Smart City Gnosys

Smart city article details

Title A Fog-Based Security Framework For Large-Scale Industrial Internet Of Things Environments
ID_Doc 1719
Authors Zhou H.; Pal S.; Jadidi Z.; Jolfaei A.
Year 2023
Published IEEE Internet of Things Magazine, 6, 1
DOI http://dx.doi.org/10.1109/IOTM.002.2200195
Abstract The Industrial Internet of Things (IIoT) is a developing research area with potential global Internet connectivity, turning everyday objects into intelligent devices with more autonomous activities. IIoT services and applications are not only being used in smart homes and smart cities, but they have also become an essential element of the Industry 4.0 concept. The emergence of the IIoT helps traditional industries simplify production processes, reduce production costs, and improve industrial efficiency. However, the involvement of many heterogeneous devices, the use of third-party software, and the resource-constrained nature of the IoT devices bring new security risks to the production chain and expose vulnerabilities to the systems. The Distributed Denial of Service (DDoS) attacks are significant, among others. This article analyzes the threats and attacks in the IIoT and discusses how DDoS attacks impact the production process and communication dysfunctions with IIoT services and applications. This article also proposes a reference security framework that enhances the advantages of fog computing to demonstrate countermeasures against DDoS attacks and possible strategies to mitigate such attacks at scale. © 2018 IEEE.
Author Keywords


Similar Articles


Id Similarity Authors Title Published
33015 View0.918Abosata N.; Al-Rubaye S.; Inalhan G.; Emmanouilidis C.Internet Of Things For System Integrity: A Comprehensive Survey On Security, Attacks And Countermeasures For Industrial ApplicationsSensors, 21, 11 (2021)
16945 View0.908Buja A.; Apostolova M.; Luma A.; Januzaj Y.Cyber Security Standards For The Industrial Internet Of Things (Iiot)- A Systematic ReviewHORA 2022 - 4th International Congress on Human-Computer Interaction, Optimization and Robotic Applications, Proceedings (2022)
17036 View0.907Buja A.Cybersecurity Of Industrial Internet Of Things (Iiot)Cybersecurity of Industrial Internet of Things (IIoT) (2025)
47616 View0.901Alvi A.N.; Ali B.; Saleh M.S.; Alkhathami M.; Alsadie D.; Alghamdi B.Secure Computing For Fog-Enabled Industrial IotSensors, 24, 7 (2024)
47643 View0.9Shruti; Rani S.; Srivastava G.Secure Hierarchical Fog Computing-Based Architecture For Industry 5.0 Using An Attribute-Based Encryption SchemeExpert Systems with Applications, 235 (2024)
5270 View0.887Aouedi O.; Vu T.-H.; Sacco A.; Nguyen D.C.; Piamrat K.; Marchetto G.; Pham Q.-V.A Survey On Intelligent Internet Of Things: Applications, Security, Privacy, And Future DirectionsIEEE Communications Surveys and Tutorials, 27, 2 (2025)
5322 View0.884Mishra N.; Hafizul Islam S.K.; Zeadally S.A Survey On Security And Cryptographic Perspective Of Industrial-Internet-Of-ThingsInternet of Things (Netherlands), 25 (2024)
17032 View0.881Raimundo R.J.; Rosário A.T.Cybersecurity In The Internet Of Things In Industrial ManagementApplied Sciences (Switzerland), 12, 3 (2022)
6617 View0.88Park J.H.Advances In Future Internet And The Industrial Internet Of ThingsSymmetry, 11, 2 (2019)
24539 View0.878Ashena E.Evaluating A Blockchain-Based Method For Industrial Iot Data Confidentiality: Proof Of Concept2021 7th International Conference on Web Research, ICWR 2021 (2021)