Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey
The inherent complexities of Industrial Internet of Things (IIoT) architecture make its security and privacy issues becoming critically challenging. Numerous surveys have been published to review IoT security issues and challenges. The studies gave a general overview of IIoT security threats or a de...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English English |
Published: |
MDPI
2021
|
Subjects: | |
Online Access: | https://eprints.ums.edu.my/id/eprint/32186/1/Recent%20Technologies%2C%20Security%20Countermeasure%20and%20Ongoing%20Challenges%20of%20Industrial%20Internet%20of%20Things%20%28IIoT%29.pdf https://eprints.ums.edu.my/id/eprint/32186/2/Recent%20Technologies%2C%20Security%20Countermeasure%20and%20Ongoing%20Challenges%20of%20Industrial%20Internet%20of%20Things%20%28IIoT%291.pdf https://eprints.ums.edu.my/id/eprint/32186/ https://www.mdpi.com/1424-8220/21/19/6647 https://doi.org/10.3390/s21196647 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The inherent complexities of Industrial Internet of Things (IIoT) architecture make its security and privacy issues becoming critically challenging. Numerous surveys have been published to review IoT security issues and challenges. The studies gave a general overview of IIoT security threats or a detailed analysis that explicitly focuses on specific technologies. However, recent studies fail to analyze the gap between security requirements of these technologies and their deployed countermeasure in the industry recently. Whether recent industry countermeasure is still adequate to address the security challenges of IIoT environment are questionable. This article presents a comprehensive survey of IIoT security and provides insight into today’s industry countermeasure, current research proposals and ongoing challenges. We classify IIoT technologies into the four-layer security architecture, examine the deployed countermeasure based on CIA+ security requirements, report the deficiencies of today’s countermeasure, and highlight the remaining open issues and challenges. As no single solution can fix the entire IIoT ecosystem, IIoT security architecture with a higher abstraction level using the bottom-up approach is needed. Moving towards a data-centric approach that assures data protection whenever and wherever it goes could potentially solve the challenges of industry deployment. |
---|