A Survey of Security Issues in IIoT and Fault Identification using Predictive Analysis in Industry 4.0
A Survey of Security Issues in IIoT and Fault Identification using Predictive Analysis in Industry 4.0 |
||
|
||
© 2022 by IJETT Journal | ||
Volume-70 Issue-12 |
||
Year of Publication : 2022 | ||
Author : G. Anitha, Abirami Manoharan, Hariprasath Manoharan, P. Ganesan |
||
DOI : 10.14445/22315381/IJETT-V70I12P211 |
How to Cite?
G. Anitha, Abirami Manoharan, Hariprasath Manoharan, P. Ganesan, "A Survey of Security Issues in IIoT and Fault Identification using Predictive Analysis in Industry 4.0," International Journal of Engineering Trends and Technology, vol. 70, no. 12, pp. 99-108, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I12P211
Abstract
Machine intelligence (ML) and Artificial intelligence (AI) advancements affect a variety of research professions. These primary contributors would have been difficult to attain in the past by employing conventional optimization techniques. Manufacturers benefit significantly from increased automation technology, which is one manufacturing where artificial intelligence and machine learning may offer a range of choices. The Industrial Iot has intensified demand in Industry 4.0. (IIoT), which enables a superior wireless network for actual plant data processing and analysis. A detailed analysis of the essential functions, including fault diagnosis, forecast, and protection in manufacturing 4.0, is investigated in this study, as the safety of computer learning-based methods for these operations. In addition, the human element as contractors or labourers in the Industry 4.0 environment is a significant source of worry and underlined genuine concerns in these sectors to inspire additional research.
Keywords
Defect detection, Forecast, Industrial IoT, Machine learning, and Safety.
References
[1] Schneider, S, “The Industrial Internet of Things (IIoT) Applications and Taxonomy,” Internet of Things and Data Analytics Handbook, pp. 41-81, 2017. Crossref, http://dx.doi.org/10.1002/9781119173601.ch3
[2] Xiaokang Wang et al., “ADTT: A Highly Efficient Distributed Tensor-Train Decomposition Method for IIoT Big Data,” IEEE Transactions on Industrial Informatics, vol. 17, no. 3, pp. 1573-1582, 2021. Crossref, https://doi.org/10.1109/TII.2020.2967768
[3] Y. Wu, H. -N. Dai, and H. Wang, “Convergence of Blockchain and Edge Computing for Secure and Scalable IIoT Critical Infrastructures in Industry 4.0,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2300-2317, 2021. Crossref, https://doi.org/10.1109/JIOT.2020.3025916
[4] Dingde Jiang et al., “An Energy-Efficient Networking Approach in Cloud Services for IIoT Networks,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 5, pp. 928-941, 2020. Crossref, https://doi.org/10.1109/JSAC.2020.2980919
[5] Saiyu Qi et al., “Efficient Data Access Control with Fine-Grained Data Protection in Cloud-Assisted IIoT,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2886-2899, 2021. Crossref, https://doi.org/10.1109/JIOT.2020.3020979
[6] Hu Xiong et al., “Heterogeneous Encryption with Equality Test for IIoT Environment,” IEEE Internet of Things Journal, vol. 8, no. 21, 2021. Crossref, https://doi.org/10.1109/JIOT.2020.3008955
[7] Mohammad Mehedi Hassan et al., “An Adaptive Trust Boundary Protection for IIoT Networks Using the Deep-Learning FeatureExtraction-Based Semisupervised Model,” IEEE Transactions on Industrial Informatics, vol. 17, no. 4, pp. 2860-2870, 2021. Crossref, https://doi.org/10.1109/TII.2020.3015026
