skip to main content
survey
Open Access

Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions

Authors Info & Claims
Published:12 January 2024Publication History

Skip Abstract Section

Abstract

The Industrial Internet of Things (IIoT) has been positioned as a key pillar of the Industry 4.0 revolution, which is projected to continue accelerating and realizing digital transformations. The IIoT is becoming indispensable, providing the means through which modern communication is conducted across industries and offering improved efficiency, scalability, and robustness. However, the structural and dynamic complexity introduced by the continuous integration of the IIoT has widened the scope for cyber-threats, as the processes and data generated by this integration are susceptible and vulnerable to attacks. This article presents an in-depth analysis of the state-of-the-art in the IIoT ecosystem from security and digital forensics perspectives. The dimensions of this study are twofold: first, we present an overview of the cutting-edge security of IIoT ecosystems, and second, we survey the literature on digital forensics. The key achievements, open challenges, and future directions are identified in each case. The challenges and directions for future studies that we identify will provide important guidance for cybersecurity researchers and practitioners.

Skip 1INTRODUCTION Section

1 INTRODUCTION

For the past decade, the Internet of Things (IoT) has been embraced as a futuristic concept with a diverse focus cutting across numerous domains of information and communication technology (ICT) [1]. This trend has always been characterized as both a disruptive technology and a major player in the provision of effective services and communication. Indeed, the influence of the IoT has been felt across many application domains [2]. The emergence of Industry 4.0, with its focus on automation and manufacturing technologies, has acted as an enabler of cyber-physical systems (CPS) and the IoT [3, 4]. The major sectors that have benefited as a result of IoT proliferation include transport systems, healthcare, home automation systems, smart cities, and autonomous vehicles [5]. Industry 4.0 has the potential to optimize logistics, automation of equipment, smart manufacturing techniques, the IoT, and cloud systems. Additionally, while the number of IoT devices in use has increased, a more pertinent issue is the integration with CPS, as supported by various vendors and providers of IoT-based platforms. This has led to the development of IoT-based ecosystems that are mainly composed of “things” and service providers who ensure interoperability across IoT-based environments [6].

Leveraging the IoT to realize industrial tasks centered on Industry 4.0 goals such as smart transportation, smart manufacturing, smart energy management, service, and automation, constitutes the Industrial IoT (IIoT). In this context, the domain of the IIoT ranges from machine-to-machine (M2M) applications to the dynamics of industrial communication [7, 8]. Notably, the relevance of exploring IIoT ecosystems and their constituents is intended to propel Industry 4.0 objectives by operationalizing technology across diverse information technology domains [7]. The ultimate goal is for devices to become pervasive, as the majority of IoT-based devices possess powerful computing capabilities.

IIoT ecosystems play a significant role in collaborative communication as a means of achieving the desired Industry 4.0 objectives. For example, IIoT ecosystems have a consistent need for reliable application-centric processes as far as digital connectivity and data decisions are concerned. This is because the realization of day-to-day Industry 4.0 strategies requires a more secure and resilient approach during inter-process communication. It should be noted that IIoT ecosystems have also led to the diffusion of heterogeneous environments over which massive data and applications are exchanged on a daily basis, with little regard to safety and other ramifications.

While the IIoT spectrum has seen significant diversification through the emergence of prolific ecosystems, it is worth noting that critical aspects such as emerging configurations, applications, and resource migration have not been able to match the ever-changing IoT landscape. Regardless, to ensure the security of IIoT ecosystems, it is vital to enforce continuous, effective, and secure communication, given that both the IIoT and Industry 4.0 have the objectives of robustness, scalability, and security. Consequently, the current IIoT requirements and technological advances geared toward realizing Industry 4.0 goals have created the need to enforce secure communication and post-incident response strategies as a means of achieving secure, efficient, and reliable industrial processes. Sengupta, Ruj, and Bit [9] identified several security limitations that are still yet to be overcome. While there is a large body of literature focused on the IIoT as a whole, our study is entirely focused on the security and digital forensics aspects of the IIoT, which in our view pose serious research challenges. The IIoT is a novel and still emerging phenomenon, and given the structural and dynamic complexity involved in the integration of IIoT systems, there exist many unknown vulnerabilities and attacks, and there is a limited range of digital forensic processes, methodologies, and tools that can be used to address attribution problems in digitized IIoT ecosystems. The uniqueness of the present survey lies in its integrated consideration of both security and digital forensics.

1.1 Motivation and Research Gaps

With the growing number of devices and enhanced connectivity, there is a need for effective and secure control and management systems. In this regard, the interplay between operational technology (OT) and information technology (IT) is necessitated by the need for effective and secure communication and control techniques. As a result, the tenets of Industry 4.0 have led to the development of several trends in automation technologies for manufacturing industries, which have further enabled the integration of the IoT, IIoT, and CPS across cyberspace [3, 4]. These technologies, however, face a number of complexities associated with dynamic ecosystems [10], emergent behaviors, industrial systems, security challenges [7, 11], and reactive and proactive digital forensic challenges in the IIoT [12, 13]. Such complexities, which in the context of this study represent obstacles that hinder the achievement of system targets [14], lead to the possible emergence of vulnerable points in IIoT ecosystems. These vulnerabilities further exacerbate the perennial and diverse security and digital forensics challenges introduced by the proliferation and integration of automation technologies.

1.2 Contributions

Various previous studies have considered the IIoT and security [15, 16, 17, 18, 19, 20, 21, 22, 23], but at present, no significant research results are available that provide guidance on how to evaluate the security and digital forensics ramifications of the interplay between OT and IT associated with the proliferation of the IIoT. To address these challenges, this article presents a comprehensive review of security and digital forensics in IIoT ecosystems. The main contributions of this article can be summarized as follows:

First, this study provides an in-depth analysis of relevant research on IIoT ecosystems from the perspectives of security and digital forensics. We identify and address pertinent research limitations in IIoT ecosystems by highlighting the relevant security requirements, weaknesses in the IIoT, and the present state of protocols, architectures, and standards, as well as proposing ways to strengthen these technologies.

From a holistic viewpoint, this study illustrates the key IIoT security achievements with the actualization of Industry 4.0. In particular, we explore key management strategies, edge and fog security, and the essence of the blockchain.

While this study has a strong emphasis on the realization of the IIoT and its impact, we also explore state-of-the-art studies in IIoT forensics and identify several key challenges.

We explore open problems in security and digital forensics and discuss possible high-level solutions. Finally, we provide a contextual evaluation of this study and identify avenues for future work.

The remainder of this article is structured as follows: Section 2 provides an overview, describing the scope of the present study, as well as related work with regard to the IIoT. This is followed by an explanation of IIoT ecosystems in Section 3. An overview of IIoT security, including security requirements, security weaknesses, and security standards, is presented in Section 4. Cutting-edge research results on the security of the IIoT are reported in Section 5. This is followed by a presentation of state-of-the-art investigations in IIoT forensics in Section 6. Open challenges are discussed in Section 7. Finally, future directions and conclusions are summarized in Sections 8 and 9, respectively. An overview of the entire article in terms of sections, subsections, and main concepts is shown in Figure 1.

Fig. 1.

Fig. 1. Mind-map giving an overview of the flow of the entire article, including the main sections, subsections, and major concepts.

Skip 2SCOPE AND RELATED WORK Section

2 SCOPE AND RELATED WORK

The scope of this study is determined by the assumption that the amalgamation of IoT-based techniques with industrial processes represents the realization of a smart manufacturing concept, herein referred to as Industry 4.0. Within the context of Industry 4.0, connected devices and processes are automated in a fashion that enables them to realize quick and efficient production. Although the concepts of the IoT, the IIoT, and Industry 4.0 may not be used interchangeably [7], we explore relevant studies in all three areas, with the aim of identifying gaps that exist in research on the security and digital forensics of IIoT ecosystems. Table 1 summarizes previous surveys of security and digital forensics relevant to the IoT, the IIoT, and Industry 4.0 [15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28]. Note that the current study mainly considers the IoT and IIoT; however, where necessary, Industry 4.0 is referenced. The uniqueness of this research stems from the fact that it explores security achievements, the need for application-specific standards, IIoT-enabling technologies, and proactive and reactive digital forensic models that are tailored to post-event response strategies in IIoT ecosystems.

Table 1.
REFYearIoTIIoTSecurityDigital forensicsFocus
[24]2021\(\checkmark\)\(\checkmark\)\(\times\)\(\times\)Attacks exploiting hardware vulnerabilities and deep learning detection approaches in the IIoT
[15]2021\(\checkmark\)\(\checkmark\)\(\times\)\(\times\)Characterizes CPS architectures and models in an industrial environment
[12]2021\(\times\)\(\checkmark\)\(\checkmark\)\(\checkmark\)Emphasizes the need for IIoT forensics
[16]2020\(\checkmark\)\(\checkmark\)\(\checkmark\)\(\times\)Explores current challenges and searches for the future IoT
[17]2020\(\checkmark\)\(\checkmark\)\(\checkmark\)\(\times\)Studies how fog computing can be leveraged to improve the security of IIoT
[25]2020\(\checkmark\)\(\times\)\(\checkmark\)\(\times\)Explores relevant technologies essential for the growth of Industry 4.0
[26]2020\(\checkmark\)\(\times\)\(\checkmark\)\(\times\)Investigates existing tools and techniques for modeling attacks on the IoT and their key limitations
[18]2019\(\checkmark\)\(\checkmark\)\(\times\)\(\times\)Evaluates the current state of the IIoT.
[27]2019\(\checkmark\)\(\checkmark\)\(\times\)\(\times\)Industry 4.0 as a turning point for smart manufacturing and a defeat for centralized applications
[19]2018\(\checkmark\)\(\checkmark\)\(\times\)\(\times\)Explores the IIoT, cloud, and edge from the CPS perspective
[20]2018\(\checkmark\)\(\checkmark\)\(\times\)\(\times\)Highlights intrusion and attacks on the IIoT and generates a comparative analysis
[21]2018\(\checkmark\)\(\checkmark\)\(\times\)\(\times\)Focuses on the importance of edge and fog frameworks in supporting automation
[22]2018\(\times\)\(\checkmark\)\(\times\)\(\times\)Provides insights on the IIoT based on analyzed data
[28]2018\(\checkmark\)\(\checkmark\)\(\checkmark\)\(\times\)Presents an analytical framework to enumerate and characterize the IIoT and analyze security threats and vulnerabilities
[23]2015\(\checkmark\)\(\checkmark\)\(\checkmark\)\(\times\)Explores security issues and suggests a holistic security framework for the IIoT

Table 1. Previous Relevant Review Articles from the Period 2015–2021

Boyes et al. [28] highlighted the relevance of the IIoT and associated relationships and concepts, such as CPS and Industry 4.0. They also presented a framework for analyzing the IIoT and an IoT-based taxonomy for enumerating and characterizing the IIoT while exploring security threats, vulnerabilities, and system architectures. As noted by Oztemel and Gursev [25], Industry 4.0 is part of the smart networked environment and an enabler of real-time CPS. It is also responsible for the management of complex systems, where safety and security are key to successful implementation. It has been shown that Industry 4.0 has a disruptive impact on companies, where it is seen as a threat to the security of conventional centralized technologies [24]. Other research with a focus on IoT/IIoT has illustrated the effects of various types of attacks, such as software attacks that exploit hardware vulnerabilities in IIoT. While such studies have explored malicious attack vectors in the IoT/IIoT, reactive forensics techniques have received little attention. Existing attack models and architectures have been comprehensively examined [26] alongside further assessment of the challenges related to secure application design in the IoT. While this research has identified essential approaches in the IIoT, post-incident response strategies have not been considered, although secure strategies that can be adopted have been listed as key aspects. In identifying the challenges and opportunities facing the development of a secure IIoT, the component lifespan and number of devices needed for deployment, configuration, and management of the IoT and IIoT, as well as IT/OT and human-centered factors that affect the IIoT, have been investigated in detail [29]. This research has suggested the IIoT is at greater risk of attack compared with the consumer IoT. In addition, the challenges in supervisory control and data acquisition (SCADA) forensics have been highlighted as a lack of forensic models and tools, a lack of live forensics, volatility in memory, limited logging, and challenges associated with current forensic tools [30]. In our opinion, these shortcomings exacerbate the security and forensic challenges addressed in this survey.

This article presents a comprehensive review of state-of-the-art studies on the IIoT from the perspective of security and digital forensics. Table 1 lists previous relevant review articles, indicating the scope and main focus of each one. The ultimate aim of the present study is to address the essential aspects of secure communication and post-event response strategies in IIoT ecosystems while highlighting the remaining challenges according to the layered architecture in Figure 2. The scope and focus of previous studies, as shown in Table 1, illustrate the intricacies that determine the success or failure of an IIoT ecosystem. From a security perspective, the present review focuses explicitly on the intrinsic existence, resilience, and robustness of IIoT ecosystems. It should also be noted here that the variations in the scope of previous studies demonstrate the propensity for inconsistencies in the definition of IIoT ecosystems.

Fig. 2.

Fig. 2. Layered IIoT architecture depicting perception, network, control, and application layers. It should be noted that there are other layered architectures of the IIoT, such as five- and six-layer architectures.

Overall, previous studies have not comprehensively considered digital forensics in the context of the IIoT, owing to the limitations of the standard methodologies and tools for conducting digital investigations on the IIoT. As a consequence, there remain longstanding security and digital forensics challenges, which are being exacerbated by digital proliferation and integration (see Table 1). This study differs from previous work in its extensive exploration of both proactive and reactive approaches in IIoT ecosystems. Notably, it provides an extended scope that, through contextualized descriptions, is able to show the impact of fusing specific emergent technologies.

Skip 3IIoT Ecosystems Section

3 IIoT Ecosystems

The context of the IIoT, although dynamic, is based on the interrelationship of components and communication, and the diversification, proliferation, and interoperability mechanisms of the constituent parts. There are different views of what constitutes an IIoT ecosystem. We consider an IIoT ecosystem to be a fusion of technologies that utilizes process automation approaches to achieve efficient manufacturing strategies [31]. Through a coordinated approach, IIoT tasks incorporate network augmentation, IoT-based applications, and CPS to enhance convenience, efficiency, and personalization of tasks [32, 33]. Figure 2 shows the layered architecture of the IIoT, including potentially vulnerable layers. For example, the perception layer is vulnerable to node capture attacks, timing attacks, eavesdropping, encryption, and key agreement. The network layer is vulnerable to integrity, confidentiality, and availability attacks. The control layer, however, is tasked with controlling the physical systems and processes in the industrial environment. It consists of control algorithms, industrial equipment management, SCADA systems, distributed control systems (DCS), programmable logic controllers (PLCs), human-machine interface (HCI), and maintenance actions. The control layer can be vulnerable to active adversarial attacks in control algorithms [34, 35], infrastructure attacks [36], and integrity attacks, while the application layer has vulnerabilities based on cloud security and encryption strategies [37]. It is worth noting that security vulnerabilities span more layers of other IIoT architectures. For instance, in the IIoT five-layer architecture, the key agreement strategies introduce vulnerabilities in the business layer [20]. This study focuses on the vulnerabilities introduced in the basic three-layer IIoT architecture.

The fusion of IoT processes with industrial processes supports the digital ubiquity and automation of advanced robotic techniques, edge computing, smart industries, the application of machine learning technologies, and the leveraging of CPS and IoT-based techniques. These trends are intended to digitize and propel the Industry 4.0 transformation. In the context of this article, Industry 4.0 is taken as an already-realized revolutionary industrial technology that relies on digital technology to achieve its objectives (e.g., real-time access to data of CPS, the IoT, and the IIoT), while Industry 4.0 transformation is taken to depict an umbrella revolution with continuously emerging technologies and concepts that allow key objectives to be realized. The overarching objective is to guarantee process automation and data exchange across manufacturing systems with the support of technologies such as artificial intelligence (AI), cognitive processing, and cloud computing [31]. While IIoT and M2M applications are envisioned as the enablers of Industry 4.0 [38], the IIoT ecosystem requires the backing of fused technologies for smart industries or Industry 4.0 for its full realization.

According to Schmid et al. [39] and Broring et al. [40], an ecosystem is a cross-platform, cross-standard, and cross-domain entity that provisions IIoT services and applications. By contrast, Mazhelis, Luoma, and Warma [41] see it as the interconnection of a global network with a service infrastructure that has a self-configuration capability over interoperable protocols with a number of roles [42]. Similarly, Westerlund, Leminen, and Rajahonka [43] view an IIoT ecosystem as having techno-economic as well as human-centric aspects that play a significant role in determining what things do within a connected environment [43]. Delicato et al. [44] perceive an ecosystem to be able to integrate heterogeneity to realize real-time data collection and control mechanisms with the visualization, processing, and storage of data. It is thus evident that an ecosystem is dependent on resources, technologies, platforms, standards, and processes. Madaan, Ahad, and Sastry [45] suggest that for an IoT ecosystem, such as a smart home, the acquired data that are aggregated to guarantee quality of service are of critical importance [46, 47].

Consequently, an IIoT ecosystem’s objective is centered on optimizing production processes through monitoring and analysis while targeting effective outcomes [45]. From the perspective of processing, this is a reflection of how future supply chains will operate as a result of the integration of information systems with operational processes in factories [48]. Other pertinent existing research illustrates that IIoT ecosystems co-exist with smart technologies, where a pool of network devices collaborate to extract and share digital data with the ultimate goal of boosting production [49]. On a similar note, the need for a dynamically digitized IIoT ecosystem has been highlighted by Skwarek [50], in which the digitization of industrial processes is subsumed into smart entities for the purpose of creating a highly dynamic reconfiguration of production processes.

The core foundation on which IIoT ecosystems thrive has been attributed to CPS. This is mainly due to the capability of CPS to monitor and control physical processes, which ultimately forms the basis for smart factories [23]. The relevance of this is that smart factories can dynamically arrange and optimize processes while processing the generated data [51, 52]. Mazhelis, Luoma, and Warma [41] portrayed an ecosystem as a hub-centered structure created on an IoT-based setup, which can also be viewed as a business ecosystem [53, 54]. This forms part of what constitutes the day-to-day use of the IoT and its application as services to be provisioned. For example, the movement of data and normal services can easily be strengthened and trust increased by leveraging the blockchain [55, 56]. Other uses include software-defined networks (SDNs) [57], event management for IIoT ecosystems [53], digital construction to transform expectations with the emergence of Industry 4.0 [58], and crowd-sensing techniques for enhancing data processes and agility [59].

3.1 IIoT versus IoT

The IIoT and the IoT are distinct concepts that also share some similarities. They are based on similar principles of connecting diverse devices to the Internet, but they differ in scope of application and purpose. The IIoT, which can be seen as a subset of IoT, employs sophisticated devices equipped with sensors and processors that have connectivity capabilities that allow them to collect, analyze [68], optimize, and act on data [63] in real-time in the industrial sector, with the aim of improving efficiency in production. However, the IoT is a network of interconnected devices that can communicate using the Internet to gather, analyze, and share data, and that are mainly consumer products. Although the IoT utilizes sensors and other embedded technologies to collect and exchange data over the Internet, IIoT systems are able to integrate a variety of sensors and actuators with sophisticated software to monitor and control production processes [60].

Table 2 summarizes the technical differences between the IIoT and the IoT system in terms of a number of parameters: focus, communication, scale, amount of data [63], security perspectives, standards and protocols that are leveraged, areas of application, connectivity, differences in devices, and quality of service [46, 47]. The main focus of the IIoT is on connecting and integrating industrial devices to optimize industrial processes, and it uses wired and wireless networks, low latency networks, WiFi, Bluetooth, and Ethernet to provide reliable and real-time communication. It is deployed on a larger scale than the IoT, with thousands of devices in industrial settings, and it generates and uses large amounts of data to optimize industrial processes. The latency tolerance is higher for IoT devices basically due to the limitation in bandwidth and other resources. This makes real-time response unrealistic, hence making IoT devices able to tolerate delay during transmission. However, IIoT systems generally require low-latency owing to the fact they are used in real-time process control and monitoring. In addition, to allow smooth and efficient operations, industrial processes and equipment rely on low latency data transmission [69, 70].

Table 2.
ParameterIndustrial Internet of Things (IIoT)Internet of Things (IoT)Related research
FocusConnects and integrates industrial devices (manufacturing, logistics, etc.)Connects everyday devices and appliances (smart home, wearables, etc.)[60]
CommunicationUses wired and wireless networks, low latency, WiFi, Bluetooth, EthernetUses WLAN with lower reliability, high latency, cellular networks, WiFi, Bluetooth[61]
ScaleLarge scale, thousands of devices in an industrial settingSmall scale[62]
DataLarge amounts used to optimize industrial processesRelatively small amount collected for personal use (fitness tracking, home automation, etc.)[63]
SecurityHigher levels, protects critical industry infrastructureRelatively low, protects personal information and unauthorized access to devices[23, 64]
Standards/ProtocolsProtocols such as OPC UA, MQTT, and COAP meet industrial requirementsWider variety, such as HTTP, TCP/IP, Zigbee, Z-Wave, and LoRaWAN, are used in variety of applications[65]
ApplicationsPredictive maintenance, manufacturing, process optimization, energy, transport, etc.Consumer, personal, and commercial settings[66]
ConnectivitySpecialized, high-bandwidth, real-time monitoring of ICSVariety of low-power, low-bandwidth wireless connectivity[61]
DevicesRugged and designed for industrial environments, e.g., industrial sensors, actuators, and controllersDesigned for consumers, found in homes, cars, smartphones, and public spaces[67]
Quality of serviceReliability and real-time deliveryBased on best-effort delivery[46, 47]
ReliabilityImportant, but not a primary concernHigh reliability is critical for safety and productivity[46, 47]

Table 2. Comparison between IIoT and IoT

Security is a key parameter that reveals the similarities and differences between the IIoT and IoT. Given that the IIoT operates within industrial environments such as oil and gas refineries, power plants, and water supplies, high device security is necessary to protect critical infrastructure [23, 64]. Security is also essential in consumer-based devices, and both the IIoT and IoT may be subject to regulatory compliance, which means that security measures need to be increased.

IIoT systems often need to operate in manufacturing plants with data being collected and processed in a near real-time manner with minimal latency, and it is essential that delays in these processes be prevented to avoid disruption to production. Downtime failures in IIoT systems could also have significant adverse consequences. Thus, real-time processing, critical system reliability, and seamless system integration impose upon the IIoT a requirement for the prevention of delay that, in particular, differentiates it from the IoT [71, 72, 73].

The IIoT uses specialized protocols such as MQTT, CoAP, LoRaWAN, and 6LowPAN to meet industrial requirements for specialized, high-bandwidth, and real-time monitoring of industrial control systems (ICS). It also uses devices such as sensors, actuators, and controllers that are suitably rugged for industrial environments and that provide an adequate quality of service [65].

Skip 4IIoT Security: Overview Section

4 IIoT Security: Overview

The transition from conventional and proprietary-based communication techniques to industrial automation processes represents a paradigm shift. In the current state-of-the-art, ecosystems embrace IoT environments that connect to smart environments, relying on sensors, actuators, timely controllers, and SCADA services [38]. This aspect of system digitization in readiness for Industry 4.0 requires secure technologies and standards. Furthermore, this integration opens up a threat landscape, with increased vulnerabilities that, from a security perspective, could lead to attacks on smart factories and compromise production processes [23, 74]. In this section, we explore the security requirements of IIoT ecosystems, weaknesses in the IoT and IIoT, and the state of the protocols, security architectures, and standards employed in the IIoT.

4.1 Security Requirements in IIoT Ecosystems

Given the convergence of industrial OT with IT, there has been a paradigm shift in IIoT ecosystem complexity and sophistication. As a result, the potential for cyber-attacks has increased [75]. This subsection assesses several industry-specific critical security requirements.

ICS are associated with the control and monitoring of key critical infrastructure and SCADA in industry. The continued integration of industrial production processes in the IIoT makes these systems susceptible to attacks. The security requirements in the IIoT are mainly positioned to address how secure programmable logic controllers (PLCs) maintain control of the physical processes, how sensor data are protected from attacks, how production processes can be optimized, how remote monitoring strategies can be secured, and how CPS integrity and confidentiality can be maintained.

To enforce secure communication strategies in the IIoT, it is imperative to identify how the state of security has been altered in the transition from conventional processing to the IIoT [23]. Taking general security requirements and goals as a baseline, the alterations to security requirements are summarized in Table 3.

Table 3.
No.Security parameterChallengesReference
1AvailabilityTradeoff between security and availability during a potential attack[76]
2EncryptionComplexity applying encryption to diverse device firmwares[76]
3IIoT device integrityIIoT devices have modified firmwares, and hence it is not easy to verify authentic ones[76]
4Security by designDevices are not designed to be secure[78, 79]
5Insider threatsSocial engineering, insider attacks, and human factors[80]
6HeterogeneityThe IIoT is becoming a larger network, with massive transmission, and more security issues are arising[81]

Table 3. Security Requirements in IIoT Ecosystems

The existence and proliferation of diverse technologies make enforcing security across IIoT ecosystems more difficult. This is because of existing inconsistencies in the digitization of manufacturing processes in the quest to achieve Industry 4.0 objectives. In Table 2, there is a tradeoff between availability and security in the event that an IIoT ecosystem suffers an attack [76]. Normally, security solutions place a system offline when it is under attack, but this conflicts with the need to maintain availability [76]. Encrypting connections in an IIoT ecosystem, either at the application or network level, may need to be forwarded or verified in advance by IIoT devices. However, given that some IoT devices have diverse firmware, the strategy of encryption is somewhat complex [76, 77]. As IIoT ecosystems include diverse industrial devices, some of which have altered firmware, verifying the integrity of all devices is challenging. Other pertinent security requirements include the existence of diverse attack types, such as insider attacks on industrial units [78, 79]. The fact that IIoT devices are not built with security capabilities complicates the provision of secure strategies [80].

Consequently, heterogeneity among IIoT ecosystems continues to hinder the achievement of major security goals. In general, new security threats and vulnerabilities are constantly being detected or propagated through malicious content or misuse of data. This heterogeneity introduces formidable security challenges. For example, an effective IIoT ecosystem allows nodes and interaction-based processes that coordinate communication with the cyber-physical world. From a generic point of view, Bodei, Chessa, and Galletta [82] showed that communication should start from a given node and that data should be collected during this communication process. Hence, there may be a possibility of vulnerable nodes. As part of a major requirement to secure IoT systems and incorporate end-to-end security, authentication, and authorization, the enforcement of continuous security is key to preventing adverse attacks [83, 84].

A major bottleneck for IIoT ecosystems is the fact that trust between industrial units is not guaranteed. This stands out as a major issue, illustrating the need to incorporate secure technologies that offer solutions through the establishment of secure immutable channels to prevent potential attacks [85]. IIoT-based applications such as Amazon Web Services (AWS) have security mechanisms that allow secure connectivity of hardware and cloud authentication while exchanging messages. In this context, every layer of the AWS/IoT technology stack is coated with the Azure security feature, e.g., authentication for connecting any new IoT device using X.509 certificates, authorization and access control that highlights policies, and secure communication of traffic through encryption (SSL/TLS) [86]. This ensures that confidentiality is maintained for protocols such as MQTT and HTTP. Other potential solutions include the Azure IoT security architecture, which supports authentication (TLS protocol for encryption), authorization and access control (Azure active directory) for policy authentication [87], and SSL/TLS for integrity and confidentiality of information [87].

While the focus of this article is on IIoT security and digital forensics, IIoT and IoT also share some common elements, even though they differ in applications and use-cases. However, there are also security weaknesses that are common to both systems, and as such, it is important to highlight the security weaknesses in both IoT and IIoT ecosystems to provide a comprehensive understanding of the overall security landscape faced by these technologies. By comparing the security requirements and weaknesses of both IoT and IIoT, we can identify similarities and differences in their security postures and better understand the unique challenges and opportunities for improving the security of IIoT ecosystems.

4.2 Key IoT Security Weaknesses

Diversification and the multitude of devices and protocols within IoT environments have led to an increased number of security shortcomings. The current security weaknesses, as highlighted by the open web security project (OWASP) [94], are mainly concentrated in each of the IoT’s three layers (perception, network, and application). This subsection explores the key IoT security weaknesses based on the three-tier IoT architecture (see Table 4).

Table 4.
LayerKey security weaknessesReference
Tampering and jamming attacks[88]
Node capturing by adversaries[88]
Perception layerFalse data injection attacks[88]
Cloning of tags[89]
Unauthorized access to systems[89]
Protocol insecurity[90]
RFID spoofing[91]
Network layerSink-holing attacks[89]
Vulnerabilities in IoT devices[92]
Communication weaknesses with nodes[92]
Malicious code injections
Sniffing attacks[89]
Phishing attacks
Application layerDenial-of-service (DoS) attacks[92]
Buffer overflow attacks[92]
Software-based vulnerabilities[93]

Table 4. Key IoT Security Weaknesses Based on the Layered IoT Architecture

4.2.1 Perception Layer Weaknesses.

The current security shortcomings in the perception layer are mainly attributable to external sources. This includes targeted attacks that focus on the transmission among IoT nodes, which compromise confidentiality, integrity, availability, and authorization. The key weaknesses in this context, as listed in Table 4, are tampering and jamming attacks [88], nodes being captured by adversaries [88], injection of malicious data by adversaries [88], cloning of tags [89], and gaining unauthorized access to systems [89].

4.2.2 Network Layer Weaknesses.

At the network layer, adversaries have the ability to compromise confidentiality and integrity during the data exchange stage of end-to-end communication. The key weaknesses in the network layer include protocol insecurity [90], RFID nodes [91], spoofing, sink-holing attacks [89], communication bottlenecks with nodes [92], and man-in-the-middle (MITM) attacks. As far as the IoT is concerned, attackers are able to capitalize on the heterogeneity of IT environments.

4.2.3 Application Layer Weaknesses.

The absence of widely accepted IoT standards for how applications are handled has opened a variety of security concerns at the interface layer. Integrating applications brings about authentication problems owing to the existence of diverse mechanisms arising from different applications. As a result, key vulnerabilities may allow malicious code injections, sniffing attacks [89], phishing attacks, DoS attacks [92], and buffer overflow attacks [92], and are responsible for key software-based vulnerabilities [93].

4.3 Key IIoT Security Weaknesses

The quest to achieve the security objectives of Industry 4.0 is increasingly significant, given that the integration of OT environments with information systems and cyber-based technologies effectively extends the attack surface. In assessing the key security challenges in the IIoT, we concentrate on those aspects that correspond to how the connectivity between technologies is achieved. Based on these security aspects, the key IIoT issues are identified and mapped to IoT weaknesses. As shown in Table 5, the key IIoT weaknesses are classified as cybersecurity- and physical-based vulnerabilities.

Table 5.
CategoryTargetAttack mechanismsEffectsLayer
Cyber-basedIT and OT systems IT and OT networks Operating system ApplicationsCloud environmentsSpoofing attacks Phishing attacksMalware injectionSession hijackingDenial of service (DoS)ICS failuresData theftNetwork layer
Physical-basedIoT devices Sensors and actuators ICS systems SCADA systems Human beings Device manipulation Service jamming Information theftDevice compromise Control system alteration Possible loss of human life Firmware compromise Service unavailability Perception and network layers

Table 5. Key IIoT Security Weaknesses

4.3.1 Cybersecurity-based Weaknesses.

The integration of OT and IT environments allows key security threats to target the operating system (OS), OT/IT system/network, industrial control system (ICS) and network, IIoT-based applications and servers, and the supporting cloud resources. The mechanisms used to realize these attacks leverage spoofing attacks, phishing-based attacks, and malicious software to compromise systems and hijack sessions. The outcome is continuous denial of service (DoS), failure of the ICS, and leakage of critical data.

