19–22 October 2015; pp. 190–198. [Google Scholar]
- Lakshminarayana, S.; Karachiwala, J.S.; Chang, S.Y.; Revadigar, G.; Kumar, S.L.S.; Yau, D.K.; Hu, Y.C. Signal jamming attacks against communication-based train control: Attack impact and countermeasure. In Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, NY, USA, 22–26 June 2018; pp. 160–171. [Google Scholar]
- Aarika, K.; Bouhlal, M.; Abdelouahid, R.A.; Elfilali, S.; Benlahmar, E. Perception layer security in the internet of things. Procedia Comput. Sci. 2020, 175, 591–596. [Google Scholar] [CrossRef]
- Abdul-Ghani, H.A.; Konstantas, D. A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective. J. Sens. Actuator Netw. 2019, 8, 22. [Google Scholar] [CrossRef]
- Farha, F.; Ning, H.; Yang, S.; Xu, J.; Zhang, W.; Choo, K.K.R. Timestamp scheme to mitigate replay attacks in secure ZigBee networks. IEEE Trans. Mob. Comput. 2020, 21, 342–351. [Google Scholar] [CrossRef]
- Grammatikis, P.I.R.; Sarigiannidis, P.G.; Moscholios, I.D. Securing the Internet of Things: Challenges, threats and solutions. Internet Things 2019, 5, 41–70. [Google Scholar] [CrossRef]
- Hasan, M.K.; Ghazal, T.M.; Saeed, R.A.; Pandey, B.; Gohel, H.; Eshmawi, A.A.; Abdel-Khalek, S.; Alkhassawneh, H.M. A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet-of-Medical-Things. IET Commun. 2022, 16, 421–432. [Google Scholar] [CrossRef]
- Kaliyar, P.; Jaballah, W.B.; Conti, M.; Lal, C. LiDL: Localization with early detection of sybil and wormhole attacks in IoT networks. Comput. Secur. 2020, 94, 101849. [Google Scholar] [CrossRef]
- Patel, M.; Aggarwal, A.; Chaubey, N. Wormhole attacks and countermeasures in wireless sensor networks: A survey. Int. J. Eng. Technol. (IJET) 2017, 9, 1049–1060. [Google Scholar] [CrossRef]
- Djuitcheu, H.; Debes, M.; Aumüller, M.; Seitz, J. Recent review of distributed denial of service attacks in the internet of things. In Proceedings of the 2022 5th Conference on Cloud and Internet of Things (CIoT), Marrakech, Morocco, 28–30 March 2022; pp. 32–39. [Google Scholar]
- Tsiknas, K.; Taketzis, D.; Demertzis, K.; Skianis, C. Cyber threats to industrial IoT: A survey on attacks and countermeasures. IoT 2021, 2, 163–186. [Google Scholar] [CrossRef]
- Sharma, M.; Bhushan, B.; Khamparia, A. Securing Internet of Things: Attacks, countermeasures and open challenges. In Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2020; Springer: Singapore, 2021; Volume 1, pp. 873–885. [Google Scholar]
- Sharma, G.; Vidalis, S.; Anand, N.; Menon, C.; Kumar, S. A survey on layer-wise security attacks in IoT: Attacks, countermeasures, and open-issues. Electronics 2021, 10, 2365. [Google Scholar] [CrossRef]
- Butun, I.; Österberg, P.; Song, H. Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures. IEEE Commun. Surv. Tutor. 2019, 22, 616–644. [Google Scholar] [CrossRef]
- Bagga, M.; Thakral, P.; Bagga, T. A Study on IoT: Model, Communication Protocols, Security Hazards & Countermeasures. In Proceedings of the 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC), Solan, India, 20–22 December 2018; pp. 591–598. [Google Scholar]
- Rodríguez, G.E.; Torres, J.G.; Flores, P.; Benavides, D.E. Cross-site scripting (XSS) attacks and mitigation: A survey. Comput. Netw. 2020, 166, 106960. [Google Scholar] [CrossRef]
- Prabhavathy, M.; Umamaheswari, S. Prevention of Runtime Malware Injection Attack in Cloud Using Unsupervised Learning. Intell. Autom. Soft Comput. 2022, 32, 101–114. [Google Scholar] [CrossRef]
- Xing, K.; Srinivasan, S.S.R.; Rivera, M.J.M.; Li, J.; Cheng, X. Attacks and countermeasures in sensor networks: A survey. In Network Security; Springer: Boston, MA, USA, 2010; pp. 251–272. [Google Scholar]
- Halfond, W.G.; Viegas, J.; Orso, A. A classification of SQL-injection attacks and countermeasures. IEEE Int. Symp. Secur. Softw. Eng. 2006, 1, 13–15. [Google Scholar]
- Silva, J.A.H.; López, L.I.B.; Caraguay, Á.L.V.; Hernández-Álvarez, M. A survey on situational awareness of ransomware attacks—Detection and prevention parameters. Remote Sens. 2019, 11, 1168. [Google Scholar] [CrossRef]
- Spreitzer, R.; Moonsamy, V.; Korak, T.; Mangard, S. Systematic classification of side-channel attacks: A case study for mobile devices. IEEE Commun. Surv. Tutor. 2017, 20, 465–488. [Google Scholar] [CrossRef]
- Jesudoss, A.; Subramaniam, N. A survey on authentication attacks and countermeasures in a distributed environment. Indian J. Comput. Sci. Eng. (IJCSE) 2014, 5, 71–77. [Google Scholar]
- Deogirikar, J.; Vidhate, A. Security attacks in IoT: A survey. In Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 10–11 February 2017; pp. 32–37. [Google Scholar]
- Kumar, S.; Sahoo, S.; Mahapatra, A.; Swain, A.K.; Mahapatra, K.K. Security enhancements to system on chip devices for IoT perception layer. In Proceedings of the 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), Bhopal, India, 18–20 December 2017; pp. 151–156. [Google Scholar]
- Ingham, M.; Marchang, J.; Bhowmik, D. IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN. IET Inf. Secur. 2020, 14, 368–379. [Google Scholar] [CrossRef]
- Ahmad, I.; Niazy, M.S.; Ziar, R.A.; Khan, S. Survey on IoT: Security threats and applications. J. Robot. Control. (JRC) 2021, 2, 42–46. [Google Scholar] [CrossRef]
- Kalinin, E.; Belyakov, D.; Bragin, D.; Konev, A. IoT Security Mechanisms in the Example of BLE. Computers 2021, 10, 162. [Google Scholar] [CrossRef]
- Kakkar, L.; Gupta, D.; Saxena, S.; Tanwar, S. IoT architectures and its security: A review. In Proceedings of the Second International Conference on Information Management and Machine Intelligence: ICIMMI, Jaipur, India, 23–24 December 2020; pp. 87–94. [Google Scholar]
- Wallgren, L.; Raza, S.; Voigt, T. Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw. 2013, 9, 794326. [Google Scholar] [CrossRef]