[8] Tie Qiu et al., “Edge Computing in the Industrial Internet of Things: Architecture, Advances, and Challenges,” IEEE Communications Surveys & Tutorials, vol. 22, no. 4, pp. 2462-2488, 2020. Crossref, https://doi.org/10.1109/COMST.2020.3009103
[9] Hu Xiong et al., “Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT,” IEEE Internet of Things Journal, vol. 7, no. 12, pp. 11713-11724, 2020. Crossref, https://doi.org/10.1109/JIOT.2020.2999510
[10] Koen Tange et al., “A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities,” IEEE Communications Surveys & Tutorials, vol. 22, no. 4, pp. 2489-2520, 2020. Crossref, https://doi.org/10.1109/COMST.2020.3011208
[11] Abuhasel, K. A., and Khan, M. A, “A Secure Industrial Internet of Things (IIoT) Framework for Resource Management in Intelligent Manufacturing,” IEEE Access, vol. 8, pp. 117354-117364, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.3004711
[12] Abdullah Alsaedi et al., “TON_Iot Telemetry Dataset: A New Generation Dataset of IOT and IIoT for Data-Driven Intrusion Detection Systems,” IEEE Access, vol. 8, pp. 165130-165150, 2020. Crossref, Crossref, https://doi.org/10.1109/ACCESS.2020.3022862
[13] Ewart W. Blackmore et al., “Terrestrial Muon Flux Measurement at Low Energies for Soft Error Studies,” IEEE Transactions on Nuclear Science, vol. 62, no. 6, pp. 2792-2796, 2015. Crossref, https://doi.org/10.1109/TNS.2015.2498103
[14] Yunfei Song et al., “Fda3: Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications,” IEEE Transactions on Industrial Informatics, vol. 17, no. 11, 2021, Crossref, https://doi.org/10.1109/TII.2020.3005969
[15] Hailing Zhou et al., “Recent Advances on Single Modal and Multimodal Face Recognition: A Survey,” IEEE Transactions on HumanMachine Systems, vol. 44, no. 6, pp. 701-716, 2014. Crossref, http://dx.doi.org/10.1109/THMS.2014.2340578
[16] Bin Cao et al., “A Many-Objective Optimization Model of Industrial Internet of Things Based on Private Blockchain,” IEEE Network, vol. 34, no. 5, pp. 78-83, 2020. Crossref, http://dx.doi.org/10.1109/THMS.2014.2340578
[17] Zhengwei Xu et al., “Adaptive DE Algorithm for Novel Energy Control Framework Based on Edge Computing in IIoT Applications,” IEEE Transactions on Industrial Informatics, vol. 17, no. 7, pp. 5118-5127, 2021. Crossref, https://doi.org/10.1109/TII.2020.3007644
[18] Chonglin Gu, Hejiao Huang,, and Xiaohua Jia, “Power Metering for a Virtual Machine in Cloud Computing Challenges and Opportunities,” IEEE Access, vol. 2, pp. 1106-1116, 2014. Crossref, https://doi.org/10.1109/ACCESS.2014.2358992
[19] Ying Gao et al., “Blockchain-Based IIoT Data Sharing Framework for SDN-Enabled Pervasive Edge Computing,” IEEE Transactions on Industrial Informatics, vol. 17, no. 7, pp. 5041-5049, 2020. Crossref, https://doi.org/10.1109/TII.2020.3012508
[20] R. Vinoth et al., “Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT,” IEEE Internet of Things Journal, vol. 8, no. 5, pp. 3801-3811, 2021. Crossref, https://doi.org/10.1109/JIOT.2020.3024703
[21] Rongbo Zhu et al., “ERDT: Energy-Efficient Reliable Decision Transmission for Intelligent, Cooperative Spectrum Sensing in Industrial IoT,” IEEE Access, vol. 3, pp. 2366-2378, 2015. Crossref, https://doi.org/10.1109/ACCESS.2015.2501644
[22] Sajid, A., Abbas, H., and Saleem, K, “Cloud-Assisted Iot-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges,” IEEE Access, vol. 4, pp. 1375-1384, 2016. Crossref, https://doi.org/10.1109/ACCESS.2016.2549047