4.3.2 Physical-based Security Weaknesses.

IIoT systems combine a number of physical devices that have other constraints in terms of, for example, energy and power. However, there is also a need to enforce the security of these devices. Generally, IIoT applications are tasked with the connectivity of industrial machines and processes, comprising sensors and actuators that process data in real-time. These data have a direct influence on the physical infrastructure and users, and failure could be catastrophic. Additionally, IIoT devices are mainly CPS-based, and so verifying the integrity of the CPS is a key task in detecting potential malicious modifications [23].

In the long run, verification of CPS integrity is essential. However, there exist limitations on computational power in any hardware architecture [64]. As illustrated in Table 5, physical-based security weaknesses can be exploited to affect sensors, actuators, and ICS/SCADA systems through device manipulation and human beings through psychological manipulation to extract information. Another critical aspect is the ICS, which was traditionally isolated from the IT infrastructure but is now connected and therefore exposed to cyber-security risks [64, 95]. Recent research [96, 97, 98] has led to proposals for security and safety standard compliance for CPS, possibly by automating the assessment of the IIoT and CPS using monitoring and verification frameworks.

Existing physical-based weaknesses include authentication techniques that require the storage of secret information in the device memory and cloning IIoT attacks in which a compromised physical device is cloned [99]. Side-channel attacks may open up access to adversaries, such as through electromagnetic attacks, power monitoring, and timing attacks based on statistical cryptographic techniques. With the emergence of Industry 4.0, more attacks on control systems are to be expected [99]. Security plays a major role where the IoT meets the physical ecosystem, and vulnerabilities can be seen in important areas such as SCADA systems, ICS, and IP-based physical systems [100].

4.4 State of IIoT Protocols

Assessments of the security of IIoT connectivity protocols stem from the need to explore the suppositions that underlie the digitization of industrial processes. This subsection explores the state of the wireless technologies that support IIoT ecosystems, as summarized in Table 6 and Figure 3, which shows the IIoT protocols with the respective parts of the open systems interconnection (OSI) reference model.

Table 6.
ReferenceProtocolsFocusSignificance to IIoT Ecosystems
[104]MQTTOffers support to data exchangeSuitability due to its lightweight nature
[65]CoAPEnables constrained devices to communicate with the InternetDedicated communication in the IIoT infrastructure
[65]MoDBUS:TCPShows its suitability in control and monitoringCan be used in monitoring across IIoT environments
[105]ZigbeeRole played by its variantsSupports cryptographic transmission
[108]NB-IoTConnects devices to the IoTCompatible with low power and reduced data rates
[105]LoraWAN/6LowPANHow information secrecy can be enhancedEncryption and decryption could enhance secrecy in the IIoT
[113]IEEE 802.15.4Operation for LoraWAN and basis for ZigbeeProvides general IIoT connectivity
[114]WirelessHARTHART is an open and realizable protocol for WSNHART is suitable for industrial automation

Table 6. Summary of Current IIoT Communication Protocols

Fig. 3.

Fig. 3. Tiered architecture of identified IIoT protocols in comparison with OSI reference model.

4.5 Application Layer

4.5.1 MQTT.

Data exchange between IIoT systems is through the MQTT protocol, owing to its lightweight nature. MQTT relies on a broker to publish and retrieve data, and as a result, it has several key vulnerabilities. First, a client is able to publish and subscribe to any topic. Second, the broker may be overloaded if a subscriber forgets to collect the message. Third, there are no distinct access control techniques to prevent a client from subscribing to and publishing any topic. In this context, a potential attacker may try to find the most subscribed topic and exploit this information [101].

4.5.2 CoAP.

The constrained application protocol (CoAP) is a lightweight communication protocol designed specifically for the IoT and IIoT. In IIoT applications, where devices are often constrained in terms of limitations on resources such as memory, processing power, and battery life, CoAP can be a valuable protocol choice. It allows devices to communicate efficiently and effectively while conserving resources. Also, CoAP is particularly useful in IIoT applications, because it provides support for resource discovery, observation, block transfer, and proxying. These features make it easy for devices to discover each other and communicate efficiently. As an application layer protocol, CoAP is used for communication where dedicated devices are prevalent in an IoT-based infrastructure [65]. The security services in CoAP are more dependent on datagram transport layer security [102]. In the context of the IIoT, a massive payload may cause data fragmentation, which further opens the IIoT surface to potential attacks.

4.6 Transport Layer

4.6.1 MODBUS TCP.

MODBUS TCP is suitable for the control and monitoring of industrial applications in IIoT environments [65]. This can be complemented by the MQTT protocol through a publish and subscribe approach. Security threats include DoS attacks, privilege escalation, tampering, and spoofing. These vulnerabilities arise from the data transfer carried out by SSL/TLS, which is open to attacks [103, 104].

4.7 Network Layer

4.7.1 Zigbee.

This connectivity protocol is suitable for IIoT environments [105], and variants such as Zigbee Pro and Zigbee RFCE guarantee integrity by providing cryptographic security during transmission, confidentiality, and authenticity. Zigbee Pro is suitable for IIoT implementations, since it supports cryptographic transmission through encryption [106]. Among the security concerns associated with Zigbee is the key distribution method, where keys are pre-installed to devices in an insecure manner. Additionally, nodes can access communication even after leaving the network, and special software can be used to eavesdrop on or manipulate communication [107].

4.7.2 NB-IoT.

The narrowband IoT (NB-IoT) is suitable for IIoT ecosystems that have low power and reduced data rate constraints. The NB-IoT supports authentic communication via end-to-end security. However, the carriers in the NB-IoT are fully open, which creates an open surface for attacks, especially at the traffic nodes [108].

4.7.3 LoRaWAN and 6LowPAN.

The LoRaWAN protocol guarantees that information will be kept secret in IIoT environments through data encryption and decryption strategies. However, security flaws related to jamming and selective jamming attacks have been identified during communication [105]. The 6LowPAN protocol supports IIoT network connection based on low-power WPAN through IPv6, but it uses IPSEC for security services, which is a heavyweight and complex protocol [105].

4.8 Physical and Data Link Layers

4.8.1 Bluetooth.

Bluetooth supports short-range, low-power communication with a frequency of 2.4 GHz [109]. Its current security modes do not fully guarantee secure communication, given that there is a need to enforce service security levels. Bluetooth variants such as Bluetooth Low Energy (BLE) address authenticity, privacy, and integrity concerns, typically permitting a change of address to maintain privacy [110]. BLE suffers from numerous vulnerabilities, however, allowing attackers to leverage foot-printing approaches to collect information such as domain names, IP addresses, and access control lists. Additionally, attackers can perform bluesniffing, where unauthorized data is extracted from Bluetooth devices, and bluebugging, where attackers take control of the target device [111, 112].

4.8.2 IEEE 802.15.4.

This protocol provides general IIoT connectivity while guaranteeing data confidentiality, integrity, and a secure MAC layer [105]. However, 802.15.4 is vulnerable to keying techniques. Specifically, the single shared key aspect of this protocol offers little defense against a number of attacks [113].

4.8.3 WirelessHART.

WirelessHART is a key communication protocol for industrial process automation and the IIoT and has been approved as an open standard for WSN. This protocol is mainly concerned with energy and equipment monitoring, asset management, and general diagnosis. The HART protocol employs a single parity check for errors. This enables confidentiality, integrity, and authentication. While this protocol has been designed to be open and reliable, it has several limitations, since it does not support public cryptography and there is a lack of specification of the complete key management methodology. Additionally, there is no distinct authorization technique [114].

Note that the research discussed in this review is ongoing at the time of writing, and there are still some overlaps and similarities between generic IoT and IIoT, especially in terms of protocols. Generally, the weaknesses in generic IoT protocols are also relevant to the IIoT. Although the prime objective of the IIoT is to reinforce industrial system processes, it is also dependent on the actions involved in the generic IoT. Thus, failure of the actions in generic IoT protocols may have an impact on the IIoT.

4.9 IIoT Security Architectures and Standards

IIoT deployments are currently governed by the Industrial Internet Reference Architecture (IIRA) established by the Industrial Internet Consortium (IIC) [115], which explicitly stipulates the main roles played by cyber-physical-based technologies in the IIoT. From a security perspective, the IIC reference architecture includes a recommendation that the IIoT should position itself to give support to authentication protocols, non-repudiation, cryptographic protection, leveraging of quantum-resistant techniques during data transportation, connectivity, and efficient interoperability across systems. The OpenFog consortium [116] has devised a mechanism that brings IIoT processing close to the edge to guarantee the integrity, confidentiality, and availability of IIoT processes.

With the convergence of OT and IT, given that these prioritize systems differently, the industrial internet security framework (IISF) has been established as a common framework for security investigations in IIoT. This framework is, however, very generic and does not specifically articulate the key security aspects of the IIoT. Other key standards related to the security of the IIoT include ISO/IEC 29115 [117], which focuses on the security of endpoints, ISA/IEC 62443 [118], which focuses on authentication and vulnerability checks, ISO/IEC 29115 [117], which focuses on multifactor authentication and the need for cryptographic protocols, ISO/IEC 24760-1 [119], which focuses on secure identity, NIST-SP-800-82 [120], which stipulates the need for network segmentation in the IIoT and highlights communication requirements, NIST-FICIC [121], which focuses on risk management and security in the IIoT, and NISTIR-7628 [122], which focuses on cyber-security for smart grids. A summary of the security architectures and standards in the IIoT is presented in Table 7.

Table 7.
REFArchitecture/ StandardFocusSecurity descriptionLimitations
[115]IIoT reference architectureIndustrial Internet Security FrameworkCybersecurity assessment in the IIoTGeneric security measures
[118]ISA/IEC 62443IIoT levels of securityIdentification and authentication checkSecurity levels depend on the system
[117]ISO/IEC 29115IIoT levels of authenticationMultifactor authenticationThe credentials lifespan is too long
[119]ISO/IEC 24760-1IIoT levels of secure identityIdentifies a unique and secure identityIt is not definitely established what constitutes a secure identity
[120]NIST-SP-800-82Industrial control system securityNetwork segmentation Security policies Communication requirementsDoes not accommodate dynamic changes in IIoT ecosystems
[121]NIST-FICICCybersecurity for critical infrastructurePrinciple of risk management and securityComplexity of cybersecurity risk management
[122]NISTIR-7628Guidelines for securing smart gridCybersecurity strategy for smart infrastructuresChanges in cybersecurity requirements
[118]ISA/IEC 62443-4-2Security for industrial automationCybersecurity threats and risksBuilding extensions for enterprise security
[123]NIST-IIoTSecurity for the IIoTVulnerability risks and threatsLimited to integrity and authenticity

Table 7. Summary of Current IIoT Security Architectures and Standards

Skip 5IIoT Security Achievements Section

5 IIoT Security Achievements

Given that the realization of Industry 4.0 is dependent on innovative technological developments, this section assesses the state of IIoT-enabling technologies based on the approaches outlined in the Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of privilege (STRIDE) model [124]. STRIDE offers a unique approach to assessing threats and vulnerabilities (known and unknown) within IIoT ecosystems, resulting in a threat roadmap. This section concentrates on describing the key security achievements that have been realized in the IIoT as a result of the STRIDE model.

5.1 Key Management in IIoT

A lightweight key exchange (LKE) for Industry 4.0 solves the problem of illegitimate nodes in the IIoT. The key provides an assurance of mutual authentication across nodes through a secret key exchange, which is safe for the IIoT [125]. Other key exchange protocols include lightweight authentication for M2M communication in the IIoT based on hash and XOR tasks to target MITM and replay attacks [38], and a lightweight protocol for IIoT that is implemented via the MQTT protocol [126]. With this approach, MQTT is a suitable protocol for the industrial domain.

The key strategies that can be used to evaluate which security techniques offer protection for MQTT are as follows: payload encryption with the authenticated encryption scheme (AES), payload authentication with AES, payload-authenticated encryption with AES-offset codebook mode (AES-OCB), and link-layer encryption with AES, where it is possible to measure the latency between the publishing and processing times. A lightweight certificateless signature scheme for IIoT environments provides data authenticity [127], while an SDN-enabled multi-attribute method for secure communication over the smart grid of the IIoT monitors network traffic and dynamic routing [128]. A faster authentication key with perfect forward secrecy for the IIoT based on hash and XOR operations has been developed [129], and an interactive multifactor authenticated key exchange for IIoT invokes password hardening and exposes the attacker [130].

The key management approach shown in Figure 4 focuses on information retrieval and provides a robust means of supporting digital and textual searches in IIoT environments. The key management scenario shown in Figure 4 depicts a typical key management approach in an IIoT ecosystem. In this scenario, an IIoT operator requests a service provision from an IIoT service provider (Step 1). The key distribution center (KDC) manages the encryption keys (Step 2). The KDC communicates with a cloud key management center (Step 3) to exchange and manage encryption keys. To ensure that the KDC can be integrated with the IIoT application processes, the KDC integration must be done (Step 4). Once the KDC integration is complete, the IIoT user can request processes from the cloud key management center (Step 5). The cloud key management center generates a response (Step 6) and provides the necessary encryption keys to the KDC as presented in Figure 4.

Fig. 4.

Fig. 4. Scenario depicting key management approaches across IIoT layers.

Using a hybrid keyword field search key management (HKFS-KM) scheme, this approach supports trapdoor unlinkability and drastically reduces the costs associated with key storage while supporting key revocation to guarantee secure IIoT records [131]. A study by Yasmine et al. [132] identified security weaknesses in authentication and key management during data transmission in the IIoT. The major security flaws were identified as replay attacks, DoS attacks, mutual authentication, and session key agreement. A mutual authentication scheme was proposed, but this does not support heterogeneous WSN environments. Zhou et al. [133] found that compromising devices to extract secret keys is still a challenge in IIoT communication, especially in side-channel attacks. Key weaknesses include IIoT key management, devices not embedded with cryptographic keys, IoT devices being easily attackable, and the resource constraints of IoT devices. A summary of key management approaches is presented in Table 8.

Table 8.
ReferenceFocusSignificance to IIoT ecosystems
[38]Lightweight authentication for M2M communication in the IIoTTargets man-in-the-middle attacks on the IIoT
[125, 126]Lightweight authentication support for the IIoTDiscusses MQTT, SDN, and other M2M support protocols in the IIoT
[127]Lightweight certificateless signature scheme in the IIoTProvides data authenticity
[128]SDN-enabled multi-attributes for secure IIoTMonitors traffic and offers dynamic routing
[129]Authentication-based perfect forward secrecy in the IIoTUses XOR and hash to guarantee secrecy
[130]Interactive multi-factor authentication in IIoTHas password hardening and attacker exposure
[131]Key management for textual search in the IIoTGuarantees trapdoor unlinkability and privacy
[132]Weaknesses in authentication and key managementMutual authentication and session key agreement suggested
[133]Device compromising with compromised keysIdentifies devices that are not embedded with cryptographic keys

Table 8. Summary of State-of-the-art Studies on Key Management in IIoT Ecosystems

5.2 Blockchain Technology in IIoT

While streamed sensor data can be extracted in real-time from IIoT environments, it is important to have a guarantee that these data are secure. The blockchain offers a precise distributed immutable ledger that allows for stronger security through the creation of a computationally infeasible cryptographic block of hashes. A scenario for implementing the blockchain in IIoT is shown in Figure 5. In the scenario depicting blockchain in IIoT shown in Figure 5, the IIoT ecosystem comprises the perception layer, network layer, control layer, blockchain service layer, and application layer, each of which is associated with various IIoT domains such as manufacturing, robotics, and mining. The blockchain service layer comprises three key components, namely, blockchain service support, smart contract, and transaction management, which together provide the necessary functionality to enable secure and decentralized data sharing, auditing, and trust among IIoT stakeholders. Moreover, the blockchain service layer is connected to a blockchain network comprising both on-chain and off-chain blockchain networks. The on-chain network is secured by verifier nodes [134, 135], which are responsible for validating transactions and maintaining the integrity of the blockchain.