- Shah, Y.; Sengupta, S. A survey on Classification of Cyber-attacks on IoT and IIoT devices. In Proceedings of the 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York City, NY, USA, 28–31 October 2020; pp. 0406–0413. [Google Scholar]
- de Oliveira, G.H.; de Souza Batista, A.; Nogueira, M.; dos Santos, A.L. An access control for IoT based on network community perception and social trust against Sybil attacks. Int. J. Netw. Manag. 2022, 32, e2181. [Google Scholar] [CrossRef]
- Morales-Molina, C.D.; Hernandez-Suarez, A.; Sanchez-Perez, G.; Toscano-Medina, L.K.; Perez-Meana, H.; Olivares-Mercado, J.; Sanchez, V.; Garcia-Villalba, L.J. A dense neural network approach for detecting clone id attacks on the rpl protocol of the iot. Sensors 2021, 21, 3173. [Google Scholar] [CrossRef] [PubMed]
- Pongle, P.; Chavan, G. A survey: Attacks on RPL and 6LoWPAN in IoT. In Proceedings of the 2015 International Conference on Pervasive Computing (ICPC), Pune, India, 8–10 January 2015; pp. 1–6. [Google Scholar]
- Kamaleshwar, T.; Lakshminarayanan, R.; Teekaraman, Y.; Kuppusamy, R.; Radhakrishnan, A. Self-adaptive framework for rectification and detection of black hole and wormhole attacks in 6lowpan. Wirel. Commun. Mob. Comput. 2021, 2021, 1–8. [Google Scholar] [CrossRef]
- Bhosale, S.A.; Sonavane, S.S. Wormhole attack detection system for IoT network: A hybrid approach. Wirel. Pers. Commun. 2022, 124, 1081–1108. [Google Scholar] [CrossRef]
- Adefemi Alimi, K.O.; Ouahada, K.; Abu-Mahfouz, A.M.; Rimer, S.; Alimi, O.A. Refined LSTM based intrusion detection for denial-of-service attack in Internet of Things. J. Sens. Actuator Netw. 2022, 11, 32. [Google Scholar] [CrossRef]
- Jazzar, M.; Hamad, M. An Analysis Study of IoT and DoS Attack Perspective. In Proceedings of the International Conference on Intelligent Cyber-Physical Systems: ICPS 2021, Victoria, BC, Canada, 10–12 May 2022; pp. 127–142. [Google Scholar]
- Narayanan, A.; De Sena, A.S.; Gutierrez-Rojas, D.; Melgarejo, D.C.; Hussain, H.M.; Ullah, M.; Bayhan, S.; Nardelli, P.H. Key advances in pervasive edge computing for industrial internet of things in 5 g and beyond. IEEE Access 2020, 8, 206734–206754. [Google Scholar] [CrossRef]
- Bhardwaj, K.; Miranda, J.C.; Gavrilovska, A. Towards IoT-DDoS Prevention Using Edge Computing. In Proceedings of the USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18), Boston, MA, USA, 10 July 2018. [Google Scholar]
- Zhou, L.; Guo, H.; Deng, G. A fog computing based approach to DDoS mitigation in IIoT systems. Compu. Secur. 2019, 85, 51–62. [Google Scholar] [CrossRef]
- Antonakakis, M.; April, T.; Bailey, M.; Bernhard, M.; Bursztein, E.; Cochran, J.; Durumeric, Z.; Halderman, J.A.; Invernizzi, L.; Kallitsis, M.; et al. Understanding the mirai botnet. In Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, USA, 23 May 2017; pp. 1093–1110. [Google Scholar]
- Ding, J.; Zhang, H.; Guo, Z.; Wu, Y. The DPC-based scheme for detecting selective forwarding in clustered wireless sensor networks. IEEE Access 2021, 9, 20954–20967. [Google Scholar] [CrossRef]
- Ioannou, C.; Vassiliou, V. Network attack classification in IoT using support vector machines. J. Sens. Actuator Netw. 2021, 10, 58. [Google Scholar] [CrossRef]
- Ioulianou, P.P.; Vassilakis, V.G.; Shahandashti, S.F. A trust-based intrusion detection system for RPL networks: Detecting a combination of rank and blackhole attacks. J. Cybersecur. Priv. 2022, 2, 124–153. [Google Scholar] [CrossRef]
- Abdul-Ghani, H.A.; Konstantas, D.; Mahyoub, M. A comprehensive IoT attacks survey based on a building-blocked reference model. Int. J. Adv. Comput. Sci. Appl. 2018, 9, 355–373. [Google Scholar]
- Donta, P.K.; Srirama, S.N.; Amgoth, T.; Annavarapu, C.S.R. Survey on recent advances in IoT application layer protocols and machine learning scope for research directions. Digit. Commun. Netw. 2022, 8, 727–744. [Google Scholar] [CrossRef]
- Al-Hawawreh, M.; Sitnikova, E. Leveraging deep learning models for ransomware detection in the industrial internet of things environment. In Proceedings of the 2019 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 12–14 November 2019; pp. 1–6. [Google Scholar]
- Abdullah, A.; Hamad, R.; Abdulrahman, M.; Moala, H.; Elkhediri, S. CyberSecurity: A review of Internet of things (IoT) security issues, challenges and techniques. In Proceedings of the 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Online, 23–24 December 2019; pp. 1–6. [Google Scholar]
- Acar, G.; Huang, D.Y.; Li, F.; Narayanan, A.; Feamster, N. Web-based attacks to discover and control local IoT devices. In Proceedings of the 2018 Workshop on IoT Security and Privacy, Budapest, Hungary, 20 August 2018; pp. 29–35. [Google Scholar]
- Watson, M.R.; Marnerides, A.K.; Mauthe, A.; Hutchison, D. Malware detection in cloud computing infrastructures. IEEE Trans. Dependable Secur. Comput. 2015, 13, 192–205. [Google Scholar] [CrossRef]
- Barron, C.; Yu, H.; Zhan, J. Cloud computing security case studies and research. In Proceedings of the World Congress on Engineering, London, UK, 3–5 July 2013; Volume 2, Number 2. pp. 1–6. [Google Scholar]
- Xiao, Y.; Jia, Y.; Liu, C.; Cheng, X.; Yu, J.; Lv, W. Edge computing security: State of the art and challenges. Proc. IEEE 2019, 107, 1608–1631. [Google Scholar] [CrossRef]
- Gautam, S.; Malik, A.; Singh, N.; Kumar, S. Recent advances and countermeasures against various attacks in IoT environment. In Proceedings of the 2019 2nd International Conference on Signal Processing and Communication (ICSPC), Coimbatore, India, 29–30 March 2019; pp. 315–319. [Google Scholar]
- Zolanvari, M.; Teixeira, M.A.; Gupta, L.; Khan, K.M.; Jain, R. Machine learning-based network vulnerability analysis of industrial Internet of Things. IEEE Internet Things J. 2019, 6, 6822–6834. [Google Scholar] [CrossRef]
