A survey on security and cryptographic perspective of Industrial-Internet-of-Things

Nimish Mishra, S. K. Hafizul Islam, Sherali Zeadally

Research output: Contribution to journalReview articlepeer-review

16 Scopus citations

Abstract

The Industrial-Internet-of-Things (IIoT) powers several applications in the modern world: smart city, smart grid, smart manufacturing, smart logistics management, etc. The increased connectivity and smartness bring a rich attack surface for adversaries. Past research efforts have extensively explored the security aspects of IIoT. Still, none of them took a cryptographic perspective of IIoT security, which is imperative because almost all modern cyber defenses are based on cryptographic primitives. We address this issue in this work. We present a cryptographic perspective of IIoT for the designers and developers. We review the desirable security properties and existing attacks against the IIoT infrastructure. We then review conventional cryptographic tools used to secure modern IIoT networks. Finally, we discuss shortcomings associated with traditional cryptography and recommend Post-Quantum Cryptography (PQC) techniques that could be integrated with IIoT. Finally, we present future research directions on using cryptography for IIoT environments.

Original languageEnglish
Article number101037
JournalInternet of Things (Netherlands)
Volume25
DOIs
StatePublished - Apr 2024

Bibliographical note

Publisher Copyright:
© 2023 Elsevier B.V.

Keywords

  • Access control
  • Authentication
  • Industrial-Internet-Of-Things (IIoT)
  • Post-quantum cryptography (PQC)
  • Security

ASJC Scopus subject areas

  • Software
  • Computer Science (miscellaneous)
  • Information Systems
  • Engineering (miscellaneous)
  • Hardware and Architecture
  • Computer Science Applications
  • Artificial Intelligence
  • Management of Technology and Innovation

Fingerprint

Dive into the research topics of 'A survey on security and cryptographic perspective of Industrial-Internet-of-Things'. Together they form a unique fingerprint.

Cite this