Secure architecture for Industrial Edge of Things(IEoT): A hierarchical perspective

The Industrial Internet of Things (IIoT) is an application of the IoT specifically tailored for industrial manufacturing, characterized by its heightened requirements for intelligent industrial production and the creation of a safer and more manageable industrial production environment. Edge Computi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer networks (Amsterdam, Netherlands : 1999) Netherlands : 1999), 2024-09, Vol.251, p.110641, Article 110641
Hauptverfasser: Li, Pengyong, Xia, Jiaqi, Wang, Qian, Zhang, Yujie, Wu, Meng
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The Industrial Internet of Things (IIoT) is an application of the IoT specifically tailored for industrial manufacturing, characterized by its heightened requirements for intelligent industrial production and the creation of a safer and more manageable industrial production environment. Edge Computing (EC) is emerging as an innovative strategy to establish end-to-end connectivity with lower transmission latency and higher processing efficiency among large-scale industrial equipment. The fusion of IIoT and EC has given rise to a new paradigm known as the Industrial Edge of Things (IEoT), leveraging edge intelligence to enhance the overall performance of industrial networks. However, the limited computing resources of edge devices and the complex heterogeneous distribution environment pose significant challenges for IEoT in monitoring maintenance, countering network attacks, and ensuring data security. In this paper, we underscore the importance of constructing a comprehensive security framework for IEoT across all levels. Initially, we devise a novel layered framework tailored to the unique characteristics of IEoT. Subsequently, we conduct a layered analysis of the threats and challenges encountered by each layer of IEoT. Concurrently, we provide a systematic review of the latest advancements in security solutions, layer by layer. To facilitate comprehension and implementation, we present a case study of IEoT security architecture aimed at ensuring device security, control security, network security, and data security. Lastly, we outline key research challenges and promising research directions to expedite the rapid advancement of IEoT technology applications. •We introduced the concept of the proposed IEoT framework and designed a four-layered structure, systematically exploring the characteristics and functions of each layer. We aim to establish a comprehensive, all-encompassing, and holistic security architecture for IEoT.•We categorized the threats and attacks faced by IEoT based on its hierarchical division, conducting in-depth analyses of the characteristics of each layer. Additionally, we discussed potential risks and challenges that may exist in different layers.•We conducted a comprehensive review of the latest research progress in security technologies related to IEoT. Our investigation focused on security solutions in each layer structure from a hierarchical perspective, to build a comprehensive and innovative security architecture for IEoT.•Leve
ISSN:1389-1286
1872-7069
DOI:10.1016/j.comnet.2024.110641