• Tidak ada hasil yang ditemukan

Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey

N/A
N/A
Protected

Academic year: 2024

Membagikan "Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey"

Copied!
1
0
0

Teks penuh

(1)

Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey

ABSTRACT

The inherent complexities of Industrial Internet of Things (IIoT) architecture make its security and privacy issues becoming critically challenging. Numerous surveys have been published to review IoT security issues and challenges. The studies gave a general overview of IIoT security threats or a detailed analysis that explicitly focuses on specific technologies. However, recent studies fail to analyze the gap between security requirements of these technologies and their deployed countermeasure in the industry recently. Whether recent industry countermeasure is still adequate to address the security challenges of IIoT environment are questionable. This article presents a comprehensive survey of IIoT security and provides insight into today’s industry countermeasure, current research proposals and ongoing challenges. We classify IIoT technologies into the four-layer security architecture, examine the deployed countermeasure based on CIA+ security requirements, report the deficiencies of today’s countermeasure, and highlight the remaining open issues and challenges. As no single solution can fix the entire IIoT ecosystem, IIoT security architecture with a higher abstraction level using the bottom-up approach is needed. Moving towards a data-centric approach that assures data protection whenever and wherever it goes could potentially solve the challenges of industry deployment.

Referensi

Dokumen terkait

Wang, A security and privacy model for mobile rfid systems in the internet of things, in: International Conference on Communication Technology Proceedings, ICCT,

ContentslistsavailableatScienceDirect Journal of Systems Architecture journalhomepage:www.elsevier.com/locate/sysarc Enhancing Internet of Things Security using Software-Defined

From the results of the integration of a series of home security monitoring system remotely using the concept of internet of things IoTs technology, this research has succeeded in

Index Terms—Internet of Things, edge computing, low-power embedded systems, microprocessor optimizations, IoT survey, adaptable microprocessors, heterogeneous architectures, energy

Zaharakis, “Cryptography and Security in Internet of Things IoTs: Models, Schemes, and Implementations”, IEEE proceedings of the 8th IFIP International Conference on New Technologies,

INTRODUCTION The Internet of things IoT describes physical objects or groups of such objects with sensors processing ability, software and other technologies that connect and exchange

Internet of Things or IoT are the devices with unique identifiers that share data or information over the internet whereas, Blockchain is a peer to peer network with a distributed

2, No.2; 2023 Published by Vocation and Certification Unit of UMG Design of Water PH Quality Monitoring System in PT SIER Industrial Area Based on Internet of Things at Waste Water