Special Issues
Table of Content

Security Issues in Industrial Internet of Things

Submission Deadline: 15 November 2020 (closed) View: 112

Guest Editors

Dr. Mohammad Ayoub Khan, University of Bisha, Saudi Arabia.
Dr. Cathryn Peoples, Ulster University, UK.
Dr. Razi Iqbal, University of the Fraser Valley, Canada.

Summary

The security threats in industrial IoT (IIoT) are rising with smart attacks taking place every day. The increased number of IoT networks now makes malicious attacks easier to abrupt. Malware attacks tend to compromise to jeopardize privacy over the Internet, IoT devices, personal computers and mobile phones as well. The identification of new and unique security threats is applied to the context in which the system operates whenever a new IoT device is introduced. Therefore, protecting the IIoT networks requires ongoing research and development of computationally efficient security protocols to improve communication among various networked IoT devices. This supports the fact that the introduction of any IoT architectures involves a number of changes in conventional networks since many IoT devices are commonly used without taking security implications into account. The issue of threat has become more complicated in the industrial environment because of the need to secure a large number of devices from attack while guaranteeing the functionality of the systems and the real-time response to threats. In such a scenario detection of threat in Industrial Internet of things (IIoT) devices becomes an important factor to avoid injection by malicious IIoT devices. The issue of threat has become more complicated in the industrial environment because of the need to secure a large number of devices from attack while guaranteeing the functionality of the systems and the real-time response to threats. In such a scenario detection of threat in Industrial Internet of things (IIoT) devices becomes an important factor to avoid injection by malicious IIoT devices. The issue of threat has become more complicated in the industrial environment because of the need to secure a large number of devices from attack while guaranteeing the functionality of the systems and the real-time response to threats. In such a scenario detection of threat in Industrial Internet of things (IIoT) devices becomes an important factor to avoid injection by malicious IIoT devices. The special issue invites researchers and academicians to publish selected original articles, and reviews presenting security solutions trends to the industrial Internet of things showing recent major advances and discoveries, significant gaps in the current research.


MAIN TOPICS OF INTEREST

The topics of this workshop include, but are not limited to:

· Security and privacy in IIoT

· Security architectures and protection mechanisms for IIoT

· Threat models and attack strategies for IIoT

· Secure sensors and Industrial IoT

· Threat detection/prevention methods in IIoT

· Trust computation and analysis in IIoT

· Security in Wireless Sensor Networks

· Risk identification and mitigation methods in IIoT

· Emerging lightweight security algorithms and protocols

· Authentication methods in IIoT

· AI and machine learning for intrusion detection in IIoT

· Blockchain technologies in industrial IoT

· Industrial service discovery protocols in IIoT

· Role of fog and edge computing for IIoT

· Hardware support for security in IIoT

· Architectural aspect of secure IIoT

· Industry standard for security in IIoT


Keywords

Industrial IoT, Security, Machine Learning, Threat

Published Papers


  • Open Access

    ARTICLE

    Secure Multifactor Remote Access User Authentication Framework for IoT Networks

    Mohammed Mujib Alshahrani
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3235-3254, 2021, DOI:10.32604/cmc.2021.015310
    (This article belongs to the Special Issue: Security Issues in Industrial Internet of Things)
    Abstract The term IoT refers to the interconnection and exchange of data among devices/sensors. IoT devices are often small, low cost, and have limited resources. The IoT issues and challenges are growing increasingly. Security and privacy issues are among the most important concerns in IoT applications, such as smart buildings. Remote cybersecurity attacks are the attacks which do not require physical access to the IoT networks, where the attacker can remotely access and communicate with the IoT devices through a wireless communication channel. Thus, remote cybersecurity attacks are a significant threat. Emerging applications in smart environments… More >

  • Open Access

    ARTICLE

    An Intelligent Hybrid Mutual Authentication Scheme for Industrial Internet of Thing Networks

    Muhammad Adil, Jehad Ali, Muhammad Sajjad Khan, Junsu Kim, Ryan Alturki, Mohammad Zakarya, Mukhtaj Khan, Rahim Khan, Su Min Kim
    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 447-470, 2021, DOI:10.32604/cmc.2021.014967
    (This article belongs to the Special Issue: Security Issues in Industrial Internet of Things)
    Abstract Internet of Things (IoT) network used for industrial management is vulnerable to different security threats due to its unstructured deployment, and dynamic communication behavior. In literature various mechanisms addressed the security issue of Industrial IoT networks, but proper maintenance of the performance reliability is among the common challenges. In this paper, we proposed an intelligent mutual authentication scheme leveraging authentication aware node (AAN) and base station (BS) to identify routing attacks in Industrial IoT networks. The AAN and BS uses the communication parameter such as a route request (RREQ), node-ID, received signal strength (RSS), and More >

  • Open Access

    ARTICLE

    Service-Aware Access Control Procedure for Blockchain Assisted Real-Time Applications

    Alaa Omran Almagrabi, A. K. Bashir
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3649-3667, 2021, DOI:10.32604/cmc.2021.015056
    (This article belongs to the Special Issue: Security Issues in Industrial Internet of Things)
    Abstract The design of distributed ledger, Asymmetric Key Algorithm (AKA) blockchain systems, is prominent in administering security and access control in various real-time services and applications. The assimilation of blockchain systems leverages the reliable access and secure service provisioning of the services. However, the distributed ledger technology’s access control and chained decisions are defaced by pervasive and service unawareness. It results in degrading security through unattended access control for limited-service users. In this article, a service-aware access control procedure (SACP) is introduced to address the afore-mentioned issue. The proposed SACP defines attended access control for all More >

  • Open Access

    ARTICLE

    SAPEM: Secure Attestation of Program Execution and Program Memory for IoT Applications

    Nafisa Ahmed, Manar Abu Talib, Qassim Nasir
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 23-49, 2021, DOI:10.32604/cmc.2021.014523
    (This article belongs to the Special Issue: Security Issues in Industrial Internet of Things)
    Abstract Security is one of the major challenges that devices connected to the Internet of Things (IoT) face today. Remote attestation is used to measure these devices’ trustworthiness on the network by measuring the device platform’s integrity. Several software-based attestation mechanisms have been proposed, but none of them can detect runtime attacks. Although some researchers have attempted to tackle these attacks, the proposed techniques require additional secured hardware parts to be integrated with the attested devices to achieve their aim. These solutions are expensive and not suitable in many cases. This paper proposes a dual attestation… More >

Share Link