- Humayun, M.; Jhanjhi, N.Z.; Alsayat, A.; Ponnusamy, V. Internet of things and ransomware: Evolution, mitigation and prevention. Egypt. Inform. J. 2021, 22, 105–117. [Google Scholar]
- Xu, Y.; Cui, W.; Peinado, M. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In Proceedings of the 2015 IEEE Symposium on Security and Privacy, San Jose, CA, USA, 17–21 May 2015; pp. 640–656. [Google Scholar]
- Zhang, T.; Zhang, Y.; Lee, R.B. Cloudradar: A real-time side-channel attack detection system in clouds. In Proceedings of the Research in Attacks, Intrusions, and Defenses: 19th International Symposium, RAID, Paris, France, 19–21 September 2016; pp. 118–140. [Google Scholar]
- Lyu, Y.; Mishra, P. A survey of side-channel attacks on caches and countermeasures. J. Hardw. Syst. Secur. 2018, 2, 33–50. [Google Scholar]
- Ansari, M.S.; Alsamhi, S.H.; Qiao, Y.; Ye, Y.; Lee, B. Security of Distributed Intelligence in Edge Computing: Threats and countermeasures. In The Cloud-to-Thing Continuum: Opportunities and Challenges in Cloud, Fog and Edge Computing; Palgrave Macmillan: Cham, Switzerland, 2020; pp. 95–122. [Google Scholar]
- Alkhwaja, I.; Albugami, M.; Alkhwaja, A.; Alghamdi, M.; Abahussain, H.; Alfawaz, F.; Almurayh, A.; Min-Allah, N. Password Cracking with Brute Force Algorithm and Dictionary Attack Using Parallel Programming. Appl. Sci. 2023, 13, 5979. [Google Scholar] [CrossRef]
- Zuin, N.K.; Selvarajah, V. A Case Study: SYN Flood Attack Launched Through Metasploit. In Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021), Bangalore, India, 6–7 August 2021; pp. 520–525. [Google Scholar]
- Qiu, T.; Liu, J.; Si, W.; Wu, D.O. Robustness optimization scheme with multi-population co-evolution for scale-free wireless sensor networks. IEEE/ACM Trans. Netw. 2019, 27, 1028–1042. [Google Scholar] [CrossRef]
- Diro, A.; Chilamkurti, N. Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun. Mag. 2018, 56, 124–130. [Google Scholar] [CrossRef]
- Chekired, D.A.; Khoukhi, L.; Mouftah, H.T. Fog-based distributed intrusion detection system against false metering attacks in smart grid. In Proceedings of the ICC 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
- Huang, H.; Ye, P.; Hu, M.; Wu, J. A multi-point collaborative DDoS defense mechanism for IIoT environment. Digit. Commun. Netw. 2023, 9, 590–601. [Google Scholar]
- Mudassir, M.; Unal, D.; Hammoudeh, M.; Azzedin, F. Detection of botnet attacks against industrial IoT systems by multilayer deep learning approaches. Wirel. Commun. Mob. Comput. 2022, 2022, 2845446. [Google Scholar] [CrossRef]
- Tsogbaatar, E.; Bhuyan, M.H.; Taenaka, Y.; Fall, D.; Gonchigsumlaa, K.; Elmroth, E.; Kadobayashi, Y. DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT. Internet Things 2021, 14, 100391. [Google Scholar]
- Popoola, S.I.; Adebisi, B.; Hammoudeh, M.; Gui, G.; Gacanin, H. Hybrid deep learning for botnet attack detection in the internet-of-things networks. IEEE Internet Things J. 2020, 8, 4944–4956. [Google Scholar]
- Popoola, S.I.; Adebisi, B.; Ande, R.; Hammoudeh, M.; Anoh, K.; Atayero, A.A. smote-drnn: A deep learning algorithm for botnet detection in the internet-of-things networks. Sensors 2021, 21, 2985. [Google Scholar] [CrossRef]
- Jayalaxmi, P.L.S.; Kumar, G.; Saha, R.; Conti, M.; Kim, T.H.; Thomas, R. DeBot: A deep learning-based model for bot detection in industrial internet-of-things. Comput. Electr. Eng. 2022, 102, 108214. [Google Scholar]
- Alani, M.M. BotStop: Packet-based efficient and explainable IoT botnet detection using machine learning. Comput. Commun. 2022, 193, 53–62. [Google Scholar]
- Popoola, S.I.; Ande, R.; Adebisi, B.; Gui, G.; Hammoudeh, M.; Jogunola, O. Federated deep learning for zero-day botnet attack detection in IoT-edge devices. IEEE Internet Things J. 2021, 9, 3930–3944. [Google Scholar]
- Li, J.; Lyu, L.; Liu, X.; Zhang, X.; Lyu, X. FLEAM: A federated learning empowered architecture to mitigate DDoS in industrial IoT. IEEE Trans. Ind. Inform. 2021, 18, 4059–4068. [Google Scholar] [CrossRef]
- Wazid, M.; Reshma Dsouza, P.; Das, A.K.; Bhat, K.V.; Kumar, N.; Rodrigues, J.J. RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment. Int. J. Commun. Syst. 2019, 32, e4024. [Google Scholar]
- Singh, T.; Aksanli, B. Real-time traffic monitoring and SQL injection attack detection for edge networks. In Proceedings of the 15th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Miami Beach, FL, USA, 14–17 May 2019; pp. 29–36. [Google Scholar]
- Yan, Q.; Huang, W.; Luo, X.; Gong, Q.; Yu, F.R. A multi-level DDoS mitigation framework for the industrial Internet of Things. IEEE Commun. Mag. 2018, 56, 30–36. [Google Scholar] [CrossRef]
- Simpson, S.V.; Nagarajan, G. A fuzzy based co-operative blackmailing attack detection scheme for edge computing nodes in MANET-IOT environment. Future Gener. Comput. Syst. 2021, 125, 544–563. [Google Scholar]
- Zaminkar, M.; Fotohi, R. SoS-RPL: Securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism. Wirel. Pers. Commun. 2020, 114, 1287–1312. [Google Scholar] [CrossRef]
- Khan, F.; Jan, M.A.; ur Rehman, A.; Mastorakis, S.; Alazab, M.; Watters, P. A secured and intelligent communication scheme for IIoT-enabled pervasive edge computing. IEEE Trans. Ind. Inform. 2020, 17, 5128–5137. [Google Scholar] [CrossRef] [PubMed]
- Lawal, M.A.; Shaikh, R.A.; Hassan, S.R. An anomaly mitigation framework for iot using fog computing. Electronics 2020, 9, 1565. [Google Scholar] [CrossRef]
- Alharbi, A.; Alosaimi, W.; Alyami, H.; Rauf, H.T.; Damaševičius, R. Botnet attack detection using local global best bat algorithm for industrial internet of things. Electronics 2021, 10, 1341. [Google Scholar] [CrossRef]
