Towards a Systematic Survey of Industrial IoT Security Requirements: Research Method and Quantitative Analysis

Koen Pieter Tange*, Michele De Donno, Xenofon Fafoutis, Nicola Dragoni

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

Industry 4.0 and, in particular, Industrial Internet of Things (IIoT) represent two of the major automation and data exchange trends of the 21st century, driving a steady increase in the number of smart embedded devices used by industrial applications. However, IoT devices suffer from numerous security flaws, resulting in a number of large scale cyber-attacks. In this light, Fog computing, a relatively new paradigm born from the necessity of bridging the gap between Cloud computing and IoT, can be used as a security solution for the IIoT. To achieve this, the first step is to clearly identify the security requirements of the IIoT that can be subsequently used to design security solutions based on Fog computing. With this in mind, our paper represents a preliminary work towards a systematic literature review of IIoT security requirements. We focus on two key steps of the review: (1) the research method that will be used in the systematic work and (2) a quantitative analysis of the results produced by the study selection process. This lays the necessary foundations to enable the use of Fog computing as a security solution for the IIoT.
Original languageEnglish
Title of host publicationProceedings of the 2019 Workshop on Fog Computing and the Iot (iot-fog '19)
Number of pages8
PublisherAssociation for Computing Machinery
Publication date2019
Pages56-63
ISBN (Print)9781450366984
DOIs
Publication statusPublished - 2019
Event2019 Workshop on Fog Computing and the Internet of Things - Montreal, Canada
Duration: 15 Apr 201918 Apr 2019

Workshop

Workshop2019 Workshop on Fog Computing and the Internet of Things
CountryCanada
CityMontreal
Period15/04/201918/04/2019

Keywords

  • Industrial Internet of Things
  • IIoT
  • Industry 4.0
  • Security
  • Fog Computing
  • Systematic Literature Review

Cite this

Tange, K. P., De Donno, M., Fafoutis, X., & Dragoni, N. (2019). Towards a Systematic Survey of Industrial IoT Security Requirements: Research Method and Quantitative Analysis. In Proceedings of the 2019 Workshop on Fog Computing and the Iot (iot-fog '19) (pp. 56-63). Association for Computing Machinery. https://doi.org/10.1145/3313150.3313228
Tange, Koen Pieter ; De Donno, Michele ; Fafoutis, Xenofon ; Dragoni, Nicola. / Towards a Systematic Survey of Industrial IoT Security Requirements: Research Method and Quantitative Analysis. Proceedings of the 2019 Workshop on Fog Computing and the Iot (iot-fog '19). Association for Computing Machinery, 2019. pp. 56-63
@inproceedings{0c994a952eb343c5afd30d802ee5c669,
title = "Towards a Systematic Survey of Industrial IoT Security Requirements: Research Method and Quantitative Analysis",
abstract = "Industry 4.0 and, in particular, Industrial Internet of Things (IIoT) represent two of the major automation and data exchange trends of the 21st century, driving a steady increase in the number of smart embedded devices used by industrial applications. However, IoT devices suffer from numerous security flaws, resulting in a number of large scale cyber-attacks. In this light, Fog computing, a relatively new paradigm born from the necessity of bridging the gap between Cloud computing and IoT, can be used as a security solution for the IIoT. To achieve this, the first step is to clearly identify the security requirements of the IIoT that can be subsequently used to design security solutions based on Fog computing. With this in mind, our paper represents a preliminary work towards a systematic literature review of IIoT security requirements. We focus on two key steps of the review: (1) the research method that will be used in the systematic work and (2) a quantitative analysis of the results produced by the study selection process. This lays the necessary foundations to enable the use of Fog computing as a security solution for the IIoT.",
keywords = "Industrial Internet of Things, IIoT, Industry 4.0, Security, Fog Computing, Systematic Literature Review",
author = "Tange, {Koen Pieter} and {De Donno}, Michele and Xenofon Fafoutis and Nicola Dragoni",
year = "2019",
doi = "10.1145/3313150.3313228",
language = "English",
isbn = "9781450366984",
pages = "56--63",
booktitle = "Proceedings of the 2019 Workshop on Fog Computing and the Iot (iot-fog '19)",
publisher = "Association for Computing Machinery",
address = "United States",

