Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey

The inherent complexities of Industrial Internet of Things (IIoT) architecture make its security and privacy issues becoming critically challenging. Numerous surveys have been published to review IoT security issues and challenges. The studies gave a general overview of IIoT security threats or a de...

Full description

Saved in:
Bibliographic Details
Main Authors: Tan, Soo Fun, Azman Samsudin
Format: Article
Language:English
English
Published: MDPI 2021
Subjects:
Online Access:https://eprints.ums.edu.my/id/eprint/32186/1/Recent%20Technologies%2C%20Security%20Countermeasure%20and%20Ongoing%20Challenges%20of%20Industrial%20Internet%20of%20Things%20%28IIoT%29.pdf
https://eprints.ums.edu.my/id/eprint/32186/2/Recent%20Technologies%2C%20Security%20Countermeasure%20and%20Ongoing%20Challenges%20of%20Industrial%20Internet%20of%20Things%20%28IIoT%291.pdf
https://eprints.ums.edu.my/id/eprint/32186/
https://www.mdpi.com/1424-8220/21/19/6647
https://doi.org/10.3390/s21196647
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The inherent complexities of Industrial Internet of Things (IIoT) architecture make its security and privacy issues becoming critically challenging. Numerous surveys have been published to review IoT security issues and challenges. The studies gave a general overview of IIoT security threats or a detailed analysis that explicitly focuses on specific technologies. However, recent studies fail to analyze the gap between security requirements of these technologies and their deployed countermeasure in the industry recently. Whether recent industry countermeasure is still adequate to address the security challenges of IIoT environment are questionable. This article presents a comprehensive survey of IIoT security and provides insight into today’s industry countermeasure, current research proposals and ongoing challenges. We classify IIoT technologies into the four-layer security architecture, examine the deployed countermeasure based on CIA+ security requirements, report the deficiencies of today’s countermeasure, and highlight the remaining open issues and challenges. As no single solution can fix the entire IIoT ecosystem, IIoT security architecture with a higher abstraction level using the bottom-up approach is needed. Moving towards a data-centric approach that assures data protection whenever and wherever it goes could potentially solve the challenges of industry deployment.