- Nguyen, T.N.; Ngo, Q.D.; Nguyen, H.T.; Nguyen, G.L. An advanced computing approach for IoT-botnet detection in industrial Internet of Things. IEEE Trans. Ind. Inform. 2022, 18, 8298–8306. [Google Scholar] [CrossRef]
- Alqahtani, M.; Mathkour, H.; Ben Ismail, M.M. IoT botnet attack detection based on optimized extreme gradient boosting and feature selection. Sensors 2020, 20, 6336. [Google Scholar] [CrossRef]
- Arshad, J.; Abdellatif, M.M.; Khan, M.M.; Azad, M.A. A novel framework for collaborative intrusion detection for m2m networks. In Proceedings of the 2018 9th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 3–5 April 2018; pp. 12–17. [Google Scholar]
- Arshad, J.; Azad, M.A.; Abdeltaif, M.M.; Salah, K. An intrusion detection framework for energy constrained IoT devices. Mech. Syst. Signal Process. 2020, 136, 106436. [Google Scholar]
- Zhang, Y.; Deng, R.H.; Zheng, D.; Li, J.; Wu, P.; Cao, J. Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT. IEEE Trans. Ind. Inform. 2019, 15, 5099–5108. [Google Scholar]
- Qi, S.; Lu, Y.; Wei, W.; Chen, X. Efficient data access control with fine-grained data protection in cloud-assisted IIoT. IEEE Internet Things J. 2020, 8, 2886–2899. [Google Scholar] [CrossRef]
- Tajalli, S.Z.; Mardaneh, M.; Taherian-Fard, E.; Izadian, A.; Kavousi-Fard, A.; Dabbaghjamanesh, M.; Niknam, T. DoS-resilient distributed optimal scheduling in a fog supporting IIoT-based smart microgrid. IEEE Trans. Ind. Appl. 2020, 56, 2968–2977. [Google Scholar] [CrossRef]
- Liu, J.; Yuan, C.; Lai, Y.; Qin, H. Protection of sensitive data in industrial Internet based on three-layer local/fog/cloud storage. Secur. Commun. Netw. 2020, 2020, 2017930. [Google Scholar]
- He, S.; Cheng, B.; Wang, H.; Xiao, X.; Cao, Y.; Chen, J. Data security storage model for fog computing in large-scale IoT application. In Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Honolulu, HI, USA, 15–19 April 2018; pp. 39–44. [Google Scholar]
- Ming, Y.; Yu, X. Efficient privacy-preserving data sharing for fog-assisted vehicular sensor networks. Sensors 2020, 20, 514. [Google Scholar] [CrossRef]
- Xue, K.; Hong, J.; Ma, Y.; Wei, D.S.; Hong, P.; Yu, N. Fog-aided verifiable privacy preserving access control for latency-sensitive data sharing in vehicular cloud computing. IEEE Netw. 2018, 32, 7–13. [Google Scholar] [CrossRef]
- Fan, K.; Wang, J.; Wang, X.; Li, H.; Yang, Y. Secure, efficient and revocable data sharing scheme for vehicular fogs. Peer-to-Peer Netw. Appl. 2018, 11, 766–777. [Google Scholar] [CrossRef]
- Adil, M.; Almaiah, M.A.; Omar Alsayed, A.; Almomani, O. An anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks. Sensors 2020, 20, 2311. [Google Scholar] [CrossRef]
- Bany Salameh, H.; Derbas, R.; Aloqaily, M.; Boukerche, A. Secure routing in multi-hop iot-based cognitive radio networks under jamming attacks. In Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami Beach, FL, USA, 25–29 November 2019; pp. 323–327. [Google Scholar]
- Abhishek, N.V.; Gurusamy, M. Jade: Low power jamming detection using machine learning in vehicular networks. IEEE Wirel. Commun. Lett. 2021, 10, 2210–2214. [Google Scholar] [CrossRef]
- Dovom, E.M.; Azmoodeh, A.; Dehghantanha, A.; Newton, D.E.; Parizi, R.M.; Karimipour, H. Fuzzy pattern tree for edge malware detection and categorization in IoT. J. Syst. Archit. 2019, 97, 1–7. [Google Scholar] [CrossRef]
- Guizani, N.; Ghafoor, A. A network function virtualization system for detecting malware in large IoT based networks. IEEE J. Sel. Areas Commun. 2020, 38, 1218–1228. [Google Scholar] [CrossRef]
- Khoda, M.E.; Kamruzzaman, J.; Gondal, I.; Imam, T.; Rahman, A. Malware detection in edge devices with fuzzy oversampling and dynamic class weighting. Appl. Soft Comput. 2021, 112, 107783. [Google Scholar] [CrossRef]
- Arp, D.; Spreitzenbarth, M.; Hubner, M.; Gascon, H.; Rieck, K.; Siemens, C.E.R.T. Drebin: Effective and Explainable Detection of Android Malware in Your Pocket; NDSS: San Diego, CA, USA, 2014; Volume 14, pp. 23–26. [Google Scholar]
- Allix, K.; Bissyandé, T.F.; Klein, J.; Le Traon, Y. Androzoo: Collecting millions of android apps for the research community. In Proceedings of the 13th International Conference on Mining Software Repositories, Austin, TX, USA, 14–15 May 2016; pp. 468–471. [Google Scholar]
- Alaeiyan, M.; Dehghantanha, A.; Dargahi, T.; Conti, M.; Parsa, S. A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks. ACM Trans. Cyber-Phys. Syst. 2020, 4, 1–22. [Google Scholar] [CrossRef]
- Shen, S.; Huang, L.; Zhou, H.; Yu, S.; Fan, E.; Cao, Q. Multistage signaling game-based optimal detection strategies for suppressing malware diffusion in fog-cloud-based IoT networks. IEEE Internet Things J. 2018, 5, 1043–1054. [Google Scholar] [CrossRef]
- Alhawi, O.M.; Baldwin, J.; Dehghantanha, A. Leveraging machine learning techniques for windows ransomware network traffic detection. In Cyber Threat Intelligence; Springer: Cham, Switzerland, 2018; pp. 93–106. [Google Scholar]
- Azmoodeh, A.; Dehghantanha, A.; Conti, M.; Choo, K.K.R. Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J. Ambient. Intell. Humaniz. Comput. 2018, 9, 1141–1152. [Google Scholar]
- Almashhadani, A.O.; Kaiiali, M.; Sezer, S.; O’Kane, P. A multi-classifier network-based crypto ransomware detection system: A case study of locky ransomware. IEEE Access 2019, 7, 47053–47067. [Google Scholar] [CrossRef]
- Maiorca, D.; Mercaldo, F.; Giacinto, G.; Visaggio, C.A.; Martinelli, F. R-PackDroid: API package-based characterization and detection of mobile ransomware. In Proceedings of the Symposium on Applied Computing, Marrakech, Morocco, 4–6 April 2017; pp. 1718–1723. [Google Scholar]
- Sgandurra, D.; Muñoz-González, L.; Mohsen, R.; Lupu, E.C. Automated dynamic analysis of ransomware: Benefits, limitations and use for detection. arXiv 2016, arXiv:1609.03020. [Google Scholar]
- Tseng, A.; Chen, Y.; Kao, Y.; Lin, T. Deep learning for ransomware detection. IEICE Tech. Rep. 2016, 116, 87–92. [Google Scholar]
- Ogundokun, R.O.; Awotunde, J.B.; Misra, S.; Abikoye, O.C.; Folarin, O. Application of machine learning for ransomware detection in IoT devices. In Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities; Springer International Publishing: Cham, Switzerland, 2021; pp. 393–420. [Google Scholar]
- Al-Hawawreh, M.; Den Hartog, F.; Sitnikova, E. Targeted ransomware: A new cyber threat to edge system of brownfield industrial Internet of Things. IEEE Internet Things J. 2019, 6, 7137–7151. [Google Scholar] [CrossRef]
- Mukherjee, M.; Matam, R.; Shu, L.; Maglaras, L.; Ferrag, M.A.; Choudhury, N.; Kumar, V. Security and privacy in fog computing: Challenges. IEEE Access 2017, 5, 19293–19304. [Google Scholar] [CrossRef]
- Jbair, M.; Ahmad, B.; Mus’ab, H.A.; Harrison, R. Industrial cyber physical systems: A survey for control-engineering tools. In Proceedings of the 2018 IEEE Industrial Cyber-Physical Systems (ICPS), Saint Petersburg, Russia, 15–18 May 2018; pp. 270–276. [Google Scholar]
- Frey, M.; Gündoğan, C.; Kietzmann, P.; Lenders, M.; Petersen, H.; Schmidt, T.C.; Wählisch, M. Security for the industrial IoT: The case for information-centric networking. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019; pp. 424–429. [Google Scholar]
- Fu, J.S.; Liu, Y.; Chao, H.C.; Bhargava, B.K.; Zhang, Z.J. Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans. Ind. Inform. 2018, 14, 4519–4528. [Google Scholar] [CrossRef]
- Xu, P.; He, S.; Wang, W.; Susilo, W.; Jin, H. Lightweight searchable public-key encryption for cloud-assisted wireless sensor networks. IEEE Trans. Ind. Inform. 2017, 14, 3712–3723. [Google Scholar] [CrossRef]
- Schütte, J.; Brost, G.S. LUCON: Data flow control for message-based IoT systems. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 289–299. [Google Scholar]
- Moustafa, N.; Adi, E.; Turnbull, B.; Hu, J. A new threat intelligence scheme for safeguarding industry 4.0 systems. IEEE Access 2018, 6, 32910–32924. [Google Scholar] [CrossRef]
- De Donno, M.; Felipe, J.M.D.; Dragoni, N. ANTIBIOTIC 2.0: A fog-based anti-malware for Internet of Things. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden, 17–19 June 2019; pp. 11–20. [Google Scholar]
- De Donno, M.; Dragoni, N. Combining AntibIoTic with fog computing: AntibIoTic 2.0. In Proceedings of the 2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC), Larnaca, Cyprus, 14–17 May 2019; pp. 1–6. [Google Scholar]
- De Donno, M.; Dragoni, N.; Giaretta, A.; Mazzara, M. AntibIoTic: Protecting IoT devices against DDoS attacks. In Proceedings of the 5th International Conference in Software Engineering for Defence Applications: SEDA 2016, Rome, Italy, 10 May 2018; pp. 59–72. [Google Scholar]
- Eldefrawy, M.H.; Pereira, N.; Gidlund, M. Key distribution protocol for industrial Internet of Things without implicit certificates. IEEE Internet Things J. 2018, 6, 906–917. [Google Scholar] [CrossRef]
- Li, F.; Hong, J.; Omala, A.A. Efficient certificateless access control for industrial Internet of Things. Future Gener. Comput. Syst. 2017, 76, 285–292. [Google Scholar] [CrossRef]
- Cui, H.; Deng, R.H.; Liu, J.K.; Yi, X.; Li, Y. Server-aided attribute-based signature with revocation for resource-constrained industrial-internet-of-things devices. IEEE Trans. Ind. Inform. 2018, 14, 3724–3732. [Google Scholar] [CrossRef]
- Xiong, H.; Bao, Y.; Nie, X.; Asoor, Y.I. Server-aided attribute-based signature supporting expressive access structures for industrial internet of things. IEEE Trans. Ind. Inform. 2019, 16, 1013–1023. [Google Scholar] [CrossRef]
- Bao, Y.; Qiu, W.; Cheng, X. Efficient and fine-grained signature for IIoT with resistance to key exposure. IEEE Internet Things J. 2021, 8, 9189–9205. [Google Scholar] [CrossRef]
- Basic, F.; Gaertner, M.; Steger, C. Towards trustworthy NFC-based sensor readout for battery packs in battery management systems. In Proceedings of the 2021 IEEE International Conference on RFID Technology and Applications (RFID-TA), Delhi, India, 6–8 October 2021; pp. 285–288. [Google Scholar]
- Basic, F.; Laube, C.R.; Steger, C.; Kofler, R. A Novel Secure NFC-based Approach for BMS Monitoring and Diagnostic Readout. In Proceedings of the 2022 IEEE International Conference on RFID (RFID), Las Vegas, NV, USA, 17–19 May 2022; pp. 23–28. [Google Scholar]
- Basic, F.; Gaertner, M.; Steger, C. Secure and Trustworthy NFC-Based Sensor Readout for Battery Packs in Battery Management Systems. IEEE J. Radio Freq. Identif. 2022, 6, 637–648. [Google Scholar] [CrossRef]
- Sharma, G.; Kalra, S. A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications. J. Inf. Secur. Appl. 2018, 42, 95–106. [Google Scholar] [CrossRef]
- Bae, W.I.; Kwak, J. Smart card-based secure authentication protocol in multi-server IoT environment. Multimed. Tools Appl. 2020, 79, 15793–15811. [Google Scholar] [CrossRef]
- Zhou, S.; Gan, Q.; Wang, X. Authentication scheme based on smart card in multi-server environment. Wirel. Netw. 2020, 26, 855–863. [Google Scholar] [CrossRef]
- Liang, W.; Xie, S.; Zhang, D.; Li, X.; Li, K.C. A mutual security authentication method for RFID-PUF circuit based on deep learning. ACM Trans. Internet Technol. (TOIT) 2021, 22, 1–20. [Google Scholar] [CrossRef]
- Aghili, S.F.; Mala, H.; Kaliyar, P.; Conti, M. SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT. Future Gener. Comput. Syst. 2019, 101, 621–634. [Google Scholar] [CrossRef]
- Tewari, A.; Gupta, B.B. Secure timestamp-based mutual authentication protocol for IoT devices using RFID tags. Int. J. Semant. Web Inf. Syst. (IJSWIS) 2020, 16, 20–34. [Google Scholar] [CrossRef]
- Izza, S.; Benssalah, M.; Drouiche, K. An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment. J. Inf. Secur. Appl. 2021, 58, 102705. [Google Scholar] [CrossRef]
