A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities

K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …

Challenges and opportunities in securing the industrial internet of things

M Serror, S Hack, M Henze, M Schuba… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Given the tremendous success of the Internet of Things in interconnecting consumer
devices, we observe a natural trend to likewise interconnect devices in industrial settings …

Recent advances on industrial data-driven energy savings: Digital twins and infrastructures

SY Teng, M Touš, WD Leong, BS How, HL Lam… - … and Sustainable Energy …, 2021 - Elsevier
Data-driven models for industrial energy savings heavily rely on sensor data,
experimentation data and knowledge-based data. This work reveals that too much research …

[HTML][HTML] Tackling faults in the industry 4.0 era—a survey of machine-learning solutions and key aspects

A Angelopoulos, ET Michailidis, N Nomikos… - Sensors, 2019 - mdpi.com
The recent advancements in the fields of artificial intelligence (AI) and machine learning
(ML) have affected several research fields, leading to improvements that could not have …

[HTML][HTML] A survey on physical unclonable function (PUF)-based security solutions for Internet of Things

A Shamsoshoara, A Korenda, F Afghah, S Zeadally - Computer Networks, 2020 - Elsevier
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …

IIoTEED: An enhanced, trusted execution environment for industrial IoT edge devices

S Pinto, T Gomes, J Pereira, J Cabral… - IEEE Internet …, 2017 - ieeexplore.ieee.org
With the advent of the Internet of Things (IoT), security has emerged as a major design goal
for smart connected devices. This explosion in connectivity created a larger attack surface …

A systematic security assessment and review of internet of things in the context of authentication

M Saqib, AH Moon - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …

LiKe: Lightweight certificateless key agreement for secure IoT communications

P Tedeschi, S Sciancalepore, A Eliyan… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Certificateless public-key cryptography (CL-PKC) schemes are particularly robust against
the leakage of secret information stored on a trusted third party (TTP). These security …

A review of low-end, middle-end, and high-end IoT devices

MO Ojo, S Giordano, G Procissi, IN Seitanidis - IEEE Access, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) devices play a crucial role in the overall development of IoT in
providing countless applications in various areas. Due to the increasing interest and rapid …

Hardware security for Internet of Things identity assurance

A Cirne, PR Sousa, JS Resende… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …