当前位置: X-MOL 学术IEEE Commun. Surv. Tutor. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities
IEEE Communications Surveys & Tutorials ( IF 35.6 ) Pub Date : 2020-01-01 , DOI: 10.1109/comst.2020.3011208
Koen Tange , Michele De Donno , Xenofon Fafoutis , Nicola Dragoni

A key application of the Internet of Things (IoT) paradigm lies within industrial contexts. Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry 4.0, promises to revolutionize production and manufacturing through the use of large numbers of networked embedded sensing devices, and the combination of emerging computing technologies, such as Fog/Cloud Computing and Artificial Intelligence. The IIoT is characterized by an increased degree of inter-connectivity, which not only creates opportunities for the industries that adopt it, but also for cyber-criminals. Indeed, IoT security currently represents one of the major obstacles that prevent the widespread adoption of IIoT technology. Unsurprisingly, such concerns led to an exponential growth of published research over the last few years. To get an overview of the field, we deem it important to systematically survey the academic literature so far, and distill from it various security requirements as well as their popularity. This paper consists of two contributions: our primary contribution is a systematic review of the literature over the period 2011–2019 on IIoT Security, focusing in particular on the security requirements of the IIoT. Our secondary contribution is a reflection on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIoT.

中文翻译:

工业物联网安全系统调查:需求和雾计算机会

物联网 (IoT) 范式的一个关键应用在于工业环境。事实上,新兴的工业物联网 (IIoT),通常被称为工业 4.0,有望通过使用大量联网的嵌入式传感设备以及雾/云等新兴计算技术的结合来彻底改变生产和制造计算和人工智能。IIoT 的特点是互连程度提高,这不仅为采用它的行业创造了机会,也为网络犯罪分子创造了机会。事实上,物联网安全目前是阻止广泛采用 IIoT 技术的主要障碍之一。不出所料,这种担忧导致过去几年发表的研究呈指数级增长。为了全面了解该领域,我们认为系统地调查迄今为止的学术文献并从中提取各种安全要求及其受欢迎程度很重要。本文包括两个贡献:我们的主要贡献是对 2011-2019 年期间 IIoT 安全的文献进行系统回顾,特别关注 IIoT 的安全要求。我们的次要贡献是反思如何利用相对较新的雾计算范式来满足这些要求,从而提高 IIoT 的安全性。我们的主要贡献是对 2011 年至 2019 年期间有关 IIoT 安全的文献进行系统回顾,特别关注 IIoT 的安全要求。我们的次要贡献是反思如何利用相对较新的雾计算范式来满足这些要求,从而提高 IIoT 的安全性。我们的主要贡献是对 2011 年至 2019 年期间有关 IIoT 安全的文献进行系统回顾,特别关注 IIoT 的安全要求。我们的次要贡献是反思如何利用相对较新的雾计算范式来满足这些要求,从而提高 IIoT 的安全性。
更新日期:2020-01-01
down
wechat
bug