- Gope, P.; Amin, R.; Islam, S.H.; Kumar, N.; Bhalla, V.K. Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Gener. Comput. Syst. 2018, 83, 629–637. [Google Scholar] [CrossRef]
- Lipps, C.; Herbst, J.; Schotten, H.D. How to Dance Your Passwords: A Biometric MFA-Scheme for Identification and Authentication of Individuals in IIoT Environments. In Proceedings of the ICCWS 2021 16th International Conference on Cyber Warfare and Security, Online, 25–26 February 2021; p. 168. [Google Scholar]
- Zhao, G.; Zhang, P.; Shen, Y.; Jiang, X. Passive user authentication utilizing behavioral biometrics for IIoT systems. IEEE Internet Things J. 2021, 9, 12783–12798. [Google Scholar] [CrossRef]
- Sarier, N.D. Efficient biometric-based identity management on the Blockchain for smart industrial applications. Pervasive Mob. Comput. 2021, 71, 101322. [Google Scholar] [CrossRef]
- Jayasinghe, U.; Lee, G.M.; MacDermott, Á.; Rhee, W.S. TrustChain: A privacy preserving blockchain with edge computing. Wirel. Commun. Mob. Comput. 2019, 2019, 2014697. [Google Scholar] [CrossRef]
- Huang, B.; Cheng, X.; Cao, Y.; Zhang, L. Lightweight hardware based secure authentication scheme for fog computing. In Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing (SEC), Seattle, WA, USA, 25–27 October 2018; pp. 433–439. [Google Scholar]
Characteristic | IoT | IIoT |
---|---|---|
Application examples | Smart home, health monitoring, indoor localization | Smart transportation, intelligent logistics, smart manufacturing, remote maintenance |
System Framework | Self-reliant | Industrial facility-reliant |
Delay sensitivity | High | Low |
Mobility | High | Low |
Deployment size | Small | Large |
Deployment preciseness | Low | High |
Data volume | Medium | High |
Scope | Ref. | Major Contribution | Advantages | Limitations |
---|---|---|---|---|
IoT security | [32] | A comprehensive overview of IIoT security threats | Attacks perfectly linked to security requirements | The role of emerging technologies in securing IoT networks is not discussed |
[33] | A detailed review of IoT threats and vulnerabilities | A distinctive categorization of IoT vulnerabilities and a discussion of about 100 research ideas | Attacks are not completely linked to security requirements and the the impacts of integrating emerging technologies on IoT security are not discussed | |
[34] | An overview of security requirements for several IoT application domains | Noteworthy security requirement prioritization for each application domain | The depth of the challenges section is minimal | |
IIoT security | [35] | A comprehensive review of cyberattack classes | Outstanding future directions and potential applications are discussed | Cyberattacks are not linked to security requirements and the impact of emerging technology on IIoT security is not discussed |
[6] | A survey of challenges faced by Industry 4.0 environments | A unique overview of challenges related to energy adequacy, interoperability, and security | Security requirements and emerging technologies impact are not discussed | |
[36] | An overview of IIoT security solutions | A unique description of the building and linking of IIoT devices with security in mind | The depth of the survey is minimal | |
[37] | A unified architecture format of security requirements in IIoT | A detailed comparison of security requirements within heterogeneous | The authors discuss a few use cases of IIoT devices | |
[38,39] | A discussion of IIoT security requirements | A comprehensive overview of solutions that deal with security violations | The depth of the review is minimal | |
[40] | An overview of IIoT security, threats, and countermeasures taken by industries | A distinctive categorization of the IIoT, exploration of countermeasures taken by industries utilizing security requirements | Lacks discussion of the role of adopting emerging technologies to protect the IIoT paradigm | |
[41] | An evaluation of emerging IIoT security challenges and investigation of existing countermeasures | An ideal mapping study between challenges and countermeasures is presented | The survey is not comprehensive; it complements existing related work | |
[42] | A review of IIoT security threats and AI and Blockchain-based solutions | A distinctive synopsis outlining the advantages and disadvantages of each solution is introduced | Lacks detailed security threats discussion and enough blockchain and AI background, solutions comparison elements are brief | |
Edge security | [43] | An overview of the IoT Edge paradigm and applications | An investigation of opportunities provided by edge computing to improve IIoT security | The depth of the overview is minimal |
[44] | A thorough discussion of fog computing security and privacy issues | A distinctive observation related to the unsuitability of methods used to secure CC for fog computing is introduced | The depth of the discussion is minimal | |
[45] | A detailed tutorial of the edge computing paradigm | Incandescent solutions to privacy and security are thoroughly discussed | The connection between edge applications, threats targeting them, and security solutions is missing | |
Edge Computing in IIoT | [46] | A roadmap for smart manufacturing to integrate IoT and edge computing | One of the first surveys to discuss this area | Security requirements and challenges are inadequately discussed |
[47] | A demonstration of two scenarios of how IIoT benefits from fog computing | A unique comparison of cloud and fog computing when integrated with IIoT | The overview is scenario-specific (i.e., not comprehensive) | |
[48] | An overview of edge computing reference architectures in IIoT | A comparison of reference architectures is presented | The depth of this overview is minimal | |