[23] Saad Mubeen et al., “Delay Mitigation in Offloaded Cloud Controllers in Industrial IoT,” IEEE Access, vol. 5, pp. 4418-4430, 2017. Crossref, https://doi.org/10.1109/ACCESS.2017.2682499
[24] Charbel El Kaed et al., “SRE: Semantic Rules Engine for the Industrial Internet-of-Things Gateways,” IEEE Transactions on Industrial Informatics, vol.14, no. 2, pp. 715-724, 2017. Crossref, https://doi.org/10.48550/arXiv.1710.09627
[25] Delsing, J, “Local Cloud Internet of Things Automation: Technology and Business Model Features of Distributed Internet of Things Automation Solutions,” IEEE Industrial Electronics Magazine, vol. 11, no. 4, pp. 8-21, 2017. Crossref, https://doi.org/10.1109/MIE.2017.2759342
[26] George, G, and Thampi, S. M, “A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations,” IEEE Access, vol. 6, pp. 43586-43601, 2018. Crossref, https://doi.org/10.1109/ACCESS.2018.2863244
[27] Neha Priya, "Cybersecurity Considerations for Industrial IoT in Critical Infrastructure Sector," International Journal of Computer and Organization Trends, vol. 12, no. 1, pp. 27-36, 2022. Crossref, https://doi.org/10.14445/22492593/IJCOT-V12I1P306
[28] Hansong Xu et al., “A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective,” IEEE Access, vol. 6, pp. 78238-78259, 2018. Crossref, https://doi.org/10.1109/ACCESS.2018.2884906
[29] Chun-Cheng Lin et al., “Concept Drifts Detection and Adaption in Significant Imbalance Industrial IoT Data Using an Ensemble Learning Method of Offline Classifiers,” IEEE Access, vol. 7, pp. 56198-56207, 2019. Crossref, https://doi.org/10.1109/ACCESS.2019.2912631
[30] Helin Yang et al., “Learning-Based Energy-Efficient Resource Management by Heterogeneous RF/VLC for Ultra-Reliable LowLatency Industrial IoT Networks,” IEEE Transactions on Industrial Informatics, vol. 16, no. 8, pp. 5565-5576, 2020. Crossref, https://doi.org/10.1109/TII.2019.2933867
[31] Francesca Meneghello et al., “IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8182-8201, 2019. Crossref, https://doi.org/10.1109/JIOT.2019.2935189
[32] Waheb A. Jabbar et al., “Design and Fabrication of Smart Home with the Internet of Things-Enabled Automation System,” IEEE Access, vol. 7, pp. 144059-144074, 2019. Crossref, https://doi.org/10.1109/ACCESS.2019.2942846
[33] Tejasvi Alladi et al., “Blockchain Applications for Industry 4.0 and Industrial IoT: A Review,” IEEE Access, vol. 7, pp. 176935- 176951, 2019. Crossref, https://doi.org/10.1109/ACCESS.2019.2956748
[34] Aris S. Lalos et al., “Privacy Preservation in Industrial IoT Via Fast Adaptive Correlation Matrix Completion,” IEEE Transactions on Industrial Informatics, vol. 16, no. 12, pp. 7765-7773, 2020. Crossref, https://doi.org/10.1109/TII.2019.2960275
[35] G.Vinobala, and M.Piramu, "Monitoring of Industrial Electrical Equipment Using IoT," SSRG International Journal of Computer Science and Engineering, vol. 8, no. 1, pp. 13-18, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSE-V8I1P103
[36] Xiaolong Lai et al., “Adaptive Resource Allocation Method Based on Deep Q Network for Industrial Internet of Things,” IEEE Access, vol. 8, pp. 27426-27434, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.2971228
[37] Jaeyoung Hwang et al., “AUTOCON-IoT: Automated and Scalable Online Conformance Testing for IoT Applications,” IEEE Access, vol. 8, pp. 43111-43121, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.2976718
[38] Mostafa Haghi et al., “A Flexible and Pervasive IoT-Based Healthcare Platform for Physiological and Environmental Parameters Monitoringm,” IEEE Internet of Things Journal, vol. 7, no. 6, pp. 5628-5647, 2020. Crossref, https://doi.org/10.1109/JIOT.2020.2980432