Fig. 5.

Fig. 5. Example of a scenario showing blockchain and edge in an IIoT system.

A blockchain scheme for collecting and sharing data in a multi-agent environment that combines Ethereum and deep learning techniques with a focus on achieving reliability has been proposed [136], but the mining nodes in this scheme are not intelligent. A truly fair non-repudiation blockchain scheme for IIoT has been developed as a service proxy for recording interactive evidence for providers in the IIoT. This technique has been verified using a homomorphic approach, but it has not yet been deployed in a real network-enabled IIoT platform for practical evaluation [137]. Current blockchain techniques are compared in Table 9. Studies using the blockchain have focused on IIoT access to equipment and power consumption, where the blockchain is deployed in high-performance systems to improve smart factory processes. For instance, a sharding–hashgraph technique that divides blockchain nodes has been employed for the purposes of optimization [138].

Table 9.
ReferenceFocusSignificance for IIoT ecosystems
[136]Scheme for collecting and sharing dataDiscusses how data can be shared in a multi-agent environment using machine learning
[139]Use of credit consensus in the IIoTDiscusses how the consensus protects data confidentiality and access control
[140]How scalability is achievedDiscusses how lack of energy efficiency and lack of standards hinders the IIoT
[141]How blockchain can give security assuranceDiscusses resource efficiency, secrecy, and maintenance of tasks using blockchain
[137]Non-repudiation scheme for the IIoTService proxy that records interactive evidence for providers
[142]Blockchain framework for the IIoTIdentifies zero-knowledge transactions for security purposes

Table 9. Summary of State-of-the-art Research on Blockchain Applications in IIoT Ecosystems

A secure blockchain approach that uses the credit consensus technique in IIoT has been established to protect data confidentiality. This method uses a directed acyclic structured blockchain with data access control, which decreases power consumption for genuine nodes while increasing power consumption for malicious nodes. However, the detection of malicious nodes requires further investigation [139]. Blockchain applications targeting Industry 4.0 face issues concerning scalability (given that blockchain computations require significant resources), inherent blockchain vulnerabilities, energy, and cost efficiency, and the absence of industrial standards and regulations [140]. Other relevant research has examined the integration of blockchain and edge frameworks for IIoT, addressing latency, resource efficiency, security, and monitoring of tasks, but neglecting system performance [141]. A blockchain-enabled framework for IIoT would face challenges involving zero-knowledge transactions, standardization, security, and privacy [142]. Generally, the blockchain offers a suitable mechanism for securing IoT transactions based on its characteristics of decentralization, effectiveness, transparency, and immutability [143].

5.3 Edge and Fog Security in IIoT

While edge computing is popular at present, its focus is on reducing the volume of transmitted data. Its current integration with the IIoT has intensified security threats related to data [144]. A substantial number of vulnerabilities occur in the fog layer as a result of data and IIoT application migration. One example is a malicious attack from the edge to the communication network, where machine learning strategies are preferred for purposes of defense. Major vulnerable points include attacks on fog nodes/adversarial manipulations during the provisioning of real-time services, authentication of identities, leakages of sensitive data at IIoT edge nodes due to limited storage, difficulties in processing data, complexity of edge computing IIoT networks, and the problem of sharing and searching encrypted data [100].

Figure 6 shows a scenario depicting edge and fog in IIoT. It consists of a perception layer where data is gathered and authenticated. This layer is followed by the edge gateway, which serves as the entry point for data into the fog layer. The fog layer controls encryption, key management, data storage, and data processing. The cloud layer provides additional storage and processing capabilities to the system. The cloud gateway transmits data between the cloud and the fog layer. Finally, the application layer provides the interface for users to interact with the IIoT system. In the IIoT domains, such as robotics, manufacturing, and mining, the system provides data extraction capabilities, allowing users to extract relevant data for analysis and decision-making.

Fig. 6.

Fig. 6. An example of a scenario showing edge and fog security in IIoT.

A technique that addresses device unreliability and vulnerabilities has been developed in Reference [145] to allow secure data storage processes in the IIoT while integrating fog and cloud computing. This allows the collected data to be stored and processed at the edge server. However, this approach requires the encryption of fog-based data and effective privacy-preserving data mining approaches. As a result of encrypting fog-based data, fog nodes are forced to aggregate data to seal any form of information leakage during data dissemination [146, 147]. Consequently, edge computing faces challenges such as a lack of computational power, storage issues, and poor battery resources. Other threats include physical tampering with edge devices, identity forging, eavesdropping over shared wired channels, jamming links in IoT devices, and data privacy, as well as the various risks associated with network function virtualization, with the offloading of tasks to rich platforms, and with SDN [148].

Given that massive amounts of data are generated in IIoT environments, moving these data to the cloud for real-time analysis is a challenge. Other relevant challenges include managing access to applications, maintaining confidentiality, mitigating vulnerabilities, applying cryptographic protocols to the data generated from IIoT environments, and monitoring IIoT-related security events in real-time. Additionally, the cloud faces its own challenges in terms of confidentiality, integrity, authenticity, and availability [149].

As far as confidentiality is concerned, threat agents can propagate through the cloud and leak sensitive data related to the IIoT. The ultimate objective of an adversary is to defeat the cloud security goals by gaining control of the IT assets. Integrity issues arise from common attacks where adversaries are able to alter or modify part or all of the data at rest or in motion across different cloud models. The authenticity of entities within the cloud poses a challenge because of the existence of numerous illegitimate users. These vulnerabilities are fundamental, given the open nature of the cloud.

Another critical aspect concerning susceptibility is the issue of permission and privileges, where insufficient authorization of sessions and permissions makes cloud data vulnerable and susceptible to attacks. Recent studies of critical cloud attacks have identified DoS and distributed DoS (DDoS) to be the most common attacks, mainly propagated by botnets, virtualization/hypervisor attacks, user-to-root attacks, port scanning, MITM attacks, spoofing, and physical attacks. Most of these attacks attempt to defeat provisioned cloud services during IIoT integration [150, 151]. A summary of the key achievements in edge and fog security is presented in Table 10.

Table 10.
ReferenceFocusSignificance for IIoT ecosystems
[100]Vulnerable adversarial manipulations in IIoT edge nodesNeed to address complexity in IIoT networks
[144]Integration of the volume of data in the IIoTVulnerabilities are experienced at the fog layer owing to application migration
[145]Device unreliability and vulnerabilities in the IIoT edgeNeed for encryption of data when fog and cloud integrate
[146, 147]Encrypting fog-based data in the IIoTSealing data leakage points as a way of enhancing security
[148]Computation and storage issues in the IIoTIdentifies the channels of compromise in the IoT
[149]State of massive data generated in the IIoT environmentData management solutions are key to managing huge volumes of data in the IIoT
[150, 151]Permission and privileges in the cloudSufficient authorization and sessions and privileges in the cloud reduce potential intrusions

Table 10. Summary of Identified State-of-the-art Studies of Edge and Fog Security in IIoT Ecosystems

Skip 6State-of-the-art Research in IoT and IIoT Forensics Section

6 State-of-the-art Research in IoT and IIoT Forensics

The digitization of manufacturing processes further extends the attack and threat landscape and enhances the level of susceptibility, which could increase the potential for digitally propagated crimes. As a result, there is a constant need to analyze potential digital evidence to provide proof or prove facts if a potential security incident is detected. To date, there has been relatively little research on IIoT forensics, although some studies have explored how digital forensic investigations can be conducted in the IIoT, as well as the significant current challenges. We explore IIoT forensic investigations from the standpoint of integrating IoT-based forensic applications with industrial processes and assess how the prevailing IoT-based forensic models could be positioned to conduct digital forensic activities. A summary of the key research focusing on IIoT is presented in Table 11.

Table 11.
YearForensic modelFocusLimitations
2020

Acquisition based on state forensics [158]

Evidence identification link for IoT environments [166]

Cyber forensics framework for IoT big data [167]

Forensic analysis for IoT fitness trackers

Forensic logging model in IoT ecosystems [168]

Forensics of emergent configurations in live forensics [169]

Utilizes controller to IoT device, controller to cloud, and controller to controller

Evidence identification link for the IoT environment

Uses MapReduce to extract and analyze dynamic traffic features

Allows user to view measured data on connected devices, analysis

Event model and design architecture that supports the IoT in a cloud ecosystem

Utilizes machine learning for learning based on new configurations

Forensic soundness for the acquisition controller is not explored

Investigation is not carried out in the real world with real-time monitoring

Relevance is for the collected data, and there is no focus on live forensic analysis

Limited to mobile IoT devices

Not validated using any experiments; chain of custody and forensic soundness are hardly explored

The study is dependent on intelligent approaches and self-adaptive systems

2019

IIoT forensic frameworks [154]

Cross-forensic layer and evidence extraction

Lack of live forensic analysis component in IIoT environments

2018

Integrated IoT forensic framework [170]

FIF-IoT framework [171]

Forensic edge management [172]

Integrates readiness process groups with IoT management policy and standards

IoT forensic investigation using public ledger; verifies integrity

Requirement for managing solutions, specifically the autonomy of systems

Policies are only oriented to IoT environments

Limited to IoT-based systems, without any IIoT integration

Mapping with other forensic tools is hardly explored

2017

SCADA forensics in the IIoT [153]

Application-specific model for the IoT [173]

Model for smart cities and automated vehicles [174]

Digital evidence acquisition model for the IoT [175]

Incident identification and forensic extraction

Smart environments, network, and things forensics as extraction-of-evidence techniques

Targets vehicle ECM data from data hub/GPS and cellular devices to create forensics images

Theoretical model based on investigative zones

Lack of certified forensic incident response tool and methodologies

Lack of fusion mechanisms with IIoT platforms

Standards used may not translate and fit across IIoT environments

Model lacks validation owing to its theoretical nature

2016

Generic framework for IoT investigations [6]

Complies with ISO/IEC 27043, proactive forensics, cloud, network, and device-level forensics

Limited to IoT devices, network, and cloud

2015

Monitoring ICS and SCADA systems [152]

Top-down IoT forensic model [176]

Continuous monitoring of PLCs for analysis purposes

Planning and authorization as approaches to IoT forensic process

Lack of certified forensic incident response tool and methodologies

Investigation spectrum does not cover IIoT platforms, and there are no integration components

Table 11. Summary of State-of-the-art Research on IoT and IIoT Forensics

Currently, there exist vulnerabilities in the physical infrastructure that underpins IIoT applications, e.g., the CPS, ICS, and SCADA systems. Thus, there is a dire need for post-incident response strategies. For example, research by Cruz et al. [152] suggests placing a shadow security unit in parallel with field devices as an approach for continuous monitoring of PLCs, which could be leveraged for forensic purposes. Research on SCADA forensics has identified that current SCADA employs cloud-based technologies and suggests the following essentials: identifying the incident origin, assessing the system risks and alterations, identifying the SCADA impact and status, and live forensics, before employing rapid response, compatibility, and remote data acquisition techniques. This approach is useful for conducting digital investigations in IIoT but is limited by the available forensic artifact extraction tools [153]. An IIoT forensic investigation framework [154] suggests the collection of digital evidence to mitigate IIoT-based vulnerabilities. This study outlines the relationship between the OSI layer model and cross-layer forensic information and suggests a higher layer for digital forensic information in the IIoT [154].

Considering the existing digital forensic challenges in the IoT, MacDermott et al. [155] highlighted several shortcomings that have resulted from the changing landscape of digital crimes. The sources of evidence from IIoT environments were identified as smart devices and sensors, hardware and software, intrusion detection systems (IDS), firewalls, ISPs, mobile providers, and other online identities. IoT forensic techniques have been mapped to privacy as a feasible way of conducting digital investigations through the sharing of data by devices through a privacy-aware IoT forensic model [156]. For example, an IoT forensic model that underpins infrastructures has been constructed for Amazon Echo as a use-case and is able to support identification, acquisition, analysis, and presentation using a generic IoT architecture [157].

A forensic acquisition technique for the IoT based on the state of events has been developed and proved for controller-to-IoT, controller-to-cloud, and controller-to-controller cases. Through the use of an IP camera, it has been shown that relevant data based on states can be extracted from IoT devices [158]. Notably, a taxonomy for the challenges faced in IoT forensics has identified forensic tools, models, and sources of evidence as crucial aspects to consider in the IoT environment [159]. A technique for defending logged data against attack using anti-forensic techniques has been developed through data aggregation and encryption in an IoT setup with the modified information dispersal algorithm. This approach is based on the fragments transmitted from IoT devices [160].

A forensic-aware ecosystem for the IoT has been established to collect and analyze evidence systematically by supporting different IoT subdomains [161]. Subsequent studies have shown that IoT forensic challenges mainly target encryption and storage of data in the cloud. The IoT forensic tools and techniques for preserving volatile data have been identified as key aspects of IoT forensic research, but there are few IoT forensics tools with data acquisition capabilities [162].

A fog-based framework for IoT forensics has identified several challenges based on use-cases and implementation. As an example, a refrigerator was connected to a fog node as part of a home automation system. Although the effectiveness of this framework was not evaluated, it was able to reproduce some techniques for achieving digital forensics [163]. Research focused on IoT opportunities and challenges suggests that search, seizure, evidence correlation and analysis, and IoT attribution are core challenges [164]. Additionally, complexity and diversification, chain of custody, and limited storage for IoT devices require further research [165].

Other challenges include the type and quantity of data, blurred lines between networks, and the type and source of evidence [177]. A framework for IoT acquisition and forensics has identified data location, data format, data extraction, and data type as key forensic characteristics [178]. An efficient approach that combines cloud forensics with client-side forensics has been suggested for the Amazon Alexa ecosystem, with a proof-of-concept focused on identification and acquisition analysis from local devices [179]. Other relevant work includes the analysis of bulk digital forensic data as a semi-automated approach for scanning disparate digital forensics data subsets and data from IoT portable devices. There are also cross-device and cross-analysis approaches that are appropriate for diverse digital forensic cases [180]. Additionally, live forensic analysis in emerging configurations in IoT environments could utilize K-nearest neighbors, support vector machines (SVMs), naive Bayes classifiers, and random forest algorithms. These approaches illustrate how datasets could be utilized for the live detection of potential incidents [169].

Other IoT-based frameworks include a top-down IoT model for planning and authorization of forensic processes [176], integrated IoT forensic frameworks [170] that stipulate which IoT-based standards can be leveraged, and an application-specific model [173] for the IoT that extracts evidence from smart home and smart city devices. Acquisition based on a state forensics model has been explored [158] with both controller-to-IoT device and IoT-to-controller processes included in the forensics. A model for smart cities and smart vehicles [174] targets ECM data from the vehicle data hub to create forensic images. A digital evidence acquisition model [175] for the IoT environment uses graphs to model flows, whereas the FIF-IoT approach [171] uses a public ledger to verify evidence integrity. Research has also covered a cyber-forensics framework for IoT big data [167], forensic edge management for autonomous systems integrated with IoT networks [172], a forensic model for IoT trackers [181], and a forensic logging model for IoT ecosystems that supports cloud computing [168].

The existing overlap between the IoT and IIoT means that, in the context of this article, IIoT forensics are represented as a large-scale post-event/reactive technique that targets critical IIoT forensic information domains [154]. Examples include network protocols targeting ICS/SCADA, forensics from the lowest layers (physical layer), evidence from higher layers (bit-level forensics) from SCADA, PLCs, sensors, communication gateways, and network-level forensics [154]. As far as IoT forensics is concerned, information may be extracted from the respective layers, mostly from networked mobile digital devices; it should be noted here that mobile forensics lies at the center of the IoT. While the IIoT, IoT, and mobile forensics share a need for forensic evidence (digital data), there are major differences between them with regard to the complexity involved in extracting these data and the diverse range of architectures. This complexity, among other challenges, should ultimately underlie the forensic soundness and sanctity of potential digital evidence from the IIoT, IoT, and mobile forensic architectures for the purpose of litigation in the event of a security incident.

Skip 7OPEN CHALLENGES Section

7 OPEN CHALLENGES

The preceding sections have highlighted the security requirements in IIoT ecosystems, the state of IIoT ecosystems in terms of architectures and protocols, IIoT ecosystem security achievements, and the state of digital forensics in the IIoT. Based on this analysis, we now identify the open challenges relating to these technologies from a security and digital forensic perspective. The categories of these challenges are depicted in Figure 7, and a summary of the challenges and high-level solutions is given in Table 12.

Table 12.
CategoryChallengePossible high-level solutions
Perception layer challenges

Lack of security by design

Unattested device firmwares/CPS integrity

Device cloning/PUF emulation

Design CPS components with security functionalities

Need for standard device compliance techniques

Use obfuscation techniques to prevent PUF cloning

Network layer challenges

Weak authentication/lack of encryption in Bluetooth

Single shared key in 802.15.4

Unlicensed open band in the NB-IoT

Flaws during encryption of LoRaWAN

Heavyweight Protocols in 6LoWPAN

Use link encryption for data transmission in Bluetooth

Consideration of asymmetric encryption to limit node compromise in 802.15.4

Utilize licensed bands to mitigate issue of traffic offloading in the NB-IoT

Adopt alternative encryption technique to AES128 in LoRaWAN

IPSEC is not feasible for the IIoT; instead integrate IPSEC with industrial IoT networks and use adaptable key-establishing techniques in 6LoWPAN

Application layer challenges

Expanded cyber-attack surface

IIoT system is dependent on single dynamic processing/huge processing power

Insider attacks

Absence of compliance security standards and guidelines in IIoT processes

Susceptible distributed mining nodes

Focus on intelligent approaches to mitigate potential threats

Use AI-based solutions

Develop application-specific security standards

Focus on making mining nodes intelligent

Security management challenges

Existing cybersecurity frameworks have limitations with regard to heterogeneous IoT system support.

Key security challenges arise from OT and IT integration

Need for a resilient harmonized framework that supports OT and IT systems in real time

Propose a common framework that addresses security of OT and IT convergence

Digital forensics challenges

Lack of certified digital forensic investigation tools and methods for the IIoT

Lack of accredited standards and guidelines relevant to the IIoT

Lack of investigation process models tailored for the IIoT

Need for certification of specific investigation tools for the IIoT

Need for developing international standards and investigation guidelines

Need to develop holistic digital investigation frameworks and models that have the IIoT as their main focus

Integration of OT/IT communication mechanisms with 5G technologies

Table 12. Summary of Current Security Challenges and High-level Solutions

Fig. 7.

Fig. 7. Mind-map categorizing the current open challenges explored in this review.

7.1 Challenges in the Application Layer

The shift from conventional industrial processes to smart connectivity will mean that advanced industrial processes become wholly dependent on wireless connectivity, standards, and protocols. However, this opens the threat and attack landscape further. Thus, if IIoT networks are attacked, then the industrial production output will be compromised and human lives may be put at risk.

Realizing smart manufacturing implies that the majority of systems will be able to act in a self-adaptive manner with some self-dynamic reconfiguration ability. This implies that dynamic production processes will become centered on single dynamic production as opposed to centralized management, which is susceptible to failures and requires huge processing power.

Normally, attackers will use diverse and alternative techniques to reach the CPS. Hence, insider or physical attacks may be used to undermine the security of the IIoT.

Currently, there are no universally accepted security standard compliance techniques, security monitoring, or standardized devices that can be employed in IIoT environments.

At present, most blockchain processes in the IIoT are distributed transactions. However, some mining nodes in these transactions are not intelligent, which may make them susceptible to attack.

7.2 Challenges in the Network Layer

The current spectrum of IIoT connectivity protocols does not guarantee a higher degree of security during data communication. For example, Bluetooth has insecure modes that expose the device to malware. BLE security mode 1, level 1 has weaker authentication or encryption, which makes it insecure [182]. Additionally, pairing techniques do not offer protection, which makes Bluetooth vulnerable to MITM and eavesdropping attacks and could eventually lead to data manipulation.

IEEE 802.15.4 uses a single shared key session that offers little defense against replay attacks. Additionally, this standard cannot guarantee the confidentiality and integrity of acknowledged packets [183].

NB-IoT (WAN) uses unlicensed bands, from which malicious nodes can offload traffic [184].

LoRaWAN has a number of security vulnerabilities, with flaws in AES during encryption and an inability for partners to fix shared keys to some values. The AES cryptography algorithm uses 128-bit keystreams that allow the key to be XORed with the message to generate the ciphertext [185]. Given that LoRaWAN utilizes a 128-bit AES algorithm to encrypt its message, certain weaknesses may produce a non-optimal ciphertext that can be decrypted. Additionally, LoRaWAN allows an adversary to modify a message over the connection.

The IPSEC currently being used in 6LoWPAN is a heavyweight protocol, which means it is unsuitable for IIoT environments.

MQTT faces challenges relating to DDoS, information disclosure, and spoofing [186]. In addition, clients may easily subscribe to any topics, creating a likely vulnerability that could allow the subscribed topics to be exposed to attackers.

Currently, secure key management and exchange is an open challenge owing to the resource constraints on the physical devices and user data. Most key exchange approaches suffer from heavyweight cryptographic protocols that are overly complex as far as computation is concerned. There also exist challenges in terms of applying encryption to diverse firmware, some of which will have been altered.

7.3 Challenges in the Perception Layer

Currently, the majority of devices employed in IIoT environments are not manufactured with security capabilities (i.e., there is a lack of security by design), causing them to fail during or after deployment. Most CPS involve the integration of embedded systems and physical processes, and so a lack of security may lead to significant vulnerabilities. With the ever-changing nature of system architectures, most devices and systems are built without security functionalities, and those that do have security functionalities may rapidly become outdated. Additionally, most systems operate in real time, combining sensor data, devices, and actuators. Ultimately, the absence of security by design leads to susceptibility and unreliability and creates more vulnerabilities.

The core challenge is to verify the integrity of the CPS/IIoT devices used in IIoT environments. Currently, there exist numerous devices with diverse firmware and no efficient scheme for the attestation of these systems. The nature of CPS is to complete real-time tasks and ensure that they satisfy security goals, key among which is the integrity of data and devices. Continued digitization in IIoT environments has resulted in diversification of physical devices and a wide-ranging variety of CPS devices, which suffer from attestation problems. This can be attributed to variation in or lack of acceptable compliance standards during device on-boarding processes. Lack of proper attestation of these devices creates an environment that allows physical damage, which may threaten human lives and create integrity issues regarding the data collected from sensing environments.

Currently, where the IoT meets the IIoT, there is a higher degree of cloning of physical devices as a form of IIoT attack. Cloning is usually a social engineering approach that allows attackers to maliciously deceive unsuspecting victims in cases where a device or malicious link is dispatched as a legitimate one. Security in the IIoT requires the utilization of physically unclonable functions (PUFs), which guarantee a secure approach for storing digital information in integrated circuits [187]. However, where OT and IT converge, there may arise vulnerable situations that allow attackers to gain knowledge on how the PUFs operate. In the long run, attackers may be able to model an identical PUF to emulate the original. Using this approach, it would be easy to circumvent the memory contents of integrated circuits. The ultimate effect of this is data leakage and side-channel attacks.

7.4 Challenges for Security Management

An assessment of security challenges is now presented, with an emphasis on the point where OT and IT systems converge. This is because of the need to ensure that key information security goals are maintained while enforcing security for the CPS. Based on this study, the following are identified as key security-related challenges:

The convergence of OT and IT brings together two differing environments, which have different architectures, operations, and challenges.

Managing security aspects of OT/IT integration is a key challenge for the following reasons:

OT and IT integration comes with new and emerging security threats and vulnerabilities.

There is currently an absence of key industrial standards addressing the disparities that exist as a result of OT and IT integration. In the long run, it is vital to determine who handles what security task, given the different structures.

Current OT and IT security postures in IIoT exhibit quite huge gaps due to the absence of a common understanding on how threats, vulnerabilities, and attacks should be handled.

Owing to the resource-constrained nature of IIoT devices, current cybersecurity frameworks are unable to support heterogeneous IoT systems and CPS in real time.

7.5 Challenges for Digital Forensics in IIoT Ecosystems

Based on the current state of digital forensics in IIoT, this subsection discusses the prevailing open challenges. To date, there has been a lack of adequate studies of digital forensics in the IIoT. The following are presented as current open challenges:

The majority of IIoT systems previously operated as SCADA/CPS, where most networks were isolated. Given that digital forensics stipulates that the correct tools and methodologies should be used during an investigation, there is currently a lack of forensically certified tools for IIoT forensic investigations.

At present, there are few guidelines or accredited standards and legal frameworks that stipulate how digital forensic incidents should be handled in the pre- and post-incident response phases in IIoT environments [188]. This is due to the disparities that exist between connected IIoT environments and normal IT environments.

Existing forensic investigation process models are tailored to address generic IT systems, where digital evidence is carefully extracted based on prescribed processes. However, in the context of the IIoT, there is not yet any definition of how a digital forensic investigation process model would be used.

Given that the IIoT involves the collection and analysis of data and personal information, there is a lack of approaches to data privacy and protection, which is a major concern [13].

The IIoT extends over multiple and diverse jurisdictions, which makes it difficult to determine the appropriate laws and regulations to be used when coordinating digital forensic investigations [13].

Skip 8FUTURE DIRECTIONS Section

8 FUTURE DIRECTIONS

The challenges and limitations addressed in this article cover a wide scope with a multitude of facets. While a number of the challenges identified in the IoT have some similarities with IIoT challenges, the former are more closely associated with device diversity and the corresponding security mechanisms, while the latter are associated with the security aspects of smart industrial processes and the corresponding security and digital forensic investigation techniques.

With the continuous increase in the number of devices and the volume of data across IIoT systems, it is vital that diverse data processing techniques be incorporated. In most instances, the processing techniques applied are not standardized or widely accepted, which raises key security, privacy, and data confidentiality concerns.

A number of studies have formulated proposals for authentication techniques, specifically during the key management stage. Although some of these methods appear to be pertinent, it is important to note that the majority of existing key agreement techniques are not widely deployed across heterogeneous environments. This leads to concerns regarding the security and secrecy of keys and data during communication.

According to the key objectives of Industry 4.0, the IIoT is integral to industrial control processes. As such, integrating key security achievements such as blockchains, smart contracts, and key management techniques with 5G technologies could harden the security of the IIoT by preventing energy theft. The addition of security layers could result in stronger authentication and authorization mechanisms, where only the authorized user’s details and secret keys are maintained.

Consequently, with the key achievements in edge and fog computing in the IIoT come privacy concerns during data processing at the edge. In achieving threat intelligence, federated data models are locally trained at the edge nodes and then shared to the global nodes. Thus, it is important to investigate how the shared intelligence of data is aggregated and shared across heterogeneous environments for the purposes of privacy and adversarial concerns in IIoT ecosystems.

Based on the connectivity that has arisen as a result of the 5G standard, it is projected that key achievements will be realized in mobile edge applications, making IIoT processes more effective through the expected lower latency of machine communication. While this is a key opportunity for faster communication across IIoT networks, it may also open further vulnerabilities, with IIoT ecosystems becoming susceptible owing to the heterogeneity of the services supported by 5G in the IIoT.

Finally, there remains a need for security standards for blockchains, given their paramount importance to the safeguarding of the IIoT from compromise, especially during the integration of smart contracts. Furthermore, the detection of malicious nodes in a blockchain requires key edge intelligence aspects of resource utilization.

Skip 9CONCLUSION Section

9 CONCLUSION

The IIoT is still in a process of development, with current advances being geared toward enabling the industrial and manufacturing processes that will realize Industry 4.0. This paradigm shift is allowing systems to accumulate and analyze data to make certain decisions.

In this article, the state-of-the-art of IIoT ecosystems has been comprehensively studied from security and digital forensics perspectives to help identify the existing open challenges. The state-of-the-art has been explored in terms of IIoT ecosystem security parameters, connectivity protocols, security-enabling technologies, and digital forensics. Key security achievements and open challenges have also been identified, along with key high-level solutions.

The IIoT is still being integrated into our daily lives with the aim of improving quality through continuous industrial automation or processes leveraging IoT-based applications. Our state-of-the-art survey has provided a comprehensive analysis of existing research, from which it is evident that the current IIoT suffers from relatively weak security protocols and a lack of unified accepted standards. Together, these weaknesses make IIoT integration vulnerable to a variety of security attacks.