[49] | A discussion of the integration of fog computing and IIoT | Two enabling technologies that can add value to the integration are uniquely discussed | This survey is not comprehensive | |
[50] | A review of edge computing and IIoT integration | A discussion of recently proposed solutions, recent challenges and few use cases | The lack of in-depth discussion of security challenges and sufficient application examples | |
[8] | Discussion of the Industrial Revolution background and transformation enabling technologies | A well-organized and thorough discussion of communication and network protocols | The discussion part of edge computing lacks essential details | |
[21] | A review of current solutions related to adopting edge computing into IIoT | Distinctive technical details of some significant edge services that add value to the IIoT paradigm | Security opportunities brought when integrating edge computing into IIoT is partially discussed | |
Secure IIoT-Edge | [10] | A systematic survey of IIoT security from 2011 to 2019 | A thorough discussion of IIoT security challenges, requirements, and opportunities provided when adopting edge computing that could secure IIoT paradigm | The IIoT attacks are not deeply discussed and th depth of the opportunitiese part is not sufficient |
Ours | A thorough categorization of IIoT attacks, security requirements, and security benefits from integrating edge computing and IIoT | A distinctive linkage of IIoT attacks and requirements is introduced and research attempts to overcome security challenges (with a focus on the period 2019–2022) are comprehensively discussed | N/A |
Layer | Attack | Violated Requirements | Common Countermeasures |
---|---|---|---|
Perception | Node Capture | Confidentiality, Authentication | Abolishing information related to secure keys after disassociation [102] |
Jamming | Availability | Increasing interference resistance using techniques such as FHSS [103] and DSSS [104] | |
Sleep Deprivation | Availability | Ensuring security policies are not violated using policy-based IDS [105] | |
Replay | Integrity | Utilizing timestamps and nonces [106] | |
Network | Selective-Forwarding | Availability | Detection and prevention using a combination of IDS and IPS [107] |
Eavesdropping | Confidentiality, Privacy | Employing access control and data encryption techniques [108] | |
Sybil and ID Cloning | Authentication | Applying packet filtering, IDS, and localization techniques [109] | |
Wormhole | Confidentiality, Availability | Deploying secure neighboring discovery techniques and measuring challenge-response and RTT delay [110] | |
Denial of Service | Availability | Utilizing traffic filtering, IDS, and tracking techniques [111] | |
Man in the Middle | Confidentiality, Authentication | Employing light encryption techniques and deploying IDS [112] | |
Sinkhole | Availability | Employing IDS and IPS to detect and prevent this threat [113,114] | |
Black hole | Availability | Utilizing various routing paths and deploying IDS and IPS techniques [115] | |
Application | Malicious Code Injection | Confidentiality, Authentication | Employing private-key cryptography, light public-key encryption, and authentication mechanisms [116] |
Cross-site or Malicious Scripts | Confidentiality, Authentication | Deploying signature-based IDS and content and pattern analysis techniques [117] | |
Malware Injection | Integrity | Deploying IDS, IPS, and malware removal mechanisms [118] | |
Data Distortion | Integrity and secure data sharing | Utilizing access control, encryption, and recovery [119] such as backup mechanisms | |
SQL Injection | Confidentiality, integrity | Utilizing parameterized statements, IDS, access control, and encryption techniques [120] | |
Ransomware | Confidentiality, Authentication | Employing traffic filtering, IDS, IPS, and encryption techniques [121] | |
Side-channel | Confidentiality | Protection of cryptography techniques, preventing traffic analysis, and enforcing strict access control policies [122] | |
Authorization and Authentication | Authentication and access control | Using access control and authentication techniques [123] |
Scope | Ref. | Algorithm | Resolved Issue | Security Requirement | Dataset | Performance Metrics |
---|---|---|---|---|---|---|
Deep learning-based IDSs | [164] | LSTM | DoS attacks | Availability | ISCX, AWID | 98.22% accuracy on AWID, 99.91% on ISCX |
[165] | Stochastic MC | false injection | Confidentiality, integrity | Custom | NA | |
[166] | LSTM and 1D CNN | DDoS | Availability | DoS2019 | 1D-CNN: 99.3% precision, 98.9% recall, 99.1% F1 score | |
[167] | ANN, RNN-LSTM, RNN-GRU | botnet attacks | Availability | BotIoT | ANN: 99% accuracy, RNN : 98% accuracy | |
[168] | Stacked deep autoencoders | botnet attacks | Availability | N-BaIoT | 3% improvement | |
[169] | LAE and B-LSTM | botnet attacks | Availability | BotIoT | 93.17% (binary), 97.29% (multiclass) | |
[170] | RNN | botnet attacks | Availability | BotIoT | 99.75% recall, 99.62% precision and F1 score | |
[171] | CFBPNN | botnet attacks | Availability | 5 datasets | 100% accuracy | |
[172] | Custom algorithm | botnet attacks | Availability | N-BaIoT | 99.76% accuracy, 99.68% F1 score, 0.2250 testing time | |
[173] | Federated DL | zero-day botnet | Availability | Bot-IoT, N-BaIoT | 99.79% accuracy, 99.51% precision, 96.27% recall, 97.68% F1 score 99.00% accuracy, 96.87% precision, 97.24% recall, 96.88% F1 score | |
[174] | Federated DL | DDoS attacks | Availability | UNSW NB-15 | 98% accuracy | |
Signature-based IDSs | [175] | Custom algorithm | routing attacks | Availability | NS2 | 95.0% detection rate, 1.23% FPR e |
[176] | Custom algorithm | SQL injection | Confidentiality, integrity | Custom | 4.7× improvement | |
[177] | Custom algorithm | DDoS attacks | Availability | Custom | Not reported | |
[141] | Custom algorithm | DDoS attacks | Availability | Custom | Up to 99.84% detection rate, as low as 129 ms testing time | |
[140] | Custom algorithm | DDoS attacks | Availability | Custom | Reduced the damaging impact by 82% | |
[178] | Fuzzy logic | Black hole attacks | Availability | Custom | more than 90% accuracy | |
[179] | Node ranking | sinkhole attacks | Availability | NS3 | 96.19% detection rate, 4.16% FPR, 4.04% FNR | |
[180] | Parallel ABC | Sybil attacks | Authentication | Simulation | ≈ 97% accuracy, 97% sensitivity | |
[181] | XGBoost | botnet attacks | Availability | BoT-IoT | 99.99% accuracy, 97.5% recall, 99.5% precision, 98.5% F1 score | |
[182] | Gaussian distribution and local search | Mirai and Gafgyt botnets | Availability | N-BaIoT | 90% in multiclass classification | |
[183] | Dynamic analysis | botnet attacks | Availability | Custom | 98.1% to 91.99% accuracy | |
[184] | Fisher score and XGBoost | botnet attacks | Availability | N-BaIoT | 99.96% average accuracy | |
[185,186] | Custom algorithm | DoS attacks | Availability | Custom | A supply voltage ranging from 2.1 to 3.6 V | |
[187] | Certificateless signature mechanism | signature forgery attacks | Integrity | NA | NA | |
[188] | Ciphertext policy attribute-based encryption | malicious data transmission | Confidentiality, authentication | NA | NA | |
[189] | Average consensus-based mechanism | DoS attacks | Availability | Matlab | Average calculation time of 4.7 ms per 100 iterations |
Ref. | Method Characteristics | Provided Security Requirement | Advantages | Limitations |
---|---|---|---|---|
[190] | Hybrid AES-RSA | Confidentiality, secure data sharing | It efficiently protects the secrecy of the data and enables devices to recover the data in a secure manner | It relies on RSA (i.e., an asymmetric encryption method), which is slow |
[191] | Hierarchical and distributed | Secure data at rest, while providing IIoT devices with status updates | A secure method capable of large-scale information and data storage. | It is not linked to data and infrastructure characteristics |
[192] | Combining a super-increasing sequence and modified oblivious transfer | Privacy, secure data sharing | It efficiently provides secure data sharing and anonymity | It is centralized |
[193] | Encryption outsourcing and fine-grained access control | Secure data sharing, access control | It achieves encouraging response latency reduction and overhead savings for edge devices | The security analysis was not discussed in detail |
[194] | Encryption with multi-authority cipher-text | Secure data at rest | Data access authorization and secure data sharing are ensured to protect edge devices against collusion attacks with low delay | The high scalability of edge networks might cause other security issues to emerge |
[195] | Based on an anonymous edge node mechanism | Availability | It accurately detects jamming attacks | The method was not tested in a real-world environment |
[196] | Relies on channel and routing assignment and does not require additional hardware | Availability | It improves the packet ratio in IoT environments compared to existing methods | The method was not tested in a real-world environment |
[197] | Based on SVM | Availability | It achieves a high detection rate | The method was tested using a simulation tool |
Ref. | Algorithm | Resolved Issue | Provided Security Requirement | Dataset | Performance Metrics |
---|---|---|---|---|---|
[198] | Fuzzy pattern tree | malware | Integrity | Kaggle and Vx-Heaven | 97.0427% and 88.76% accuracies |
[199] | LSTM | malware | Integrity | UNSW-NB15 | 70% accuracy |
[200] | Fuzzy set theory and a new loss function | malware | Integrity | Drebin [201] and AndroZoo [202] | 9% F1 score improvement |
[203] | Fuzzy clustering | malware | Integrity | created from VirusShare , Kaggle, and Ransomware Tracker | VirusShare: 94.66%, Kaggle: 97.56%, Ransomware Tracker: 94.26% accuracies |
[204] | Theoretical analysis | malware | Integrity | NA | NA |
[205] | J48 | ransomware | Confidentiality, authentication | VirusTotal | 97.1% detection rate |
[206] | kNN with DTW capability | ransomware | Confidentiality, authentication | VirusTotal | Window size 15: 94.27% accuracy, 95.65% recall, 89.19% precision, 92.31% F1 score |
[207] | Decision tree and naïve Bayes | ransomware | Confidentiality, authentication | Custom | Packet-based (decision tree): 97.92% accuracy, 97.90 precision, recall, F1 score; flow-based (naïve Bayes): 97.08% accuracy, 97.72% precision, 97.71% recall and F1 score |
[208] | Random forest | ransomware | Confidentiality, authentication | ransomware and malware-trusted | 97.817% average F1 score of five splits |
[209] | Logistic regression | ransomware | Confidentiality, authentication | created from VirusShare website | 96.3% detection rate and 99.5% ROC curve |
[210] | DNN | ransomware | Confidentiality, authentication | VirusTotal | 93% accuracy |
[211] | Practical analysis | ransomware | Confidentiality, authentication | Synthetic data | NA |
[212] | Systemic analysis | ransomware | Confidentiality, authentication | Custom | NA |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alotaibi, B. A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities. Sensors 2023, 23, 7470. https://doi.org/10.3390/s23177470
Alotaibi B. A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities. Sensors. 2023; 23(17):7470. https://doi.org/10.3390/s23177470
Chicago/Turabian StyleAlotaibi, Bandar. 2023. "A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities" Sensors 23, no. 17: 7470. https://doi.org/10.3390/s23177470
APA StyleAlotaibi, B. (2023). A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities. Sensors, 23(17), 7470. https://doi.org/10.3390/s23177470