}

Tange, KP, De Donno, M, Fafoutis, X & Dragoni, N 2019, Towards a Systematic Survey of Industrial IoT Security Requirements: Research Method and Quantitative Analysis. in Proceedings of the 2019 Workshop on Fog Computing and the Iot (iot-fog '19). Association for Computing Machinery, pp. 56-63, 2019 Workshop on Fog Computing and the Internet of Things, Montreal, Canada, 15/04/2019. https://doi.org/10.1145/3313150.3313228

Towards a Systematic Survey of Industrial IoT Security Requirements: Research Method and Quantitative Analysis. / Tange, Koen Pieter; De Donno, Michele; Fafoutis, Xenofon; Dragoni, Nicola.

Proceedings of the 2019 Workshop on Fog Computing and the Iot (iot-fog '19). Association for Computing Machinery, 2019. p. 56-63.

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

TY - GEN

T1 - Towards a Systematic Survey of Industrial IoT Security Requirements: Research Method and Quantitative Analysis

AU - Tange, Koen Pieter

AU - De Donno, Michele

AU - Fafoutis, Xenofon

AU - Dragoni, Nicola

PY - 2019

Y1 - 2019

N2 - Industry 4.0 and, in particular, Industrial Internet of Things (IIoT) represent two of the major automation and data exchange trends of the 21st century, driving a steady increase in the number of smart embedded devices used by industrial applications. However, IoT devices suffer from numerous security flaws, resulting in a number of large scale cyber-attacks. In this light, Fog computing, a relatively new paradigm born from the necessity of bridging the gap between Cloud computing and IoT, can be used as a security solution for the IIoT. To achieve this, the first step is to clearly identify the security requirements of the IIoT that can be subsequently used to design security solutions based on Fog computing. With this in mind, our paper represents a preliminary work towards a systematic literature review of IIoT security requirements. We focus on two key steps of the review: (1) the research method that will be used in the systematic work and (2) a quantitative analysis of the results produced by the study selection process. This lays the necessary foundations to enable the use of Fog computing as a security solution for the IIoT.

AB - Industry 4.0 and, in particular, Industrial Internet of Things (IIoT) represent two of the major automation and data exchange trends of the 21st century, driving a steady increase in the number of smart embedded devices used by industrial applications. However, IoT devices suffer from numerous security flaws, resulting in a number of large scale cyber-attacks. In this light, Fog computing, a relatively new paradigm born from the necessity of bridging the gap between Cloud computing and IoT, can be used as a security solution for the IIoT. To achieve this, the first step is to clearly identify the security requirements of the IIoT that can be subsequently used to design security solutions based on Fog computing. With this in mind, our paper represents a preliminary work towards a systematic literature review of IIoT security requirements. We focus on two key steps of the review: (1) the research method that will be used in the systematic work and (2) a quantitative analysis of the results produced by the study selection process. This lays the necessary foundations to enable the use of Fog computing as a security solution for the IIoT.

KW - Industrial Internet of Things

KW - IIoT

KW - Industry 4.0

KW - Security

KW - Fog Computing

KW - Systematic Literature Review

U2 - 10.1145/3313150.3313228

DO - 10.1145/3313150.3313228

M3 - Article in proceedings

SN - 9781450366984

SP - 56

EP - 63

BT - Proceedings of the 2019 Workshop on Fog Computing and the Iot (iot-fog '19)

PB - Association for Computing Machinery

ER -

Tange KP, De Donno M, Fafoutis X, Dragoni N. Towards a Systematic Survey of Industrial IoT Security Requirements: Research Method and Quantitative Analysis. In Proceedings of the 2019 Workshop on Fog Computing and the Iot (iot-fog '19). Association for Computing Machinery. 2019. p. 56-63 https://doi.org/10.1145/3313150.3313228