Affiliation:
1. Computer Science Department, School of Science, Kavala Campus, International Hellenic University, 65404 Kavala, Greece
2. Faculty of Engineering, School of Spatial Planning and Development, Aristotle University of Thessaloniki, 54124 Thessaloniki, Greece
3. School of Science & Technology, Informatics Studies, Hellenic Open University, 26335 Patra, Greece
Abstract
The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT). These advancements have had a profound impact on the structures of numerous industrial organizations. The IIoT, a seamless integration of the physical and digital realms with minimal human intervention, has ushered in radical changes in the economy and modern business practices. At the heart of the IIoT lies its ability to gather and analyze vast volumes of data, which is then harnessed by artificial intelligence systems to perform intelligent tasks such as optimizing networked units’ performance, identifying and correcting errors, and implementing proactive maintenance measures. However, implementing IIoT systems is fraught with difficulties, notably in terms of security and privacy. IIoT implementations are susceptible to sophisticated security attacks at various levels of networking and communication architecture. The complex and often heterogeneous nature of these systems makes it difficult to ensure availability, confidentiality, and integrity, raising concerns about mistrust in network operations, privacy breaches, and potential loss of critical, personal, and sensitive information of the network's end-users. To address these issues, this study aims to investigate the privacy requirements of an IIoT ecosystem as outlined by industry standards. It provides a comprehensive overview of the IIoT, its advantages, disadvantages, challenges, and the imperative need for industrial privacy. The research methodology encompasses a thorough literature review to gather existing knowledge and insights on the subject. Additionally, it explores how the IIoT is transforming the manufacturing industry and enhancing industrial processes, incorporating case studies and real-world examples to illustrate its practical applications and impact. Also, the research endeavors to offer actionable recommendations on implementing privacy-enhancing measures and establishing a secure IIoT ecosystem.
Subject
Computational Mathematics,Computational Theory and Mathematics,Numerical Analysis,Theoretical Computer Science
Reference135 articles.
1. Alqassem, I., and Svetinovic, D. (2014, January 9–12). A taxonomy of security and privacy requirements for the Internet of Things IoT. Proceedings of the 2014 IEEE International Conference on Industrial Engineering and Engineering Management, Selangor, Malaysia.
2. Cloud robotics: A review of technologies, developments and applications;Bogue;Ind. Robot Int. J.,2017
3. Development of integrated supply chain system in manufacturing industry;Sulaiman;J. Comput. Methods Sci. Eng.,2021
4. Iliadis, L., Jayne, C., Tefas, A., and Pimenidis, E. (2022). Engineering Applications of Neural Networks, Springer International Publishing. Communications in Computer and Information Science.
5. Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things;Yin;IEEE Trans. Ind. Inform.,2018
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献