REFERENCES

  1. [1] Sharma Neha, Shamkuwar Madhavi, and Singh Inderjit. 2019. The history, present and future with IoT. In Internet of Things and Big Data Analytics for Smart Generation. Springer, 2751.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Ali Bako and Awad Ali Ismail. 2018. Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 18, 3 (2018). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Hermann M., Pentek T., and Otto B.. 2016. Design principles for Industrie 4.0 scenarios. IEEE Computer Society1730 Massachusetts Ave., NW Washington, DCUnited States.Google ScholarGoogle Scholar
  4. [4] Lu Yang. 2017. Cyber physical system (CPS)-based Industry 4.0: A survey. J. Industr. Integ. Manag. 2, 03 (2017), 1750014.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Xu Li Da, He Wu, and Li Shancang. 2014. Internet of things in industries: A survey. IEEE Trans. Industr. Inform. 10, 4 (2014), 22332243.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Kebande Victor R. and Ray Indrakshi. 2016. A generic digital forensic investigation framework for internet of things (IoT). In IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud’16). IEEE, 356362.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Sisinni Emiliano, Saifullah Abusayeed, Han Song, Jennehag Ulf, and Gidlund Mikael. 2018. Industrial internet of things: Challenges, opportunities, and directions. IEEE Trans. Industr. Inform. 14, 11 (2018), 47244734.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Bakhshi Zeinab, Balador Ali, and Mustafa Jawad. 2018. Industrial IoT security threats and concerns by considering Cisco and Microsoft IoT reference models. In IEEE Wireless Communications and Networking Conference Workshops (WCNCW’18). IEEE, 173178.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Sengupta Jayasree, Ruj Sushmita, and Bit Sipra Das. 2020. A secure fog-based architecture for Industrial Internet of Things and Industry 4.0. IEEE Trans. Industr. Inform. 17, 4 (2020), 23162324.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Freund Lucas and Al-Majeed Salah. 2020. Modelling industrial IoT system complexity. In International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT’20). IEEE, 15.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Awad Ali Ismail, Shokry Mostafa, Khalaf Ashraf A. M., and Abd-Ellah Mahmoud Khaled. 2023. Assessment of potential security risks in advanced metering infrastructure using the OCTAVE Allegro approach. Comput. Electric. Eng. 108 (2023), 108667.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Kebande Victor R.. 2022. Industrial internet of things (IIoT) forensics: The forgotten concept in the race towards Industry 4.0. Forens. Sci. Int.: Rep. 5 (2022), 100257. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Victor Rigworo Kebande.Industrial Internet of Things (IIoT) Forensics: challenges, opportunities, and future directions. Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Frizelle GDM. 1996. Getting the measure of complexity. Manuf. Eng. 75, 6 (1996), 268–70.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Pivoto Diego G. S., Almeida Luiz F. F. de, Righi R. da Rosa, Rodrigues J. J. P. C., Lugli Alexandre Baratella, and Alberti Antonio M.. 2021. Cyber-physical systems architectures for Industrial Internet of Things applications in Industry 4.0: A literature review. J. Manuf. Syst. 58 (2021), 176192.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Younan Mina, Houssein Essam H., Elhoseny Mohamed, and Ali Abdelmgeid A.. 2020. Challenges and recommended technologies for the Industrial Internet of Things: A comprehensive review. Measurement 151 (2020), 107198.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Tange Koen, Donno Michele De, Fafoutis Xenofon, and Dragoni Nicola. 2020. A systematic survey of Industrial Internet of Things security: Requirements and fog computing opportunities. IEEE Commun. Surv. Tutor. 22, 4 (2020), 24892520.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Karmakar Avish, Dey Naiwrita, Baral Tapadyuti, Chowdhury Manojeet, and Rehan Md. 2019. Industrial internet of things: A review. In International Conference on Opto-electronics and Applied Optics (Optronix’19). IEEE, 16.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Xu Hansong, Yu Wei, Griffith David, and Golmie Nada. 2018. A survey on Industrial Internet of Things: A cyber-physical systems perspective. IEEE Access 6 (2018), 7823878259.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Jayalaxmi Pls, Saha Rahul, Kumar Gulshan, Kumar Neeraj, and Kim Tai-Hoon. 2021. A taxonomy of security issues in Industrial Internet-of-Things: Scoping review for existing solutions, future implications, and research challenges. IEEE Access 9 (2021), 2534425359.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Chalapathi G. Sai Sesha, Chamola Vinay, Vaish Aabhaas, and Buyya Rajkumar. 2019. Industrial internet of things (IIoT) applications of edge and fog computing: A review and future directions. arXiv preprint arXiv:1912.00595 (2019).Google ScholarGoogle Scholar
  22. [22] Liao Yongxin, Loures Eduardo de Freitas Rocha, and Deschamps Fernando. 2018. Industrial internet of things: A systematic literature review and insights. IEEE Internet Things J. 5, 6 (2018), 45154525.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Sadeghi Ahmad-Reza, Wachsmann Christian, and Waidner Michael. 2015. Security and privacy challenges in Industrial Internet of Things. In 52nd Annual Design Automation Conference. 16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Polychronou Nikolaos-Foivos, Thevenon Pierre-Henri, Puys Maxime, and Beroulle Vincent. 2021. A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in IoT/IIoT devices, and their detection mechanisms. ACM Trans. Des. Autom. Electron. Syst. 27, 1 (2021), 135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Oztemel Ercan and Gursev Samet. 2020. Literature review of Industry 4.0 and related technologies. J. Intell. Manuf. 31, 1 (2020), 127182.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Sequeiros João B. F., Chimuco Francisco T., Samaila Musa G., Freire Mário M., and Inácio Pedro R. M.. 2020. Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design. ACM Comput. Surv. 53, 2 (2020), 132.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Alcácer Vítor and Cruz-Machado Virgilio. 2019. Scanning the Industry 4.0: A literature review on technologies for manufacturing systems. Eng. Sci. Technol. Int. J. 22, 3 (2019), 899919.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Boyes Hugh, Hallaq Bil, Cunningham Joe, and Watson Tim. 2018. The Industrial Internet of Things (IIoT): An analysis framework. Comput. Industr. 101 (2018), 112.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Serror Martin, Hack Sacha, Henze Martin, Schuba Marko, and Wehrle Klaus. 2021. Challenges and opportunities in securing the Industrial Internet of Things. IEEE Trans. Industr. Inform. 17, 5 (2021), 29852996.DOI:Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Malik Varun Rakesh, Gobinath K., Khadsare Santosh, Lakra Ajay, and Akulwar Subodh V.. 2021. Security challenges in Industry 4.0 SCADA systems—A digital forensic prospective. In International Conference on Artificial Intelligence and Computer Science Technology (ICAICST’21). 229233. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Wang Qin, Zhu Xinqi, Ni Yiyang, Gu Li, and Zhu Hongbo. 2020. Blockchain for the IoT and industrial IoT: A review. Internet Things 10 (2020), 100081.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Rojko Andreja. 2017. Industry 4.0 concept: Background and overview. Int. J. Interact. Mob. Technol. 11, 5 (2017).Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Zaouini M.. 2017. Nine challenges of Industry 4.0. IIoT World. Retrieved from https://iiot-world.com/-connected-industry/nine-challenges-of-industry-4-0/Google ScholarGoogle Scholar
  34. [34] Kebande Victor R., Alawadi Sadi, Awaysheh Feras M., and Persson Jan A.. 2021. Active machine learning adversarial attack detection in the user feedback process. IEEE Access 9 (2021), 3690836923.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Kaloudi Nektaria and Li Jingyue. 2020. The AI-based cyber threat landscape: A survey. ACM Comput. Surv. 53, 1 (2020), 134.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Kiennert Christophe, Ismail Ziad, Debar Herve, and Leneutre Jean. 2018. A survey on game-theoretic approaches for intrusion detection and response optimization. ACM Comput. Surv. 51, 5 (2018), 131.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Burhan Muhammad, Rehman Rana Asif, Khan Bilal, and Kim Byung-Seo. 2018. IoT elements, layered architectures and security issues: A comprehensive survey. Sensors 18, 9 (2018), 2796.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Esfahani Alireza, Mantas Georgios, Matischek Rainer, Saghezchi Firooz B., Rodriguez Jonathan, Bicaku Ani, Maksuti Silia, Tauber Markus G., Schmittner Christoph, and Bastos Joaquim. 2017. A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet Things J. 6, 1 (2017), 288296.Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Schmid Stefan, Bröring Arne, Kramer Denis, Käbisch Sebastian, Zappa Achille, Lorenz Martin, Wang Yong, Rausch Andreas, and Gioppo Luca. 2016. An architecture for interoperable IoT ecosystems. In International Workshop on Interoperability and Open-source Solutions. Springer, 3955.Google ScholarGoogle Scholar
  40. [40] Bröring Arne, Schmid Stefan, Schindhelm Corina-Kim, Khelil Abdelmajid, Käbisch Sebastian, Kramer Denis, Phuoc Danh Le, Mitic Jelena, Anicic Darko, and Teniente Ernest. 2017. Enabling IoT ecosystems through platform interoperability. IEEE Softw. 34, 1 (2017), 5461.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. [41] Mazhelis Oleksiy, Luoma Eetu, and Warma Henna. 2012. Defining an internet-of-things ecosystem. In Internet of Things, Smart Spaces, and Next Generation Networking. Springer, 114.Google ScholarGoogle Scholar
  42. [42] Leminen Seppo, Westerlund Mika, Rajahonka Mervi, and Siuruainen Riikka. 2012. Towards IoT ecosystems and business models. In Internet of Things, Smart Spaces, and Next Generation Networking. Springer, 1526.Google ScholarGoogle Scholar
  43. [43] Westerlund Mika, Leminen Seppo, and Rajahonka Mervi. 2014. Designing business models for the internet of things. Technol. Innov. Manag. Rev. (2014), 514.Google ScholarGoogle ScholarCross RefCross Ref
  44. [44] Delicato Flavia C., Pires Paulo F., Batista Thais, Cavalcante Everton, Costa Bruno, and Barros Thomaz. 2013. Towards an IoT ecosystem. In 1st International Workshop on Software Engineering for Systems-of-systems. 2528.Google ScholarGoogle Scholar
  45. [45] Madaan Nishtha, Ahad Mohd Abdul, and Sastry Sunil M.. 2018. Data integration in IoT ecosystem: Information linkage as a privacy threat. Comput. Law Secur. Rev. 34, 1 (2018), 125133.Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Liu Xin, Zhai Xiangping Bryce, Lu Weidang, and Wu Celimuge. 2019. QoS-guarantee resource allocation for multibeam satellite Industrial Internet of Things with NOMA. IEEE Trans. Industr. Inform. 17, 3 (2019), 20522061.Google ScholarGoogle ScholarCross RefCross Ref
  47. [47] Li Chaoqun, Liu Yang, Xiao Jing, and Zhou Jie. 2022. MCEAACO-QSRP: A novel QoS-secure routing protocol for Industrial Internet of Things. IEEE Internet Things J. 9, 19 (2022), 1876018777.Google ScholarGoogle ScholarCross RefCross Ref
  48. [48] Fraile Francisco, Tagawa Takuya, Poler Raul, and Ortiz Angel. 2018. Trustworthy industrial IoT gateways for interoperability platforms and ecosystems. IEEE Internet Things J. 5, 6 (2018), 45064514.Google ScholarGoogle ScholarCross RefCross Ref
  49. [49] Rathee Geetanjali, Sharma Ashutosh, Kumar Rajiv, and Iqbal Razi. 2019. A secure communicating things network framework for industrial IoT using blockchain technology. Ad Hoc Netw. 94 (2019), 101933.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. [50] V. Skwarek. 2017. Blockchains as security-enabler for industrial IoT-applications. Asia Pacific Journal of Innovation and Entrepreneurship 11, 3 (2017), 301–311.Google ScholarGoogle Scholar
  51. [51] Zuehlke Detlef. 2008. SmartFactory—From vision to reality in factory technologies. IFAC Proc. Vol. 41, 2 (2008), 1410114108.Google ScholarGoogle ScholarCross RefCross Ref
  52. [52] Zuehlke Detlef. 2010. SmartFactory—Towards a factory-of-things. Ann. Rev. Contr. 34, 1 (2010), 129138.Google ScholarGoogle ScholarCross RefCross Ref
  53. [53] Kubler Sylvain, Robert Jérémy, Hefnawy Ahmed, Främling Kary, Cherifi Chantal, and Bouras Abdelaziz. 2017. Open IoT ecosystem for sporting event management. IEEE Access 5 (2017), 70647079.Google ScholarGoogle ScholarCross RefCross Ref
  54. [54] Moore James F.. 1993. Predators and prey: A new ecology of competition. Harv. Busin. Rev. 71, 3 (1993), 7586.Google ScholarGoogle Scholar
  55. [55] Rahulamathavan Yogachandran, Phan Raphael C.-W., Rajarajan Muttukrishnan, Misra Sudip, and Kondoz Ahmet. 2017. Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS’17). IEEE, 16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [56] Miraz Mahdi H. and Ali Maaruf. 2018. Blockchain enabled enhanced IoT ecosystem security. In International Conference for Emerging Technologies in Computing. Springer, 3846.Google ScholarGoogle ScholarCross RefCross Ref
  57. [57] Ogrodowczyk Łukasz, Belter Bartosz, and LeClerc Marc. 2016. IoT ecosystem over programmable SDN infrastructure for smart city applications. In 5th European Workshop on Software-Defined Networks (EWSDN’16). IEEE, 4951.Google ScholarGoogle Scholar
  58. [58] Woodhead Roy, Stephenson Paul, and Morrey Denise. 2018. Digital construction: From point solutions to IoT ecosystem. Autom. Construct. 93 (2018), 3546.Google ScholarGoogle ScholarCross RefCross Ref
  59. [59] Vakintis Ioannis, Panagiotakis Spyros, Mastorakis George, and Mavromoustakis Constandinos X.. 2016. Evaluation of a web crowd-sensing IoT ecosystem providing big data analysis. In Resource Management for Big Data Platforms. Springer, 461488.Google ScholarGoogle ScholarCross RefCross Ref
  60. [60] Malik Praveen Kumar, Sharma Rohit, Singh Rajesh, Gehlot Anita, Satapathy Suresh Chandra, Alnumay Waleed S., Pelusi Danilo, Ghosh Uttam, and Nayak Janmenjoy. 2021. Industrial internet of things and its applications in Industry 4.0: State of the art. Comput. Commun. 166 (2021), 125139.Google ScholarGoogle ScholarCross RefCross Ref
  61. [61] Hui Hongwen, Zhou Chengcheng, Xu Shenggang, and Lin Fuhong. 2020. A novel secure data transmission scheme in Industrial Internet of Things. China Commun. 17, 1 (2020), 7388.Google ScholarGoogle ScholarCross RefCross Ref
  62. [62] Qadri Yazdan Ahmad, Nauman Ali, Zikria Yousaf Bin, Vasilakos Athanasios V., and Kim Sung Won. 2020. The future of healthcare internet of things: A survey of emerging technologies. IEEE Commun. Surv. Tutor. 22, 2 (2020), 11211167. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  63. [63] Zikria Yousaf Bin, Afzal Muhammad Khalil, and Kim Sung Won. 2020. Internet of Multimedia Things (IoMT): Opportunities, Challenges and Solutions. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  64. [64] Yu Xingjie and Guo Huaqun. 2019. A survey on IIoT security. In IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS’19). IEEE, 15.Google ScholarGoogle Scholar
  65. [65] Jaloudi Samer. 2019. Communication protocols of an Industrial Internet of Things environment: A comparative study. Fut. Internet 11, 3 (2019), 66.Google ScholarGoogle ScholarCross RefCross Ref
  66. [66] Nurelmadina Nahla, Hasan Mohammad Kamrul, Memon Imran, Saeed Rashid A., Ariffin Khairul Akram Zainol, Ali Elmustafa Sayed, Mokhtar Rania A., Islam Shayla, Hossain Eklas, and Hassan Md Arif. 2021. A systematic review on cognitive radio in low power wide area network for industrial IoT applications. Sustainability 13, 1 (2021), 338.Google ScholarGoogle ScholarCross RefCross Ref
