Cyber Security in the Industrial Internet of Things

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (20 October 2021) | Viewed by 12122

Special Issue Editors


E-Mail Website
Guest Editor
TIMA – CNRS, Université Grenoble-Alpes, Grenoble INP, UMR 5159, 46, avenue Félix Viallet, 38031 Grenoble, CEDEX, France
Interests: hardware security and trust; secure circuits design and test; reliability evaluation and fault tolerance; VLSI testing

E-Mail Website
Guest Editor
Carlos III University of Madrid, Department of Electronic Technology, Avenida de la Universidad, 30, 28911 Leganés, Madrid, Spain
Interests: hardware security; low-power design; criptography
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The Industrial Internet of Things (IIoT) envisions a world where critical infrastructures, such as factories, power plants, and water systems, are monitored and controlled through the network. The IIoT’s adoption may allow for the optimization of many industry domains, including the more complex industrial environments. Nevertheless, all of this interconnection will expand the cyberattack surface to unprecedented levels. The risks are aggravated by vulnerabilities in the devices and their environments to threats such as unsecured hardware and firmware, poorly developed software, and unsecured physical access that can lead to damage to equipment, the disruption of process controls, the theft of intellectual property, the loss of customer and corporate data, and industrial espionage.

This Special Issue on “Cyber Security in the Industrial Internet Of Things” aims to stimulate open scientific discussions on new solutions and trends in response to the main security and trust challenges in the IIoT.

Dr. Giorgio Di Natale
Dr. Honorio Martin
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • software and hardware protection mechanisms
  • trust and security lifecycle management
  • trusted device identification and communication
  • privacy issues
  • cryptography and lightweight cryptography
  • security-by-design
  • blockchain technologies
  • security in emerging fields: artificial intelligence, neural networks, deep-learning, and approximate computing
  • case studies

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

17 pages, 4208 KiB  
Article
Mitigation against DDoS Attacks on an IoT-Based Production Line Using Machine Learning
by Ladislav Huraj, Tibor Horak, Peter Strelec and Pavol Tanuska
Appl. Sci. 2021, 11(4), 1847; https://0-doi-org.brum.beds.ac.uk/10.3390/app11041847 - 19 Feb 2021
Cited by 12 | Viewed by 3673
Abstract
Industry 4.0 collects, exchanges, and analyzes data during the production process to increase production efficiency. Internet of Things (IoT) devices are among the basic technologies used for this purpose. However, the integration of IoT technology into the industrial environment faces new security challenges [...] Read more.
Industry 4.0 collects, exchanges, and analyzes data during the production process to increase production efficiency. Internet of Things (IoT) devices are among the basic technologies used for this purpose. However, the integration of IoT technology into the industrial environment faces new security challenges that need to be addressed. This is also true for a production line. The production line is a basic element of industrial production and integrating IoT equipment allows one to streamline the production process and thus reduce costs. On the other hand, IoT integration opens the way for network cyberattacks. One possible cyberattack is the increasingly widely used distributed denial-of-service attack. This article presents a case study that demonstrates the devastating effects of a DDOS attack on a real IoT-based production line and the entire production process. The emphasis was mainly on the integration of IoT devices, which could potentially be misused to run DDoS. Next, the verification of the proposed solution is described, which proves that it is possible to use the sampled flow (sFlow) stream to detect and protect against DDoS attacks on the running production line during the production process. Full article
(This article belongs to the Special Issue Cyber Security in the Industrial Internet of Things)
Show Figures

Figure 1

Review

Jump to: Research

19 pages, 2667 KiB  
Review
Cybersecurity in the Internet of Things in Industrial Management
by Ricardo Jorge Raimundo and Albérico Travassos Rosário
Appl. Sci. 2022, 12(3), 1598; https://0-doi-org.brum.beds.ac.uk/10.3390/app12031598 - 02 Feb 2022
Cited by 31 | Viewed by 7719
Abstract
Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly [...] Read more.
Nowadays, people live amidst the smart home domain, while there are business opportunities in industrial smart cities and healthcare. However, there are concerns about security. Security is central for IoT systems to protect sensitive data and infrastructure, whilst security issues have become increasingly expensive, in particular in Industrial Internet of Things (IIoT) domains. Nonetheless, there are some key challenges for dealing with those security issues in IoT domains: Applications operate in distributed environments such as Blockchain, varied smart objects are used, and sensors are limited, as far as machine resources are concerned. In this way, traditional security does not fit in IoT systems. The issue of cybersecurity has become paramount to the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) in mitigating cybersecurity risk for organizations and end users. New cybersecurity technologies/applications present improvements for IoT security management. Nevertheless, there is a gap in the effectiveness of IoT cyber risk solutions. This review article discusses the literature trends around opportunities and threats in cybersecurity for IIoT, by reviewing 70 key articles discovered from a profound Scopus literature survey. It aims to present the current debate around the issue of IIoT rather than suggesting any particular technical solutions to solve network security problems. Full article
(This article belongs to the Special Issue Cyber Security in the Industrial Internet of Things)
Show Figures

Figure 1

Back to TopTop