A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities

Koen Pieter Tange, Michele De Donno, Xenofon Fafoutis, Nicola Dragoni

Research output: Contribution to journalJournal articleResearchpeer-review

233 Downloads (Pure)


A key application of the Internet of Things (IoT) paradigm lies within industrial contexts. Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry 4.0, promises to revolutionize production and manufacturing through the use of large numbers of networked embedded sensing devices, and the combination of emerging computing technologies, such as Fog/Cloud Computing and Artificial Intelligence. The IIoT is characterized by an increased degree of inter-connectivity, which not only creates opportunities for the industries that adopt it, but also for cyber-criminals. Indeed, IoT security currently represents one of the major obstacles that prevent the widespread adoption of IIoT technology. Unsurprisingly, such concerns led to an exponential growth of published research over the last few years. To get an overview of the field, we deem it important to systematically survey the academic literature so far, and distill from it various security requirements as well as their popularity. This paper consists of two contributions: our primary contribution is a systematic review of the literature over the period 2011-2019 on IIoT Security, focusing in particular on the security requirements of the IIoT. Our secondary contribution is a reflection on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIoT.
Original languageEnglish
JournalIEEE Communications Surveys and Tutorials
Issue number4
Number of pages33
Publication statusPublished - 2020


  • Industrial Internet of Things
  • Cyber-security
  • Security Requirements
  • Fog Computing


Dive into the research topics of 'A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities'. Together they form a unique fingerprint.

Cite this