  67. [67] Petrenko Alexey S., Petrenko Sergei A., Makoveichuk Krystina A., and Chetyrbok Petr V.. 2018. The IIoT/IoT device control model based on narrow-band IoT (NB-IoT). In IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus’18). IEEE, 950953.Google ScholarGoogle ScholarCross RefCross Ref
  68. [68] Alkhabbas Fahed, Alsadi Mohammed, Alawadi Sadi, Awaysheh Feras M., Kebande Victor R., and Moghaddam Mahyar T.. 2022. ASSERT: A blockchain-based architectural approach for engineering secure self-adaptive IoT systems. Sensors 22, 18 (2022), 6842.Google ScholarGoogle ScholarCross RefCross Ref
  69. [69] Yu Dachao, Li Wenyu, Xu Hao, and Zhang Lei. 2020. Low reliable and low latency communications for mission critical distributed Industrial Internet of Things. IEEE Commun. Lett. 25, 1 (2020), 313317.Google ScholarGoogle ScholarCross RefCross Ref
  70. [70] Lu Yinzhi, Yang Liu, Yang Simon X., Hua Qiaozhi, Sangaiah Arun Kumar, Guo Tan, and Yu Keping. 2022. An intelligent deterministic scheduling method for ultralow latency communication in edge enabled Industrial Internet of Things. IEEE Trans. Industr. Inform. 19, 2 (2022), 17561767.Google ScholarGoogle ScholarCross RefCross Ref
  71. [71] Zhang Changwei, Sun Xinghua, Zhang Jun, Wang Xianbin, Jin Shi, and Zhu Hongbo. 2019. Throughput optimization with delay guarantee for massive random access of M2M communications in industrial IoT. IEEE Internet Things J. 6, 6 (2019), 1007710092.Google ScholarGoogle ScholarCross RefCross Ref
  72. [72] Kumar Arvind, Matam Rakesh, Swain Srinibas, Tripathy Somanath, Mukherjee Mithun, and Lloret Jaime. 2022. Delay aware fault-tolerant concurrent data collection trees in shared IIoT applications. In IEEE Global Communications Conference. IEEE, 323328.Google ScholarGoogle ScholarCross RefCross Ref
  73. [73] Zhou Qinbin, Zhao Taotao, Chen Xiaomin, Zhong Yuesheng, and Luo Heng. 2022. A fault-tolerant transmission scheme in SDN-based industrial IoT (IIoT) over fiber-wireless networks. Entropy 24, 2 (2022), 157.Google ScholarGoogle ScholarCross RefCross Ref
  74. [74] Awad Ali Ismail, Furnell Steven, Paprzycki Marcin, and Sharma Sudhir Kumar. 2021. Security in Cyber-physical Systems: Foundations and Applications (1st ed.). Springer.Google ScholarGoogle ScholarCross RefCross Ref
  75. [75] Awad Ali Ismail and Abawajy Jemal. 2021. Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications (1st ed.). John Wiley & Sons: New Jersey, NJ.Google ScholarGoogle ScholarCross RefCross Ref
  76. [76] Spathoulas Georgios and Katsikas Sokratis. 2019. Towards a secure Industrial Internet of Things. In Security and Privacy Trends in the Industrial Internet of Things. Springer, 2945.Google ScholarGoogle ScholarCross RefCross Ref
  77. [77] Hassaballah M., Hameed Mohamed Abdel, Awad Ali Ismail, and Muhammad Khan. 2021. A novel image steganography method for Industrial Internet of Things security. IEEE Trans. Industr. Inform. 17, 11 (2021), 77437751.DOI:Google ScholarGoogle ScholarCross RefCross Ref
  78. [78] Langner Ralph. 2011. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Secur. Privac. 9, 3 (2011), 4951.Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. [79] Lier Ben van. 2017. The Industrial Internet of Things and cyber security: An ecological and systemic perspective on security in digital industrial ecosystems. In 21st International Conference on System Theory, Control and Computing (ICSTCC’17). IEEE, 641647.Google ScholarGoogle Scholar
  80. [80] Wurm Jacob, Hoang Khoa, Arias Orlando, Sadeghi Ahmad-Reza, and Jin Yier. 2016. Security analysis on consumer and industrial IoT devices. In 21st Asia and South Pacific Design Automation Conference (ASP-DAC’16). IEEE, 519524.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. [81] Hazra Abhishek, Adhikari Mainak, Amgoth Tarachand, and Srirama Satish Narayana. 2021. A comprehensive survey on interoperability for IIoT: Taxonomy, standards, and future directions. ACM Comput. Surv. 55, 1 (2021), 135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. [82] Bodei Chiara, Chessa Stefano, and Galletta Letterio. 2019. Measuring security in IoT communications. Theoret. Comput. Sci. 764 (2019), 100124.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. [83] Hossain M. Shamim, Muhammad Ghulam, Rahman Sk Md Mizanur, Abdul Wadood, Alelaiwi Abdulhameed, and Alamri Atif. 2016. Toward end-to-end biometrics-based security for IoT infrastructure. IEEE Wirel. Commun. 23, 5 (2016), 4451.Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. [84] Sodhro Ali Hassan, Awad Ali Ismail, Beek Jaap van de, and Nikolakopoulos George. 2022. Intelligent authentication of 5G healthcare devices: A survey. Internet Things 20 (2022), 100610. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  85. [85] Agrawal Rahul, Verma Pratik, Sonanis Rahul, Goel Umang, De Aloknath, Kondaveeti Sai Anirudh, and Shekhar Suman. 2018. Continuous security in IoT using blockchain. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’18). IEEE, 64236427.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. [86] Ammar Mahmoud, Russello Giovanni, and Crispo Bruno. 2018. Internet of things: A survey on the security of IoT frameworks. J. Inf. Secur. Applic. 38 (2018), 827.Google ScholarGoogle ScholarCross RefCross Ref
  87. [87] Bertocci Vittorio. 2015. Modern Authentication with Azure Active Directory for Web Applications. Microsoft Press.Google ScholarGoogle Scholar
  88. [88] Lin Jie, Yu Wei, Zhang Nan, Yang Xinyu, Zhang Hanlin, and Zhao Wei. 2017. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4, 5 (2017), 11251142.Google ScholarGoogle ScholarCross RefCross Ref
  89. [89] Farooq Muhammad Umar, Waseem Muhammad, Khairi Anjum, and Mazhar Sadia. 2015. A critical analysis on the security concerns of internet of things (IoT). Int. J. Comput. Applic. 111, 7 (2015).Google ScholarGoogle ScholarCross RefCross Ref
  90. [90] Xingmei Xu, Jing Zhou, and He Wang. 2013. Research on the basic characteristics, the key technologies, the network architecture and security problems of the internet of things. In 3rd International Conference on Computer Science and Network Technology. IEEE, 825828.Google ScholarGoogle ScholarCross RefCross Ref
  91. [91] Ahmed Nadeem, Kanhere Salil S., and Jha Sanjay. 2005. The holes problem in wireless sensor networks: A survey. ACM SIGMOBILE Mob. Comput. Commun. Rev. 9, 2 (2005), 418.Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. [92] Noor Mardiana binti Mohamad and Hassan Wan Haslina. 2019. Current research on internet of things (IoT) security: A survey. Comput. Netw. 148 (2019), 283294.Google ScholarGoogle ScholarCross RefCross Ref
  93. [93] Ahemd Mian Muhammad, Shah Munam Ali, and Wahid Abdul. 2017. IoT security: A layered approach for attacks & defenses. In International Conference on Communication Technologies (ComTech). IEEE, 104110.Google ScholarGoogle ScholarCross RefCross Ref
  94. [94] Miessler Daniel. 2015. Securing the internet of things: Mapping attack surface areas using the OWASP IoT top 10. In RSA Conference.Google ScholarGoogle Scholar
  95. [95] Nazir Sajid, Patel Shushma, and Patel Dilip. 2017. Assessing and augmenting SCADA cyber security: A survey of techniques. Comput. Secur. 70 (2017), 436454.Google ScholarGoogle ScholarCross RefCross Ref
  96. [96] A. Bicaku. 2020. Security Standard Compliance in System of Systems (Doctoral dissertation, Luleå University of Technology). https://www.diva-portal.org/smash/record.jsf?pid=diva2%3A1459036&dswid=2436Google ScholarGoogle Scholar
  97. [97] Bicaku Ani, Schmittner Christoph, Rottmann Patrick, Tauber Markus, and Delsing Jerker. 2019. Security safety and OrganizationalStandard compliance in cyber physicalsystems. Infocommun. J. 11, 1 (2019), 29.Google ScholarGoogle ScholarCross RefCross Ref
  98. [98] Bicaku Ani, Tauber Markus, and Delsing Jerker. 2020. Security standard compliance and continuous verification for Industrial Internet of Things. Int. J. Distrib. Sensor Netw. 16, 6 (2020), 1550147720922731.Google ScholarGoogle ScholarCross RefCross Ref
  99. [99] Aman Muhammad N., Chua Kee Chaing, and Sikdar Biplab. 2016. Position paper: Physical unclonable functions for IoT security. In 2nd ACM International Workshop on IoT Privacy, Trust, and Security. 1013.Google ScholarGoogle Scholar
  100. [100] Hongmei He, Carsten Maple, Tim Watson, Ashutosh Tiwari, Jörn Mehnen, Yaochu Jin, and Bogdan Gabrys. 2016. The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In 2016 IEEE Congress on Evolutionary Computation (CEC’16). IEEE, 1015–1021.Google ScholarGoogle Scholar
  101. [101] Harsha M. S., Bhavani B. M., and Kundhavai K. R.. 2018. Analysis of vulnerabilities in MQTT security using Shodan API and implementation of its countermeasures via authentication and ACLs. In International Conference on Advances in Computing, Communications and Informatics (ICACCI’18). IEEE, 22442250.Google ScholarGoogle ScholarCross RefCross Ref
  102. [102] Dierks Tim and Rescorla Eric. 2008. The transport layer security (TLS) protocol version 1.2. (2008).Google ScholarGoogle Scholar
  103. [103] Chen Fu, Huo Yujia, Zhu Jianming, and Fan Dan. 2020. A review on the study on MQTT security challenge. In IEEE International Conference on Smart Cloud (SmartCloud’20). IEEE, 128133.Google ScholarGoogle ScholarCross RefCross Ref
  104. [104] Hunkeler Urs, Truong Hong Linh, and Stanford-Clark Andy. 2008. MQTT-S-A publish/subscribe protocol for wireless sensor networks. In 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE’08). IEEE, 791798.Google ScholarGoogle ScholarCross RefCross Ref
  105. [105] Frenzel Lou. 2013. What is the difference between IEEE 802.15.4 and ZigBee wireless. Electron. Des. 22 (2013).Google ScholarGoogle Scholar
  106. [106] Raposo Duarte, Rodrigues André, Sinche Soraya, Silva Jorge Sá, and Boavida Fernando. 2018. Industrial IoT monitoring: Technologies and architecture proposal. Sensors 18, 10 (2018), 3568.Google ScholarGoogle ScholarCross RefCross Ref
  107. [107] Razouk Wissam, Crosby Garth V., and Sekkaki Abderrahim. 2014. New security approach for ZigBee weaknesses. Procedia Comput. Sci. 37 (2014), 376381.Google ScholarGoogle ScholarCross RefCross Ref
  108. [108] Hanes David, Salgueiro Gonzalo, Grossetete Patrick, Barton Robert, and Henry Jerome. 2017. IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things. Cisco Press.Google ScholarGoogle Scholar
  109. [109] Lonzetta Angela M., Cope Peter, Campbell Joseph, Mohd Bassam J., and Hayajneh Thaier. 2018. Security vulnerabilities in Bluetooth technology as used in IoT. J. Sensor Actuat. Netw. 7, 3 (2018), 28.Google ScholarGoogle ScholarCross RefCross Ref
  110. [110] III Albert F. Harris, Khanna Vansh, Tuncay Guliz, Want Roy, and Kravets Robin. 2016. Bluetooth low energy in dense IoT environments. IEEE Commun. Mag. 54, 12 (2016), 3036.Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. [111] Sandhya S. and Devi K. A. Sumithra. 2012. Analysis of Bluetooth threats and v4.0 security features. In International Conference on Computing, Communication and Applications. IEEE, 14.Google ScholarGoogle ScholarCross RefCross Ref
  112. [112] Qu Yanzhen and Chan Philip. 2016. Assessing vulnerabilities in Bluetooth Low Energy (BLE) wireless network based IoT systems. In IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity’16), IEEE International Conference on High Performance and Smart Computing (HPSC’16), and IEEE International Conference on Intelligent Data and Security (IDS’16). IEEE, 4248.Google ScholarGoogle ScholarCross RefCross Ref
  113. [113] Sastry Naveen and Wagner David. 2004. Security considerations for IEEE 802.15.4 networks. In 3rd ACM Workshop on Wireless Security. 3242.Google ScholarGoogle Scholar
  114. [114] Raza Shahid, Slabbert Adriaan, Voigt Thiemo, and Landernäs Krister. 2009. Security considerations for the WirelessHART protocol. In IEEE Conference on Emerging Technologies & Factory Automation. IEEE, 18.Google ScholarGoogle ScholarCross RefCross Ref
  115. [115] Hanna Steve, Kumar Srinivas, and Weber Dean. 2018. IIC endpoint security best practices. Guide d’usage, Industrial Internet Consortium (2018). https://www.iiconsortium.org/pdf/Endpoint_Security_Best_Practices_Final_Mar_2018.pdfGoogle ScholarGoogle Scholar
  116. [116] Group OpenFog Consortium Architecture Working et al. 2017. OpenFog reference architecture for fog computing. OPFRA001 20817 (2017), 162.Google ScholarGoogle Scholar
  117. [117] ISO/IEC. 2016. 29115: 2013 information technology–Security techniques–Entity authentication assurance framework, 2013. ISO.org 1, 1 (2016), 130.Google ScholarGoogle Scholar
  118. [118] ISA/IEC. 2020. 62443: 2020 standard specifies security capabilities for control system components. ISA.org 1, 1 (2020), 130.Google ScholarGoogle Scholar
  119. [119] ISO/IEC. 2011. 24760: 2011 information technology–Security techniques–A framework for identity management assurance framework, 2011. ISO.org 1, 1 (2011), 130.Google ScholarGoogle Scholar
  120. [120] NIST. 2019. NISTSP800-82: 2015 Guide to Industrial Control Systems (ICS) security. NIST.gov 1, 1 (2019), 1247.Google ScholarGoogle Scholar
  121. [121] ISO/IEC. 2014. NIST: 2014 National Institute of Standards and Technology (NIST): Framework for improving critical infrastructure cybersecurity, version 1.0, National Institute of Standards and Technology. ISO.org 1, 1 (2014), 130.Google ScholarGoogle Scholar
  122. [122] NIST. 2014. NISTIR-7628: 2014 guidelines for smart grid cybersecurity—Smart grid cybersecurity strategy, architecture, and high-level requirements. NIST.gov 1, 1 (2014), 2668.Google ScholarGoogle Scholar
  123. [123] NIST Document. 2019. NIST: 2019 Securing the Industrial Internet of Things. NIST.gov 1, 1 (2019), 130.Google ScholarGoogle Scholar
  124. [124] Danielis Peter, Beckmann Moritz, and Skodzik Jan. 2020. An ISO-compliant test procedure for technical risk analyses of IoT systems based on STRIDE. In IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC’20). IEEE, 499504.Google ScholarGoogle ScholarCross RefCross Ref
  125. [125] Gaba Gurjot Singh, Kumar Gulshan, Monga Himanshu, Kim Tai-Hoon, Liyanage Madhusanka, and Kumar Pardeep. 2020. Robust and lightweight key exchange (LKE) protocol for Industry 4.0. IEEE Access 8 (2020), 132808132824.Google ScholarGoogle ScholarCross RefCross Ref
  126. [126] Katsikeas Sotirios, Fysarakis Konstantinos, Miaoudakis Andreas, Bemten Amaury Van, Askoxylakis Ioannis, Papaefstathiou Ioannis, and Plemenos Anargyros. 2017. Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol. In IEEE Symposium on Computers and Communications (ISCC’17). IEEE, 11931200.Google ScholarGoogle Scholar
  127. [127] Karati Arijit, Islam S. K. Hafizul, and Karuppiah Marimuthu. 2018. Provably secure and lightweight certificateless signature scheme for IIoT environments. IEEE Trans. Industr. Inform. 14, 8 (2018), 37013711.Google ScholarGoogle ScholarCross RefCross Ref
  128. [128] Chaudhary Rajat, Aujla Gagangeet Singh, Garg Sahil, Kumar Neeraj, and Rodrigues Joel J. P. C.. 2018. SDN-enabled multi-attribute-based secure communication for smart grid in IIoT environment. IEEE Trans. Industr. Inform. 14, 6 (2018), 26292640.Google ScholarGoogle ScholarCross RefCross Ref
  129. [129] Yang Zheng, He Jun, Tian Yangguang, and Zhou Jianying. 2019. Faster authenticated key agreement with perfect forward secrecy for Industrial Internet-of-Things. IEEE Trans. Industr. Inform. 16, 10 (2019), 65846596.Google ScholarGoogle ScholarCross RefCross Ref
  130. [130] Zengpeng Li, Zheng Yang, Pawel Szalachowski, and Jianying Zhou. 2020. Building low-interactivity multifactor authenticated key exchange for industrial internet of things. IEEE Internet of Things Journal 8, 2 (2020), 844–859.Google ScholarGoogle Scholar
  131. [131] Miao Yinbin, Liu Ximeng, Deng Robert H., Wu Hongjun, Li Hongwei, Li Jiguo, and Wu Dapeng. 2018. Hybrid keyword-field search with efficient key management for Industrial Internet of Things. IEEE Trans. Industr. Inform. 15, 6 (2018), 32063217.Google ScholarGoogle ScholarCross RefCross Ref