[39] Massimo Ballerini et al., “NB-IoT Versus Lorawan: An Experimental Evaluation for Industrial Applications,” IEEE Transactions on Industrial Informatics, vol. 16, no. 12, pp. 7802-7811, 2020. Crossref, https://doi.org/10.1109/TII.2020.2987423
[40] Lei Xu et al., “Fairness-Aware Throughput Maximization Over Cognitive Heterogeneous NOMA Networks for Industrial Cognitive IoT,” IEEE Transactions on Communications, vol. 68, no. 8, pp. 4723-4733, 2020. Crossref, https://doi.org/10.1109/TCOMM.2020.2992720
[41] Teklay Gebremichael et al., “Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges,” IEEE Access, vol. 8, pp. 152351-152366, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.3016937
[42] Jaiganesh P M, and DR. B.Meenakshi Sundaram, "IoT Based Power Monitoring System," SSRG International Journal of Computer Science and Engineering, vol. 8, no. 4, pp. 4-7, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSE-V8I4P102
[43] Abdullah Alsaedi et al., “TON_Iot Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems,” IEEE Access, vol. 8, pp. 165130-165150, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.3022862
[44] Md Liton Hossain et al., “Industrial IoT-Based Condition Monitoring for Wind Energy Conversion System,” CSEE Journal of Power and Energy Systems, vol. 7, no. 3, pp. 654-664, 2020. Crossref, https://doi.org/10.17775/CSEEJPES.2020.00680
[45] Usman Tariq et al., “Context-Aware Autonomous Security Assertion for Industrial IoT,” IEEE Access, vol. 8, pp. 191785-191794, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.3032436
[46] Anmin Fu et al., “VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT,” IEEE Transactions on Industrial Informatics, vol. 8, no. 5, pp. 3316 – 3326, 2022. Crossref, https://doi.org/10.1109/TII.2020.3036166
[47] Xiaoding Wang et al., “Enabling Secure Authentication in Industrial IoT with Transfer Learning Empowered Blockchain,” IEEE Transactions on Industrial Informatics, vol. 17, no. 11, pp. 7725-7733, 2021. Crossref, https://doi.org/10.1109/TII.2021.3049405
[48] Y. Njah, and M. Cheriet, “Parallel Route Optimization and Service Assurance in Energy-Efficient Software-Defined Industrial IoT Networks,” IEEE Access, vol. 9, pp. 24682-24696, 2021. Crossref, https://doi.org/10.1109/ACCESS.2021.3056931
[49] Yuming Feng et al., “A Consortium Blockchain-Based Access Control Framework with Dynamic Orderer Node Selection for 5GEnabled Industrial IoT,” IEEE Transactions on Industrial Informatics, vol. 18, no. 4, 2021. Crossref, https://doi.org/10.1109/TII.2021.3078183
[50] Nteziriza Nkerabahizi Josbert et al., “A Framework for Managing Dynamic Routing in Industrial Networks Driven by SoftwareDefined Networking Technology,” IEEE Access, vol. 9, pp. 74343-74359, 2021. Crossref, https://doi.org/10.1109/ACCESS.2021.3079896
[51] Iqra Qasim et al., “A Model-Driven Mobile HMI Framework (MMHF) for Industrial Control Systems,” IEEE Access, vol. 8, pp. 10827-10846, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.2965259
[52] Mostafa Uddin et al., “SDN-Based Multi-Protocol Edge Switching for IoT Service Automation,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 12, pp. 2775-2786, 2018. Crossref, https://doi.org/10.1109/JSAC.2018.2871325
[53] Tanesh Kumar et al., “Blockedge: Blockchain-Edge Framework for Industrial IoT Networks,” IEEE Access, vol. 8, pp. 154166- 154185, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.3017891