  132. [132] Harbi Yasmine, Aliouat Zibouda, Refoufi Allaoua, Harous Saad, and Bentaleb Abdelhak. 2019. Enhanced authentication and key management scheme for securing data transmission in the internet of things. Ad Hoc Netw. 94 (2019), 101948.Google ScholarGoogle ScholarDigital LibraryDigital Library
  133. [133] Zhou Lu, Yeh Kuo-Hui, Hancke Gerhard, Liu Zhe, and Su Chunhua. 2018. Security and privacy for the Industrial Internet of Things: An overview of approaches to safeguarding endpoints. IEEE Sig. Process. Mag. 35, 5 (2018), 7687.Google ScholarGoogle ScholarCross RefCross Ref
  134. [134] Tkachuk Roman-Valentyn, Ilie Dragos, Robert Remi, Kebande Victor, and Tutschku Kurt. 2023. On the performance of consensus mechanisms in privacy-enabled decentralized peer-to-peer renewable energy marketplace. In 26th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN’23). IEEE, 179186.Google ScholarGoogle ScholarCross RefCross Ref
  135. [135] Roman-Valentyn Tkachuk, Dragos Ilie, Remi Robert, Victor Kebande, and Kurt Tutschku. 2023. Towards efficient privacy and trust in decentralized blockchain-based peer-to-peer renewable energy marketplace. Sustainable Energy, Grids and Networks 35 (2023), 101146.Google ScholarGoogle Scholar
  136. [136] Liu Chi Harold, Lin Qiuxia, and Wen Shilin. 2018. Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning. IEEE Trans. Industr. Inform. 15, 6 (2018), 35163526.Google ScholarGoogle ScholarCross RefCross Ref
  137. [137] Xu Yang, Ren Ju, Wang Guojun, Zhang Cheng, Yang Jidian, and Zhang Yaoxue. 2019. A blockchain-based nonrepudiation network computing service scheme for industrial IoT. IEEE Trans. Industr. Inform. 15, 6 (2019), 36323641.Google ScholarGoogle ScholarCross RefCross Ref
  138. [138] Ningjie Gao, Ru Huo, Shuo Wang, Tao Huang, and Yunjie Liu. 2021. Sharding-hashgraph: A high-performance blockchain-based framework for industrial internet of things with hashgraph mechanism. IEEE Internet of Things Journal 9, 18 (2021), 17070–17079.Google ScholarGoogle Scholar
  139. [139] Huang Junqin, Kong Linghe, Chen Guihai, Wu Min-You, Liu Xue, and Zeng Peng. 2019. Towards secure industrial IoT: Blockchain system with credit-based consensus mechanism. IEEE Trans. Industr. Inform. 15, 6 (2019), 36803689.Google ScholarGoogle ScholarCross RefCross Ref
  140. [140] Alladi Tejasvi, Chamola Vinay, Parizi Reza M., and Choo Kim-Kwang Raymond. 2019. Blockchain applications for Industry 4.0 and industrial IoT: A review. IEEE Access 7 (2019), 176935176951.Google ScholarGoogle ScholarCross RefCross Ref
  141. [141] Kumar Tanesh, Harjula Erkki, Ejaz Muneeb, Manzoor Ahsan, Porambage Pawani, Ahmad Ijaz, Liyanage Madhusanka, Braeken An, and Ylianttila Mika. 2020. BlockEdge: Blockchain-edge framework for industrial IoT networks. IEEE Access 8 (2020), 154166154185.Google ScholarGoogle ScholarCross RefCross Ref
  142. [142] S. Zhao, S. Li, and Y. Yao. 2019. Blockchain enabled industrial internet of things technology. IEEE Transactions on Computational Social Systems 6, 6 (2019), 1442–1453.Google ScholarGoogle Scholar
  143. [143] Atlam Hany F. and Wills Gary B.. 2019. Technical aspects of blockchain and IoT. In Advances in Computers. Vol. 115. Elsevier, 139.Google ScholarGoogle Scholar
  144. [144] Qiu Tie, Chi Jiancheng, Zhou Xiaobo, Ning Zhaolong, Atiquzzaman Mohammed, and Wu Dapeng Oliver. 2020. Edge computing in Industrial Internet of Things: Architecture, advances and challenges. IEEE Commun. Surv. Tutor. 22, 4 (2020), 24622488.Google ScholarGoogle ScholarCross RefCross Ref
  145. [145] Fu Jun-Song, Liu Yun, Chao Han-Chieh, Bhargava Bharat K., and Zhang Zhen-Jiang. 2018. Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans. Industr. Inform. 14, 10 (2018), 45194528.Google ScholarGoogle ScholarCross RefCross Ref
  146. [146] Hamad Hatem M. and Al-Hoby Mahmoud. 2012. Managing intrusion detection as a service in cloud networks. Int. J. Comput. Applic. 41, 1 (2012).Google ScholarGoogle ScholarCross RefCross Ref
  147. [147] Chu Cheng-Kang, Chow Sherman S. M., Tzeng Wen-Guey, Zhou Jianying, and Deng Robert H.. 2013. Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Trans. Parallel Distrib. Syst. 25, 2 (2013), 468477.Google ScholarGoogle Scholar
  148. [148] Pan Jianli and Yang Zhicheng. 2018. Cybersecurity challenges and opportunities in the new “edge computing+ IoT” world. In ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. 2932.Google ScholarGoogle Scholar
  149. [149] Ali Mazhar, Khan Samee U., and Vasilakos Athanasios V.. 2015. Security in cloud computing: Opportunities and challenges. Inf. Sci. 305 (2015), 357383.Google ScholarGoogle ScholarDigital LibraryDigital Library
  150. [150] Singh Ashish and Chatterjee Kakali. 2017. Cloud security issues and challenges: A survey. J. Netw. Comput. Applic. 79 (2017), 88115.Google ScholarGoogle ScholarDigital LibraryDigital Library
  151. [151] Trappe Wade, Howard Richard, and Moore Robert S.. 2015. Low-energy security: Limits and opportunities in the internet of things. IEEE Secur. Privac. 13, 1 (2015), 1421.Google ScholarGoogle ScholarDigital LibraryDigital Library
  152. [152] Cruz Tiago, Barrigas Jorge, Proença Jorge, Graziano Antonio, Panzieri Stefano, Lev Leonid, and Simões Paulo. 2015. Improving network security monitoring for industrial control systems. In IFIP/IEEE International Symposium on Integrated Network Management (IM’15). IEEE, 878881.Google ScholarGoogle Scholar
  153. [153] Eden Peter, Blyth Andrew, Jones Kevin, Soulsby Hugh, Burnap Pete, Cherdantseva Yulia, and Stoddart Kristan. 2017. SCADA system forensic analysis within IIoT. In Cybersecurity for Industry 4.0. Springer, 73101.Google ScholarGoogle ScholarCross RefCross Ref
  154. [154] Rondeau Christopher M., Temple Michael A., and Lopez Juan. 2019. Industrial IoT cross-layer forensic investigation. Wiley Interdiscip. Rev.: Forens. Sci. 1, 1 (2019), e1322.Google ScholarGoogle ScholarCross RefCross Ref
  155. [155] MacDermott Aine, Baker Thar, and Shi Qi. 2018. IoT forensics: Challenges for the IoA era. In 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS’18). IEEE, 15.Google ScholarGoogle ScholarCross RefCross Ref
  156. [156] Nieto Ana, Rios Ruben, and Lopez Javier. 2018. IoT-forensics meets privacy: Towards cooperative digital investigations. Sensors 18, 2 (2018), 492.Google ScholarGoogle ScholarCross RefCross Ref
  157. [157] Li Shancang, Choo Kim-Kwang Raymond, Sun Qindong, Buchanan William J., and Cao Jiuxin. 2019. IoT forensics: Amazon Echo as a use case. IEEE Internet Things J. 6, 4 (2019), 64876497.Google ScholarGoogle ScholarCross RefCross Ref
  158. [158] Meffert Christopher, Clark Devon, Baggili Ibrahim, and Breitinger Frank. 2017. Forensic state acquisition from internet of things (FSAIoT) a general framework and practical approach for IoT forensics through IoT device state acquisition. In 12th International Conference on Availability, Reliability and Security. 111.Google ScholarGoogle ScholarDigital LibraryDigital Library
  159. [159] Yaqoob Ibrar, Hashem Ibrahim Abaker Targio, Ahmed Arif, Kazmi S. M. Ahsan, and Hong Choong Seon. 2019. Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges. Fut. Gen. Comput. Syst. 92 (2019), 265275.Google ScholarGoogle ScholarDigital LibraryDigital Library
  160. [160] Noura Hassan N., Salman Ola, Chehab Ali, and Couturier Raphaël. 2020. DistLog: A distributed logging scheme for IoT forensics. Ad Hoc Netw. 98 (2020), 102061.Google ScholarGoogle ScholarDigital LibraryDigital Library
  161. [161] Zawoad Shams and Hasan Ragib. 2015. FAIoT: Towards building a forensics aware eco system for the internet of things. In IEEE International Conference on Services Computing. IEEE, 279284.Google ScholarGoogle ScholarDigital LibraryDigital Library
  162. [162] Wu Tina, Breitinger Frank, and Baggili Ibrahim. 2019. IoT ignorance is digital forensics research bliss: A survey to understand IoT forensics definitions, challenges and future research directions. In 14th International Conference on Availability, Reliability and Security. 115.Google ScholarGoogle ScholarDigital LibraryDigital Library
  163. [163] Al-Masri Eyhab, Bai Yan, and Li Juan. 2018. A fog-based digital forensics investigation framework for IoT systems. In IEEE International Conference on Smart Cloud (SmartCloud’18). IEEE, 196201.Google ScholarGoogle ScholarCross RefCross Ref
  164. [164] Conti Mauro, Dehghantanha Ali, Franke Katrin, and Watson Steve. 2018. Internet of Things security and forensics: Challenges and opportunities. (2018).Google ScholarGoogle Scholar
  165. [165] A. Alenezi, H. Atlam, R. Alsagri, M. Alassafi and G. Wills. 2019. IoT forensics: A state-of-the-art review, callenges and future directions. In Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk. 92277.Google ScholarGoogle Scholar
  166. [166] Alabdulsalam Saad Khalid, Duong Trung Q., Choo Kim-Kwang Raymond, and Le-Khac Nhien-An. 2020. Evidence identification and acquisition based on network link in an internet of things environment. In Conference on Complex, Intelligent, and Software Intensive Systems. Springer, 163173.Google ScholarGoogle Scholar
  167. [167] Chhabra Gurpal Singh, Singh Varinder Pal, and Singh Maninder. 2020. Cyber forensics framework for big data analytics in IoT environment using machine learning. Multim. Tools Applic. 79, 23 (2020), 1588115900.Google ScholarGoogle ScholarCross RefCross Ref
  168. [168] Pichan Ameer, Lazarescu Mihai, and Soh Sie Teng. 2020. A logging model for enabling digital forensics in IoT, in an inter-connected IoT, cloud eco-systems. In 4th World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4’20). IEEE, 478483.Google ScholarGoogle ScholarCross RefCross Ref
  169. [169] Kebande Victor R., Ikuesan Richard A., Karie Nickson M., Alawadi Sadi, Choo Kim-Kwang Raymond, and Al-Dhaqm Arafat. 2020. Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations (ECO) in IoT environments. Forens. Sci. Int.: Rep. 2 (2020), 100122.Google ScholarGoogle ScholarCross RefCross Ref
  170. [170] Kebande Victor R., Karie Nickson M., Michael Antonia, Malapane Semaka, Kigwana Ivans, Venter H. S., and Wario Ruth D.. 2018. Towards an integrated digital forensic investigation framework for an IoT-based ecosystem. In IEEE International Conference on Smart Internet of Things (SmartIoT’18). IEEE, 9398.Google ScholarGoogle ScholarCross RefCross Ref
  171. [171] Hossain Mahmud, Karim Yasser, and Hasan Ragib. 2018. FIF-IoT: A forensic investigation framework for IoT using a public digital ledger. In IEEE International Congress on Internet of Things (ICIOT’18). IEEE, 3340.Google ScholarGoogle Scholar
  172. [172] Oriwoh Edewede and Sant Paul. 2013. The forensics edge management system: A concept and design. In IEEE 10th International Conference on Ubiquitous Intelligence and Computing and IEEE 10th International Conference on Autonomic and Trusted Computing. IEEE, 544550.Google ScholarGoogle ScholarDigital LibraryDigital Library
  173. [173] Zia Tanveer, Liu Peng, and Han Weili. 2017. Application-specific digital forensics investigative model in internet of things (IoT). In 12th International Conference on Availability, Reliability and Security. 17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  174. [174] Feng Xiaohua, Dawam Edward Swarlat, and Amin Saad. 2017. A new digital forensics model of smart city automated vehicles. In IEEE International Conference on Internet of Things (iThings’17) and IEEE Green Computing and Communications (GreenCom’17) and IEEE Cyber, Physical and Social Computing (CPSCom’17) and IEEE Smart Data (SmartData’17). IEEE, 274279.Google ScholarGoogle ScholarCross RefCross Ref
  175. [175] Harbawi Malek and Varol Asaf. 2017. An improved digital evidence acquisition model for the internet of things forensic I: A theoretical framework. In 5th International Symposium on Digital Forensic and Security (ISDFS’17). IEEE, 16.Google ScholarGoogle Scholar
  176. [176] Perumal Sundresan, Norwawi Norita Md, and Raman Valliappan. 2015. Internet of things (IoT) digital forensic investigation model: Top-down forensic approach methodology. In 5th International Conference on Digital Information Processing and Communications (ICDIPC’15). IEEE, 1923.Google ScholarGoogle ScholarCross RefCross Ref
  177. [177] Oriwoh Edewede, Jazani David, Epiphaniou Gregory, and Sant Paul. 2013. Internet of things forensics: Challenges and approaches. In 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. IEEE, 608615.Google ScholarGoogle ScholarCross RefCross Ref
  178. [178] Chi Hongmei, Aderibigbe Temilola, and Granville Bobby C.. 2018. A framework for IoT data acquisition and forensics analysis. In IEEE International Conference on Big Data (Big Data’18). IEEE, 51425146.Google ScholarGoogle ScholarCross RefCross Ref
  179. [179] Chung Hyunji, Park Jungheum, and Lee Sangjin. 2017. Digital forensic approaches for Amazon Alexa ecosystem. Digit. Investig. 22 (2017), S15–S25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  180. [180] Quick Darren and Choo Kim-Kwang Raymond. 2018. IoT device forensics and data reduction. IEEE Access 6 (2018), 4756647574.Google ScholarGoogle ScholarCross RefCross Ref
  181. [181] Kang Serim, Kim Soram, and Kim Jongsung. 2020. Forensic analysis for IoT fitness trackers and its application. Peer-to-Peer Netw. Applic. 13, 2 (2020), 564573.Google ScholarGoogle ScholarCross RefCross Ref
  182. [182] Lorenzo Santiago Figueroa, Benito Javier Añorga, Cardarelli Pablo García, Garaia Jon Alberdi, and Juaristi Saioa Arrizabalaga. 2019. A comprehensive review of RFID and Bluetooth security: Practical analysis. Technologies 7, 1 (2019), 15.Google ScholarGoogle ScholarCross RefCross Ref
  183. [183] Sastry Naveen and Wagner David. 2004. Security considerations for IEEE 802.15.4 networks. In 3rd ACM Workshop on Wireless Security. 3242.Google ScholarGoogle Scholar
  184. [184] Yang Xiaowei, Wang Xiaoxiao, Wu Yuan, Qian Li Ping, Lu Weidang, and Zhou Haibo. 2017. Small-cell assisted secure traffic offloading for narrowband internet of thing (NB-IoT) systems. IEEE Internet Things J. 5, 3 (2017), 15161526.Google ScholarGoogle ScholarCross RefCross Ref
  185. [185] Phillip Rogaway. 2011. Evaluation of some blockcipher modes of operation. Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan 630 (2011).Google ScholarGoogle Scholar
  186. [186] Andy Syaiful, Rahardjo Budi, and Hanindhito Bagus. 2017. Attack scenarios and security analysis of MQTT communication protocol in IoT system. In 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI’17). IEEE, 16.Google ScholarGoogle ScholarCross RefCross Ref
  187. [187] Helfmeier Clemens, Boit Christian, Nedospasov Dmitry, and Seifert Jean-Pierre. 2013. Cloning physically unclonable functions. In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’13). IEEE, 16.Google ScholarGoogle Scholar
  188. [188] Victor Rigworo Kebande. 2023. On the need for standardizing industrial Internet of Things (IIoT) Forensics Processes. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM Computing Surveys
                ACM Computing Surveys  Volume 56, Issue 5
                May 2024
                1019 pages
                ISSN:0360-0300
                EISSN:1557-7341
                DOI:10.1145/3613598
                Issue’s Table of Contents

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 12 January 2024
                • Online AM: 9 December 2023
                • Accepted: 17 November 2023
                • Revised: 14 November 2023
                • Received: 11 February 2022
                Published in csur Volume 56, Issue 5

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • survey
              • Article Metrics

                • Downloads (Last 12 months)995
                • Downloads (Last 6 weeks)527

                Other Metrics

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader