An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)
Abstract
:1. Introduction
- What are the existing approaches and solutions used to mitigate privacy risks in industrial settings?
- How can privacy dimensions be identified and defined to safeguard individuals within the IIoT ecosystem? What are the different aspects or components of privacy that should be considered?
- What are the contemporary techniques, technologies, and best practices employed to ensure data privacy and security in IIoT systems within industrial environments?
- How can organizations establish an ideal, safe, and private IIoT ecosystem within the industrial domain?
- What considerations and factors need to be taken into account to create a secure environment within the industrial domain while adhering to relevant industry standards?
- What are the recommendations for implementing privacy-enhancing measures in IIoT systems to effectively manage privacy risks and ensure compliance with relevant regulations?
- IIoT’s Transformative Impact on Industrial Organizations: The introduction emphasizes how the Industrial Internet of Things (IIoT) is revolutionizing the manufacturing industry by facilitating ubiquitous connectivity and autonomous data exchange. This transformation is breaking down barriers between physical and digital realms, leading to remarkable progress in industrial operations and modern business practices.
- Integration of AI and Industry 4.0 in the IIoT: The paper highlights that the IIoT represents a forward-thinking industrial technology that combines two digitization strategies—Artificial Intelligence (AI) and Industry 4.0. This integration of data analysis and high-level automation significantly enhances the industrial environment and operations.
- Challenges in IIoT Implementation: The introduction acknowledges the challenges associated with the IIoT, particularly in terms of security. The complex and heterogeneous nature of IIoT systems makes them vulnerable to sophisticated security attacks at various levels of networking and communication architecture. These challenges can lead to mistrust in network operations, privacy breaches, and the loss of critical data.
- Advantages and Disadvantages of IIoT Devices: The introduction presents a clear and concise list outlining the advantages and disadvantages of IIoT devices in Table 1. The benefits include enhanced efficiency, improved data collection, cost savings, and remote monitoring. On the other hand, the disadvantages include security risks, compatibility issues, lack of standardization, and high implementation costs.
- Focus on Industrial Privacy in IIoT Ecosystems: The research aims to address the crucial aspect of industrial privacy in an IIoT ecosystem. It defines industrial privacy as the protection of sensitive information and personal data within industrial settings, such as manufacturing plants and supply chains. The research emphasizes the need to implement security measures, policies, and practices to safeguard confidential information from unauthorized access and misuse.
- Identification of Privacy Dimensions: The study delves into the identification and definition of privacy dimensions within the IIoT ecosystem. These dimensions represent different aspects or components of privacy that are considered when addressing privacy concerns. By understanding the multifaceted nature of privacy, the research aims to guide the development of privacy frameworks and practices.
- Techniques and Best Practices for Data Privacy and Security: The paper explores contemporary techniques, technologies, and best practices used to ensure data privacy and security in IIoT systems. It includes an analysis of the latest methodologies and tools implemented to maintain data confidentiality, integrity, and availability in industrial environments.
- Establishing a Safe and Private IIoT Ecosystem: The research aims to identify how organizations can establish an ideal, safe, and private IIoT ecosystem within the industrial domain. It delves into various considerations and factors that need to be taken into account to create a secure environment. Additionally, the study offers recommendations on implementing privacy-enhancing measures and adhering to industry standards to effectively manage privacy risks and regulatory compliance.
2. Related Work
3. IIoT and Privacy-Preserving Architectures
- Growth of IIoT applications [14]. Manufacturing automation continues to grow, with the number of companies choosing to automate and implement the IIoT soaring to new levels due to the impact of the COVID-19 pandemic. Machine learning and robotics are two applications that increase automation. Machine learning increasingly automates manufacturing processes, so less human intervention is required, while the increasing number of human jobs being taken over by robotics results in fewer people in the workplace. Organizations need to ensure that proper security protocols are in place to safeguard data privacy and prevent unauthorized access.
- The wireless revolution. Only some IIoT applications have access to local sockets [15]. “Local socket” refers to a communication endpoint or interface that allows processes running on the same device or within the same local network to communicate with each other. Local sockets in IIoT architectures can provide privacy in industrial environments by enabling secure and private communication between processes and applications running on the same device or within the same local network. By utilizing local sockets, data can be exchanged and coordinated within the confines of the device or local network, reducing the risk of unauthorized access or interception from external sources. This local communication ensures that sensitive data stays within the trusted boundaries of the industrial environment, enhancing privacy and preventing potential security breaches. Additionally, with the advent of advanced IIoT wireless technologies like 5G, organizations can further enhance network isolation and security, creating dedicated and isolated network environments that offer heightened privacy, control, and protection for sensitive data through features such as Network Slicing, Enhanced Security Mechanisms, Private 5G Networks, and Network Function Virtualization (NFV). Secure and private communication between processes and applications within the industrial environment helps maintain data privacy and prevents potential security breaches.
- Adoption of Virtual Reality (VR) [16] for remote operations has become dominant for industrial applications regarding training and commissioning. Devices that combine a screen, camera, and microphone have become more sophisticated, and machine suppliers more often collaborate with their customers or service engineers through VR. The ability to commission machines remotely has made companies realize that being on-site is only sometimes necessary. The machine supplier can work with the customer through an augmented reality headset, such as a HoloLens. The customer sees virtual reality instructions and maintenance data to perform the necessary tasks, while the machine supplier receives a live feed of what the customer sees. As companies employ VR for training, maintenance, and collaboration purposes, it is crucial to ensure that privacy safeguards are in place to protect sensitive information shared through these immersive technologies.
- Use of machine data to improve customer relations [17,18]. Connected machines have opened new ways to use machine data and improve customer relationships. The above statement highlights the impact of interconnected devices and the data they generate on enhancing customer relationships. Specifically, connected machines and the data they generate enable organizations to leverage the machine data in various ways, leading to improved customer relationships. By utilizing machine data for proactive maintenance, predictive analytics, customized offerings, and enhanced support, organizations can deliver better customer experiences, increase customer satisfaction, and strengthen their relationships with the customers. It is not only interesting for large companies but also for smaller companies to make use of their data. Due to the increase in connected machines, the number of companies with access to critical machine data has also increased tremendously. It is a big challenge for many companies to discover new possibilities. The use of data is not only essential to improve and optimize companies’ machines but also to create a better long-term relationship with customers. Machine data can, for example, be used to prevent equipment failures by predicting and performing machine maintenance before a fault occurs. In this way, machine downtime can ultimately be reduced [19]. Ensuring data security and using anonymization techniques when analyzing and utilizing machine data can help protect customer privacy.
- Machine learning [20]. Machine learning is a branch of AΙ, where systems must be able to learn automatically and improve from experience without being programmed by humans. Applying machine learning can be difficult because preprocessing to label and normalize many data takes time. Unsupervised learning or self-learning methodologies create higher-scale automation [21]. This means that human intervention is no longer needed since the data from the device is automatically sent to the algorithm. Thus, machine learning detects patterns of normal usage; therefore, after some time, it also tracks unusual patterns. For example, a machine creates several terns, but when a part of the machine fails, new patterns are created with donations from the usual pattern. When such a situation occurs, machinery suppliers receive a notification so they know that maintenance is required [22,23]. Implementing data privacy and security measures during data preprocessing, model training, and inference stages is crucial to maintaining privacy while benefiting from machine learning techniques.
- “Smart” packaging [24]. Using direct materials with built-in connections, intelligent packaging delivers advanced benefits for industries. A fundamental feature of smart packaging is enabling customers to interact with it and collect data for more efficient product handling. Smart packaging may include video recipes and other demonstrations that explain the product’s use. ICT and packaging interact in several ways, including sensors, Quick Response (Q.R.) codes, and augmented/virtual/mixed reality possibilities. The objective is to increase the customer value and data collection via intelligent monitoring to optimize the operations and improve efficiency [25]. Ensuring transparent data collection practices, obtaining informed consent, and implementing robust security measures helps to protect customer privacy and build trust.
- Privacy by Design (PbD) [28]: Privacy by Design is a framework that promotes privacy considerations throughout the entire system development lifecycle. It involves embedding privacy features and measures into the architecture, ensuring that privacy is a core principle from the initial design stages. PbD can certainly be applied in IIoT environments. By integrating privacy considerations into the design and development of IIoT systems, organizations can ensure that privacy is a fundamental aspect of their architecture and processes.
- Differential Privacy [29]: Differential privacy is a technique that aims to protect individual privacy while still allowing useful information to be extracted from datasets. It adds noise or perturbation to the data to prevent the identification of specific individuals while preserving the overall statistical properties of the dataset. Differential privacy can be challenging to implement in IIoT environments due to the decentralized and diverse nature of the data sources. However, with careful design and data aggregation techniques, it is possible to apply differential privacy principles in certain IIoT use cases where data privacy is crucial.
- Federated Learning [30]: Federated learning is an approach where machine learning models are trained on decentralized data without transferring the data to a central server. This architecture allows for collaborative model training while keeping the data on individual devices, thereby maintaining privacy. Federated learning can be well-suited for IIoT environments, as it allows collaborative model training while keeping the data on individual devices or local servers. This approach preserves privacy by minimizing data transfer and centralization.
- Homomorphic Encryption [31]: Homomorphic encryption enables computation on encrypted data without decrypting it. It allows data to be processed securely in an encrypted state, preserving privacy during computation. Homomorphic encryption can be complex to implement in resource-constrained IIoT devices and systems due to its computational overhead. However, advancements in hardware and cryptographic techniques may make it more feasible for specific IIoT use cases where privacy-preserving computations are necessary.
- Zero-Knowledge Proofs [32]: Zero-knowledge proofs are cryptographic protocols that allow one party to prove the validity of certain information to another party without revealing the actual information. This approach enables the verification of data or statements without exposing the underlying sensitive data. Zero-knowledge proofs can be challenging to implement in IIoT environments due to the limited computational capabilities and communication constraints of IIoT devices. However, they can be applied in certain scenarios where privacy-preserving authentication or verification is required.
- Data Minimization [33]: Data minimization involves collecting and retaining only the necessary data for a specific purpose, reducing the exposure of personal information. By limiting the amount of data collected, processed, and stored, privacy risks are reduced. Data minimization is highly relevant and applicable in IIoT environments. Limiting the collection, processing, and retention of personal data to what is strictly necessary helps reduce privacy risks and ensures compliance with privacy regulations.
- User-centric Identity and Access Management (IAM) [34]: User-centric IAM puts individuals in control of their personal information. It allows users to manage their own identity and control the sharing of their personal data, ensuring privacy preferences are respected. User-centric IAM may have limited applicability in IIoT environments since the concept of individual users may not always align with the industrial setting. However, similar principles can be applied to manage access, authentication, and authorization of IIoT devices and systems, ensuring that privacy preferences are respected.
- Confidential Transactions [36]: Confidential transactions use cryptographic techniques to obfuscate transaction details while still maintaining the integrity of the blockchain. This allows for the concealment of transaction amounts and participant identities, enhancing privacy.
- Zero-Knowledge Proofs [37]: Zero-knowledge proofs (ZKPs) enable the verification of certain statements or computations without revealing the underlying data. ZKPs can be utilized in blockchain to prove the validity of transactions or smart contract conditions without disclosing the sensitive information involved.
- Ring Signatures [38]: Ring signatures allow for the anonymous signing of a transaction on behalf of a group. In a blockchain context, a ring signature enables a participant to sign a transaction without revealing their specific identity, making it difficult to determine the actual signer.
- Stealth Addresses [39]: Stealth addresses provide privacy in transactions by creating a one-time destination address for each transaction. This prevents the direct association between a sender’s address and the recipient’s address, enhancing privacy.
- Homomorphic Encryption [40]: Homomorphic encryption enables computations to be performed on encrypted data without decrypting it. By applying this technique to blockchain, sensitive data can be stored and processed in an encrypted state, preserving privacy.
- Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge (zk-SNARKs) [41]: zk-SNARKs allow for the verification of computations without revealing the inputs or intermediate steps. This technology can be used in blockchain to prove the validity of a computation, such as verifying a smart contract, while keeping the inputs confidential.
- Permissioned/Private Blockchains [42]: Permissioned or private blockchains restrict participation and access to a select group of known entities. These blockchains provide enhanced privacy as they limit the visibility of transactions and data to authorized participants.
- Healthcare Data Sharing: Blockchain can be used to improve the privacy and security of healthcare data sharing. By storing medical records and sensitive patient information on a blockchain, access can be controlled, and data integrity can be ensured. Patients have control over their own data and can grant access to healthcare providers as needed, reducing the risk of unauthorized access or data breaches. One example is MedRec, a blockchain-based system that allows patients to securely share their medical records with healthcare providers while maintaining privacy and data ownership.
- Supply Chain Management: Blockchain technology has found applications in enhancing privacy and transparency in supply chain management. By recording transactions and tracking products on a blockchain, stakeholders can verify the authenticity and provenance of goods without revealing sensitive business information. This helps prevent counterfeit products and provides transparency for consumers. IBM’s Food Trust is a notable example that utilizes blockchain to track and trace food products, ensuring the integrity of the supply chain and providing consumers with information about the origin and handling of their food.
- Identity Management: Blockchain offers potential solutions for secure and privacy-preserving identity management systems. By using blockchain, individuals can maintain control over their personal data and selectively disclose information to third parties, reducing the risk of identity theft and unauthorized data access. Self-sovereign identity (SSI) solutions, such as uPort and Sovrin, leverage blockchain to enable individuals to manage and control their digital identities, providing privacy-enhancing features and reducing reliance on centralized identity providers.
- Financial Transactions and Privacy: Blockchain technology can improve privacy in financial transactions by reducing the need for trusted intermediaries and providing pseudonymity. Cryptocurrencies like Bitcoin and privacy-focused cryptocurrencies like Monero utilize blockchain to facilitate secure, decentralized, and pseudonymous transactions. While blockchain transactions are public, privacy-focused techniques such as ring signatures, stealth addresses, and zero-knowledge proofs are employed to obfuscate transaction details and enhance privacy.
- Local Training: In federated learning, the training of the machine learning model takes place locally on individual devices or edge servers. This means that data remains on the devices, and only model updates (such as gradients) are shared with the central server or aggregator.
- Differential Privacy: Differential privacy techniques can be employed in federated learning to further protect privacy. By adding controlled noise or perturbation to the local model updates before sharing them, the individual data points and patterns are obfuscated, preventing the reconstruction of sensitive information.
- Encryption: Encryption techniques can be applied to protect the confidentiality of the model updates during transmission. Secure multi-party computation (MPC) protocols, homomorphic encryption, or secure enclaves (such as Trusted Execution Environments) can be utilized to ensure that the model updates remain private.
- Aggregation with Privacy Preservation: The central server or aggregator collects the encrypted or differentially private model updates from the participants and performs the aggregation to update the shared model. Aggregation techniques can be designed in a way that preserves privacy, such as using secure aggregation protocols that do not reveal individual contributions.
- On-Device Personalization: Federated learning can also support on-device personalization, where the shared model is further fine-tuned or customized on individual devices using locally available data. This approach ensures that sensitive data remains on the user’s device, enhancing privacy.
- Secure Communication: Secure communication protocols, such as encrypted channels and secure socket layers (SSL/TLS), should be employed during data transmission between the participants and the central server to protect against eavesdropping and data tampering.
- Healthcare [46]: Federated learning can be applied in healthcare settings to enable collaborative model training while preserving patient privacy. Hospitals or medical institutions can train machine learning models using local patient data without sharing sensitive patient information. The models are then aggregated or updated in a privacy-preserving manner, allowing healthcare providers to benefit from shared insights without compromising patient confidentiality. This approach can be useful for applications such as disease diagnosis, medical image analysis, or predictive analytics.
- Smart Devices and the Internet of Things (IoT) [47]: Federated learning is well-suited for scenarios involving edge devices or IoT devices. These devices often have limited computational resources, making it challenging to send large amounts of data to a centralized server for model training. With federated learning, edge devices can collaboratively train machine learning models using locally collected data while keeping the data on the device. Only model updates or aggregated information is sent to a central server, ensuring privacy while benefiting from shared knowledge. This is useful in applications such as personalized recommendations, activity recognition, or anomaly detection in smart homes or industrial IoT settings.
- Financial Services [48]: Federated learning can enhance privacy in financial services by enabling collaborative model training while keeping sensitive customer data on local servers or devices. Banks or financial institutions can train machine learning models for tasks like fraud detection or credit scoring using locally held customer data. The models’ updates or aggregated information are exchanged in a privacy-preserving manner, ensuring the privacy of individual customer transactions and sensitive financial information.
- Natural Language Processing (NLP) [49]: Federated learning can be applied in NLP tasks to protect user privacy while improving language models. Instead of centralizing user data on a single server, federated learning allows individual devices or servers to train language models using local data. The models’ updates or aggregated information, which preserve the privacy of individual texts, are shared across devices or servers. This approach enhances privacy while enabling the improvement of language models for applications such as voice assistants, chatbots, or sentiment analysis.
4. Dimensions of Privacy
- Identity Privacy. It concerns the identity details of an entity and is related to the concepts of authentication and authorization. Most IIoT data is designed for usage by restricted user groups [51]. Consequently, authentication (understanding the identity of the node or user) and authorization (by granting the necessary access rights) are critical, especially regarding copyright, patents, etc., which are crucial to the existence and viability of the industry [52].
- Location Privacy. It refers to an entity’s location identification information. Said determination violates personal or industrial privacy issues concerning the detection, identification, storage, processing, and sharing of information in a technical or legal context [53].
- Footprint Privacy. It refers to an entity’s unique traceable communication actions. A feature of this function can be found in smart energy grids, characterized by real-time two-way communications [54]. The difficulty of controlling and retrieving energy data exchanged with third parties threatens network users’ privacy. The proposed approach is a comprehensive solution for overcoming concerns related to Wen et al. The standard of footprint’s privacy allows a home user to save encrypted measurement data on a cloud server. When financial audits are required, an authorized requester can submit two queries to the cloud server to retrieve the measurement data [55].
- Specialized Data Types: The industrial domain deals with specific types of data that may not be explicitly covered by the general regulations. Industrial environments often involve sensitive data related to manufacturing processes, proprietary technologies, trade secrets, industrial control systems, or safety protocols. These data types require specialized privacy considerations to protect intellectual property, ensure operational safety, and prevent unauthorized access or misuse.
- Complex Data Ecosystems: Industrial environments typically have complex data ecosystems with interconnected machines, sensors, and control systems. These systems generate and exchange vast amounts of data, often in real-time. General regulations like GDPR may not adequately address the intricacies of managing and securing data within such heterogeneous and dynamic environments. Specific regulations can provide guidelines and requirements tailored to the unique challenges of industrial data ecosystems.
- Safety and Security Risks: Privacy regulations in the industrial domain need to consider not only the protection of personal data, but also the safety and security risks associated with industrial processes. Data breaches or unauthorized access in industrial settings can have severe consequences, including physical harm, environmental damage, or disruptions to critical infrastructure. Specific regulations can address these risks and impose safeguards to mitigate these potential threats.
- Industry-Specific Compliance Requirements: Different industries within the industrial domain, such as manufacturing, energy, or healthcare, may have specific compliance requirements related to privacy and data protection. These requirements may be driven by sector-specific regulations, standards, or contractual obligations. Specific privacy regulations can align with these industry-specific compliance requirements to ensure that organizations within the industrial domain adhere to the necessary privacy practices.
- Operational Constraints and Challenges: The industrial domain often faces operational constraints and challenges that are distinct from other sectors. These may include limited connectivity, remote locations, harsh environments, or legacy systems. General privacy regulations may not consider these operational constraints, making it necessary to have specific regulations that accommodate the unique circumstances of the industrial domain while still ensuring data privacy.
- Data Protection: This dimension refers to the protection of personal data and the need to ensure that data is collected, stored, and processed in a way that complies with applicable data protection laws and regulations.
- Confidentiality: This dimension protects sensitive information from unauthorized access or disclosure. In IIoT systems, confidentiality is particularly important for ensuring the security of trade secrets, intellectual property, and other proprietary information.
- Availability: This dimension ensures that IIoT systems and devices are available and operational when needed. Availability is essential to ensure critical infrastructure and services are not disrupted or compromised.
- Integrity: This dimension refers to the need to ensure the accuracy and reliability of IIoT data and systems. In IIoT systems, integrity is particularly important for ensuring that decisions based on data are accurate and malicious actors do not compromise the systems.
- Non-repudiation: It is a security property that ensures the sender of a message or a digital transaction cannot later deny sending the message or engaging in the transaction. It provides proof that a particular action or communication occurred and prevents individuals from disowning their actions or denying their involvement. In the context of privacy, non-repudiation plays a significant role in maintaining trust and accountability in digital interactions. Specifically:
- Digital Transactions: It ensures that both parties involved in a transaction cannot later deny their participation, protecting the privacy of sensitive information exchanged during the transaction.
- Message Authenticity: Non-repudiation guarantees that the sender of a message cannot deny sending it. This property is particularly essential when exchanging private or confidential messages. It helps prevent unauthorized access and ensures that the recipient can trust the origin and authenticity of the message.
- Digital Signatures: Digital signatures are a cryptographic mechanism used for non-repudiation. By using digital signatures, individuals can sign electronic documents or messages, providing assurance that the content remains unchanged and that the signer cannot later deny their approval.
- Legal Implications: Non-repudiation can have legal implications in contracts and agreements. If a digital transaction or communication has non-repudiation measures in place, it can serve as evidence in case of disputes, protecting the privacy of individuals involved by establishing their roles in the interaction.
5. Industrial Privacy
6. Privacy Threats in the IIoT
- Malware and Ransomware: Attackers can deploy malware or ransomware specifically designed to target ICS or HMI systems. These malicious programs can disrupt the functioning of critical industrial processes, compromise system integrity, and even demand ransom payments in exchange for restoring normal operations.
- Distributed Denial of Service (DDoS): A DDoS attack involves overwhelming a system with a flood of traffic, causing it to become unresponsive or crash. If an attacker successfully launches a DDoS attack against an ICS or HMI system, it can disrupt control signals, delay response times, or render the system inoperable, leading to production interruptions or safety risks.
- Unauthorized Access and Control: If an attacker gains unauthorized access to an ICS or HMI system, they can manipulate control parameters, change setpoints, or issue unauthorized commands. This can lead to process deviations, equipment damage, safety hazards, or even catastrophic incidents.
- Insider Threats: Insiders with malicious intent, such as disgruntled employees or contractors, can abuse their privileged access to ICS or HMI systems. They may deliberately tamper with control settings, sabotage equipment, or steal sensitive data, causing significant disruptions or compromising system integrity.
- Social Engineering: Attackers may employ social engineering techniques to trick authorized users into divulging sensitive information or granting unauthorized access. For example, phishing emails or phone calls can deceive employees into revealing login credentials or executing malicious commands, which can be used to compromise ICS or HMI systems.
- Supply Chain Attacks: ICS or HMI systems can be targeted through vulnerabilities in the supply chain. Attackers may compromise the integrity of hardware, software, or firmware during the manufacturing, distribution, or installation process. This can result in the introduction of malicious components or exploitable weaknesses in the system.
- Identification and Authorization. It is directly related to the concept of identity privacy. It refers to the effort to find correlations between the data that can be used to detect, identify, and maliciously replicate the application of profiles (sets of associated data) to personalize and remember secret, industrial information. Techniques such as the Subscriber Identity Module (SIM) and the Machine Identification Module (MIM), proposed by Borgia [51], are essential solutions worthy of attention. However, these approaches work in centralized single-management networks. At the same time, it is not easy in distributed topologies to manage identification services and standardizations such as the one proposed by Moosavi et al. [52], and it concerns an architecture of authorization of remote end-users using distributed smart gateways, which are based on the Datagram Transport Layer Security (DTLS) handshake protocol. In addition, attacks on the IIoT compromise authorized industrial systems access, and as a result, one such security issue can degrade the related services. Ransomware also causes IIoT devices to malfunction and steals users’ sensitive information and data. In addition, if many smart IIoT devices cannot encrypt user data, malware will emerge. IIoT devices use a network that does not convert data into code to prevent unauthorized device access.
- Localization and tracking. It is directly related to the concept of location privacy [85]. An industry can choose the locations that it chooses to perform its economic functions in. Several issues influence the choice of a suitable location, most notably the nature and characteristics of the industrial activity carried out by the enterprise (e.g., extraction of raw materials or cultivation, production of intermediate or final products, provision of a service) and the associated costs of production, balanced with the cost of physical distribution to the target markets and the importance of proximity to customers as a basis for establishing competitive advantages over rival suppliers. Some locations may be preferred for their production advantages, for example, due to lower labor costs, the availability of investment subsidies, the supply of skilled workers, and parallel access to relevant facilities. Similarly, many service activities must be located in and around the customer’s catchment areas. At the same time, some suppliers may be interested in operating alongside their core customers to synchronize production input requirements better.
- On the other hand, the high price of distribution, especially in the case of bulky products with low added value or the international context, the imposition of tariffs and quotas on imports creates essential requirements for an appropriate position oriented to the market, but one that is also protected from the prying eyes of the competition and espionage. A low-cost technical solution that adds protection to the IoT environment was proposed by Joy et al. [53] by embedding in GPS devices privacy software that ensures that IoT devices and their administrators have fine-grained control over releasing their position. In addition, the safety of the data ingested from numerous IIoT devices is related directly to other data security and privacy concerns from insecure cloud infrastructures, web applications, and mobile environments. As a result, it is necessary to follow data transmission security rules in each domain so that there are measures in place to identify the path from whose device the data is transmitted. It is also critical to eliminate irrelevant data and data without relation to the actual operation. Although compliance with numerous regulatory structures becomes complex when multiple data is stockpiled, the infrastructure must be carried out with separate services for controlling the data linked to interconnected devices and environments [86].
- Profiling. The threat lies in violating privacy and monitoring persons or individuals in their association with specific industrial processes. Accordingly, it may refer to identifying, collecting, and processing information derived from services or reference models, which may constitute an industrial secret. Characteristics of the ongoing concern for protecting IoT devices from profiling threats are efforts to enhance privacy in RFID devices [87,88], sensor systems [89], wireless networking [90,91], and identity management [88,92] technologies, to enhance privacy or encryption technology [93,94].
- Hardware Lifecycle. Industrial devices are, in most cases, remanufactured and reused. Therefore, sensitive information, device logs, and data stored in memories or storage media will likely fall into the wrong hands with unpredictable consequences [95]. For the specific threats, the industry should draw up and implement a uniform policy for the management of industrial equipment, as well as apply techniques of total deletion [96] of the data locally or in distributed information processing systems which include first and second sites, which may consist of corresponding information production and copying sites [97]. Also, IIoT hardware addresses security and privacy threats from inadequate testing and a lack of upgrading processes [98]. IIoT device manufacturers, while willing to produce various devices, do not consider the security and upgrading concerns of said devices because they require extensive testing and, therefore, additional costs. These malfunctions increase the possibility of security and privacy attacks when released into a real-world industrial infrastructure [96].
- Inventory attack. Inventory assaults are the unlawful acquisition of information about the equipment’s presence and attributes. Also, with the implementation of machine to machine vision [99,100], intelligent devices can be questioned about their energy footprint, communication rates, reaction times, and other distinctive characteristics, which might be used to identify their kind and model, subject to limitations imposed by legal or presumably legal organizations. Thus, evil individuals who violate the privacy of an industry can assemble an inventory list of the gadgets in a particular building or factory, as well as information about how each device operates [17]. Here too, cryptography solutions have been proposed for aggregation mechanisms. This secure aggregation protocol meets the IoT requirements [101]. It evaluates its effectiveness in light of various system configurations, the wireless channel’s impact on packet error rates, and private communication techniques [102].
- Linkage. This threat consists of connecting different previously separated systems so that combining the data and the sources reveals critical information that would be impossible to tell by individual plans. Moreover, to ensure the smooth operation of IIoT devices, it is essential to have flat networking that will allow them to function effectively. It is critical to have a high-quality open networking system for this purpose [103]. This particular factor in IIoT networks creates a security barrier. In this regard, industrial enterprises must thoroughly assess their security policies to ensure that IIoT devices are not vulnerable to threats [68]. Also, providers must understand the significance of adequately configuring the networking device and services and that data privacy entails various processes, such as efficiently removing sensitive information through data segregation [48].
7. Privacy Requirements
8. Suggestions
- Data Protection Impact Assessments (DPIAs): Conducting DPIAs can help identify potential privacy risks and ensure that appropriate measures are in place to mitigate these risks.
- Privacy by Design: Implementing privacy by design principles can help ensure that privacy is integrated into developing IIoT systems and devices from the outset.
- Encryption and Access Controls: Encryption and access controls can help protect sensitive information and personal data from unauthorized access or disclosure.
- Regular Vulnerability Assessments: Regular assessments can help identify and address security and privacy vulnerabilities in IoT systems and devices.
- Employee Training: Ensuring that employees are trained in privacy requirements and best practices can help minimize the risk of insider threats and improve the overall privacy posture of the organization.
- Compliance with Applicable Data Protection Laws and Regulations: Compliance with applicable data protection laws and regulations, such as the GDPR [134] in the European Union, is essential for protecting the privacy rights of individuals and organizations involved in IIoT operations.
- Regular Review of Privacy Policies and Procedures: Regularly reviewing and updating privacy policies and procedures can help ensure that they are up-to-date and effective in addressing emerging threats and risks.
9. Discussion
- Limited scope or focus: The study may cover only some aspects or perspectives related to the research question, or it may focus on a particular issue, industry, or geography.
- Methodological limitations: The study may have limitations in data collection, analysis, or interpretation, which can affect the validity and reliability of the findings.
- Lack of generalizability: The study findings may not be generalizable to other contexts, populations, or settings due to specific sample selection criteria or limitations in the study design.
- Bias: The study may be affected by biases or assumptions, conscious or unconscious, that can influence the research process, interpretation, and conclusions.
10. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
IIoT | Industrial Internet of Things |
AI | Artificial Intelligence |
VR | Virtual Reality |
QR | Quick Response |
GDPR | General Data Protection Regulation |
DPO | Data Protection Officer |
MAC | Media-Access Control |
SDN | Software-Defined Network |
RFID | Radio Frequency Identification |
ICT | Information and Communication Technology |
HMI | Human-Machine Interfaces |
OEM | Original Equipment Manufacturer |
SHA | Secure Hash Algorithm |
HMAC | Hash-Based Message Authenticated Code |
ECDSA | Elliptic Curve Digital Signature Algorithm |
SIM | Subscriber Identity Module |
MIM | Machine Identification Module |
DTLS | Datagram Transport Layer Security |
MPC | Multiparty Computation |
LSS | Linear Secret Sharing |
DPIA | Data Protection Impact Assessments |
HCI | Human-Computer Interaction |
References
- Alqassem, I.; Svetinovic, D. A taxonomy of security and privacy requirements for the Internet of Things IoT. In Proceedings of the 2014 IEEE International Conference on Industrial Engineering and Engineering Management, Selangor, Malaysia, 9–12 December 2014; pp. 1244–1248. [Google Scholar]
- Bogue, R. Cloud robotics: A review of technologies, developments and applications. Ind. Robot Int. J. 2017, 44, 1–5. [Google Scholar] [CrossRef]
- Sulaiman, S.; Aldeehani, A.; Alhajji, M.; Aziz, F.A. Development of integrated supply chain system in manufacturing industry. J. Comput. Methods Sci. Eng. 2021, 21, 599–611. [Google Scholar] [CrossRef]
- Demertzis, K.; Kikiras, P.; Iliadis, L. A Blockchained Secure and Integrity-Preserved Architecture for Military Logistics Operations. In Engineering Applications of Neural Networks; Iliadis, L., Jayne, C., Tefas, A., Pimenidis, E., Eds.; Communications in Computer and Information Science; Springer International Publishing: Cham, Germany, 2022; pp. 271–283. [Google Scholar]
- Yin, C.; Xi, J.; Sun, R.; Wang, J. Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things. IEEE Trans. Ind. Inform. 2018, 14, 3628–3636. [Google Scholar] [CrossRef]
- Zhao, Y.; Yang, L.T.; Sun, J. Privacy-Preserving Tensor-Based Multiple Clusterings on Cloud for Industrial IoT. IEEE Trans. Ind. Inform. 2019, 15, 2372–2381. [Google Scholar] [CrossRef]
- Miao, Y.; Liu, X.; Deng, R.H.; Wu, H.; Li, H.; Li, J.; Wu, D. Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things. IEEE Trans. Ind. Inform. 2019, 15, 3206–3217. [Google Scholar] [CrossRef]
- Sani, A.S.; Yuan, D.; Bao, W.; Yeoh, P.L.; Dong, Z.Y.; Vucetic, B.; Bertino, E. Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; pp. 1920–1930. [Google Scholar]
- Zhang, X.; Chen, X.; Liu, J.K.; Xiang, Y. DeepPAR and DeepDPA: Privacy Preserving and Asynchronous Deep Learning for Industrial IoT. IEEE Trans. Ind. Inform. 2020, 16, 2081–2090. [Google Scholar] [CrossRef]
- Lu, Y.; Huang, X.; Dai, Y.; Maharjan, S.; Zhang, Y. Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT. IEEE Trans. Ind. Inform. 2020, 16, 4177–4186. [Google Scholar] [CrossRef]
- Gai, K.; Wu, Y.; Zhu, L.; Zhang, Z.; Qiu, M. Differential Privacy-Based Blockchain for Industrial Internet-of-Things. IEEE Trans. Ind. Inform. 2020, 16, 4156–4165. [Google Scholar] [CrossRef]
- Ali, R.F.; Muneer, A.; Dominic, P.D.D.; Ghaleb, E.A.A.; Al-Ashmori, A. Survey on Cyber Security for Industrial Control Systems. In Proceedings of the 2021 International Conference on Data Analytics for Business and Industry (ICDABI), Sakheer, Bahrain, 25–26 October 2021; pp. 630–634. [Google Scholar]
- Hamid, B.; Jhanjhi, N.; Humayun, M.; Khan, A.; Alsayat, A. Cyber Security Issues and Challenges for Smart Cities: A survey. In Proceedings of the 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), Karachi, Pakistan, 14–15 December 2019; pp. 1–7. [Google Scholar]
- Lai, W.; Yan, Q. Federated Learning for Detecting COVID-19 in Chest CT Images: A Lightweight Federated Learning Approach. In Proceedings of the 2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC), Qingdao, China, 2–4 December 2022; pp. 146–149. [Google Scholar]
- Arachchige, P.C.M.; Bertok, P.; Khalil, I.; Liu, D.; Camtepe, S.; Atiquzzaman, M. A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems. IEEE Trans. Ind. Inform. 2020, 16, 6092–6102. [Google Scholar] [CrossRef]
- Ushakova, O.V.; Martynov, V.V.; Brovkova, M.B.; Torgashova, O.Y.; Bolshakov, A.S.; Kamalov, A.B. Development of Visual Analytics of Monitoring Results Using Augmented Reality Tools Based on the IIoT (Industrial Internet of Things) Platform. In Proceedings of the 2022 6th Scientific School Dynamics of Complex Networks and their Applications (DCNA), Kaliningrad, Russian Federation, 14–16 September 2022; pp. 288–291. [Google Scholar]
- Esfahani, A.; Mantas, G.; Matischek, R.; Saghezchi, F.B.; Rodriguez, J.; Bicaku, A.; Maksuti, S.; Tauber, M.G.; Schmittner, C.; Bastos, J. A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment. IEEE Internet Things J. 2019, 6, 288–296. [Google Scholar] [CrossRef]
- Grossmann, U.; Gansemer, S.; Pauls, A. Fair allocation of benefits for M2M communication based collaborative business models. In Proceedings of the 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Warsaw, Poland, 24–26 September 2015; Volume 2, pp. 812–816. [Google Scholar]
- Akubathini, P.; Chouksey, S.; Satheesh, H.S. Evaluation of Machine Learning approaches for resource constrained IIoT devices. In Proceedings of the 2021 13th International Conference on Information Technology and Electrical Engineering (ICITEE), Chiang Mai, Thailand, 14–15 October 2021; pp. 74–79. [Google Scholar]
- Choudhry, M.D.; Jeevanandham, S.; Rose, B.; Mol, S. Machine Learning Frameworks for Industrial Internet of Things (IIoT): A Comprehensive Analysis. In Proceedings of the 2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT), Trichy, India, 16–18 February 2022; pp. 1–6. [Google Scholar]
- Sarker, I.H. Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions. SN Comput. Sci. 2021, 2, 420. [Google Scholar] [CrossRef] [PubMed]
- Djibo, M.; El-Sharkh, M.Y.; Sisworahardjo, N. Fuzzy Artificial Immune System based Generators Preventive Maintenance Scheduling. In Proceedings of the SoutheastCon 2022, Mobile, AL, USA, 26 March–3 April 2022; pp. 649–654. [Google Scholar]
- Demertzis, K.; Iliadis, L.; Anezakis, V.-D. Commentary: Aedes albopictus and Aedes japonicus—Two invasive mosquito species with different temperature niches in Europe. Front. Environ. Sci. 2017, 5, 85. [Google Scholar] [CrossRef]
- Korostynska, O. Sensors for Smart Packaging in Healthcare and Food Industry. In Proceedings of the 2021 IEEE Sensors, Sydney, Australia, 31 October–3 November 2021; p. 1. [Google Scholar]
- Akhtar, N.; Mian, A.; Kardan, N.; Shah, M. Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey. IEEE Access 2021, 9, 155161–155196. [Google Scholar] [CrossRef]
- Drosatos, G.; Rantos, K.; Karampatzakis, D.; Lagkas, T.; Sarigiannidis, P. Privacy-preserving solutions in the Industrial Internet of Things. In Proceedings of the 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS), Marina del Rey, CA, USA, 25–27 May 2020; pp. 219–226. [Google Scholar]
- Demertzis, K.; Rantos, K.; Drosatos, G. A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processing in the IoT Ecosystem. Big Data Cogn. Comput. 2020, 4, 9. [Google Scholar] [CrossRef]
- Alhirabi, N.; Rana, O.; Perera, C. Demo Abstract: PARROT: Privacy by Design Tool for Internet of Things. In Proceedings of the 2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI), Milano, Italy, 4–6 May 2022; pp. 107–108. [Google Scholar]
- Song, Y.; Ding, L.; Liu, X.; Du, M. Differential Privacy Protection Algorithm Based on Zero Trust Architecture for Industrial Internet. In Proceedings of the 2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS), Shenyang, China, 29–31 July 2022; pp. 917–920. [Google Scholar]
- Govindwar, G.D.; Dhande, S.S. A Review on Federated Learning approach in Artificial Intelligence. In Proceedings of the 2022 6th International Conference On Computing, Communication, Control And Automation (ICCUBEA), Pune, India, 26–27 August 2022; pp. 1–5. [Google Scholar]
- Kogos, K.G.; Filippova, K.S.; Epishkina, A.V. Fully homomorphic encryption schemes: The state of the art. In Proceedings of the 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Moscow, Russia, 1–3 February 2017; pp. 463–466. [Google Scholar]
- Čapko, D.; Vukmirović, S.; Nedić, N. State of the Art of Zero-Knowledge Proofs in Blockchain. In Proceedings of the 2022 30th Telecommunications Forum (TELFOR), Belgrade, Serbia, 15–16 November 2022; pp. 1–4. [Google Scholar]
- Mukta, R.; Paik, H.; Lu, Q.; Kanhere, S.S. A survey of data minimisation techniques in blockchain-based healthcare. Comput. Netw. 2022, 205, 108766. [Google Scholar] [CrossRef]
- Subramaniyan, S.P.L.; Prabhu, S. The Impact of Adopting Blockchain-based Identity Access Management: Current Applications and Potential Directions. In Proceedings of the 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), Salem, India, 4–6 May 2023; pp. 1240–1245. [Google Scholar]
- Chen, Y.; Lu, Y.; Bulysheva, L. Applications of Blockchain in Industry 4.0: A Review. Inf. Syst. Front. 2022, 1–15. [Google Scholar] [CrossRef]
- Li, X.; Xu, C.; Zhao, Q. Shellproof: More Efficient Zero-Knowledge Proofs for Confidential Transactions in Blockchain. In Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada, 2–6 May 2020. [Google Scholar]
- Sah, C.P.; Gupta, P.R. Comparative Analysis of Zero-Knowledge Proofs Technique using Quadratic Residuosity Problem. In Proceedings of the 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 13–15 March 2019. [Google Scholar]
- Afroaz, K.; Subba Rao, Y.V.; Rukma, R.N. A Key Escrow Free Anonymous Identity Based Encryption Scheme using Ring Signatures. In Proceedings of the 2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT), Indore, India, 23–24 April 2022. [Google Scholar]
- Feng, C.; Tan, L.; Xiao, H.; Yu, K.; Qi, X.; Wen, Z.; Jiang, Y. PDKSAP : Perfected Double-Key Stealth Address Protocol without Temporary Key Leakage in Blockchain. In Proceedings of the 2020 IEEE/CIC International Conference on Communications in China (ICCC Workshops), Chongqing, China, 9–11 August 2020. [Google Scholar]
- Chaudhary, P.; Gupta, R.; Singh, A.; Majumder, P. Analysis and Comparison of Various Fully Homomorphic Encryption Techniques. In Proceedings of the 2019 International Conference on Computing, Power and Communication Technologies (GUCON), New Delhi, India, 27–28 September 2019. [Google Scholar]
- Qi, H.; Cheng, Y.; Xu, M.; Yu, D.; Wang, H.; Lyu, W. Split: A Hash-Based Memory Optimization Method for Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK). IEEE Trans. Comput. 2023, 72, 1857–1870. [Google Scholar] [CrossRef]
- Krishnaswamy, D.; Chauhan, K.; Bhatnagar, A.; Jha, S.; Srivastava, S.; Bhamrah, D.; Prasad, M. The Design of a Mobile Number Portability System on a Permissioned Private Blockchain Platform. In Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Seoul, Republic of Korea, 14–17 May 2019. [Google Scholar]
- Xu, G.; Li, H.; Liu, S.; Yang, K.; Lin, X. VerifyNet: Secure and Verifiable Federated Learning. IEEE Trans. Inf. Forensics Secur. 2020, 15, 911–926. [Google Scholar] [CrossRef]
- Zheng, H.; Hu, H.; Han, Z. Preserving User Privacy for Machine Learning: Local Differential Privacy or Federated Machine Learning? IEEE Intell. Syst. 2020, 35, 5–14. [Google Scholar] [CrossRef]
- Electronics|Free Full-Text|Federated Auto-Meta-Ensemble Learning Framework for AI-Enabled Military Operations. Available online: https://www.mdpi.com/2079-9292/12/2/430 (accessed on 22 April 2023).
- Moon, S.; Hee Lee, W. Privacy-Preserving Federated Learning in Healthcare. In Proceedings of the 2023 International Conference on Electronics, Information, and Communication (ICEIC), Singapore, 5–8 February 2023. [Google Scholar]
- Bodagala, H.; Priyanka, H. Security for IoT using Federated Learning. In Proceedings of the 2022 International Conference on Recent Trends in Microelectronics, Automation, Computing and Communications Systems (ICMACC), Hyderabad, India, 28–30 December 2022. [Google Scholar]
- Lv, B.; Cheng, P.; Zhang, C.; Ye, H.; Meng, X.; Wang, X. Research on Modeling of E-banking Fraud Account Identification Based on Federated Learning. In Proceedings of the 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), AB, Canada, 25–28 October 2021. [Google Scholar]
- Sun, Y.; Chong, N.; Ochiai, H. Federated Phish Bowl: LSTM-Based Decentralized Phishing Email Detection. In Proceedings of the 2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Prague, Czech Republic, 9–12 October 2022. [Google Scholar]
- Martınez-Balleste, A.; Perez-Martınez, P.A.; Solanas, A. The pursuit of citizens’ privacy: A privacy-aware smart city is possible. IEEE Commun. Mag. 2013, 51, 136–141. [Google Scholar] [CrossRef]
- Borgia, E. The Internet of Things vision : Key features, applications and open issues. Comput. Commun. 2014, 54, 1–31. [Google Scholar] [CrossRef]
- Moosavi, S.R.; Gia, T.N.; Rahmani, A.-M.; Nigussie, E.; Virtanen, S.; Isoaho, J.; Tenhunen, H. SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways. Procedia Comput. Sci. 2015, 52, 452–459. [Google Scholar] [CrossRef]
- Joy, J.; Le, M.; Gerla, M. LocationSafe: Granular location privacy for IoT devices. In Proceedings of the Eighth Wireless of the Students, by the Students, and for the Students Workshop, Association for Computing Machinery, New York, NY, USA; 2016; pp. 39–41. [Google Scholar]
- Demertzis, K.; Iliadis, L.S.; Anezakis, V.-D. An innovative soft computing system for smart energy grids cybersecurity. Adv. Build. Energy Res. 2018, 12, 3–24. [Google Scholar] [CrossRef]
- Wen, M.; Lu, R.; Zhang, K.; Lei, J.; Liang, X.; Shen, X. PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid. IEEE Trans. Emerg. Top. Comput. 2013, 1, 178–191. [Google Scholar] [CrossRef]
- Garcia, R.D.; Sankar Ramachandran, G.; Jurdak, R.; Ueyama, J. A Blockchain-based Data Governance with Privacy and Provenance: A case study for e-Prescription. In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Shanghai, China, 2–5 May 2022. [Google Scholar]
- Kaneen, C.K.; Petrakis, E.G.M. Towards evaluating GDPR compliance in IoT applications. Procedia Comput. Sci. 2020, 176, 2989–2998. [Google Scholar] [CrossRef]
- Sullivan, C. EU GDPR or APEC CBPR? A comparative analysis of the approach of the EU and APEC to cross border data transfers and protection of personal data in the IoT era. Comput. Law Secur. Rev. 2019, 35, 380–397. [Google Scholar] [CrossRef]
- Brodin, M. A Framework for GDPR Compliance for Small- and Medium-Sized Enterprises. Eur. J. Secur. Res. 2019, 4, 243–264. [Google Scholar] [CrossRef]
- Larrucea, X.; Moffie, M.; Asaf, S.; Santamaria, I. Towards a GDPR compliant way to secure European cross border Healthcare Industry 4.0. Comput. Stand. Interfaces 2020, 69, 103408. [Google Scholar] [CrossRef]
- Aridor, G.; Che, Y.-K.; Salz, T. The Effect of Privacy Regulation on the Data Industry: Empirical Evidence from GDPR. NBER Work. Pap. 2020, 93–94. [Google Scholar]
- Boussada, R.; Elhdhili, M.E.; Saidane, L.A. A survey on privacy: Terminology, mechanisms and attacks. In Proceedings of the 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 29 November–2 December 2016. [Google Scholar]
- Industrial Internet Security Framework. Ind. IoT Consort. Available online: https://www.iiconsortium.org/iisf/ (accessed on 15 January 2023).
- Bonacin, R.; Fugini, M.; Martoglia, R.; Nabuco, O.; Saïs, F. Web2Touch 2020–21 : Semantic Technologies for Smart Information Sharing and Web Collaboration. In Proceedings of the 2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Bayonne, France, 10–13 September 2020. [Google Scholar]
- Butt, S.A.; Diaz-Martinez, J.L.; Jamal, T.; Ali, A.; De-La-Hoz-Franco, E.; Shoaib, M. IoT Smart Health Security Threats. In Proceedings of the 2019 19th International Conference on Computational Science and Its Applications (ICCSA), St. Petersburg, Russia, 1–4 July 2019. [Google Scholar]
- Duezguen, R.; Mayer, P.; Berens, B.; Beckmann, C.; Aldag, L.; Mossano, M.; Volkamer, M.; Strufe, T. How to Increase Smart Home Security and Privacy Risk Perception. In Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20–22 October 2021. [Google Scholar]
- Aich, S.; Chakraborty, S.; Sain, M.; Lee, H.; Kim, H.-C. A Review on Benefits of IoT Integrated Blockchain based Supply Chain Management Implementations across Different Sectors with Case Study. In Proceedings of the 2019 21st International Conference on Advanced Communication Technology (ICACT), PyeongChang, Republic of Korea, 17–20 February 2019. [Google Scholar]
- Sharma, H.K.; Kumar, A.; Pant, S.; Ram, M. 7 Security and Privacy challenge in Smart Healthcare and Telemedicine systems. In Artificial Intelligence, Blockchain and IoT for Smart Healthcare; River Publishers: Nordjylland, Denmark, 2022; pp. 67–76. ISBN 978-87-7022-756-8. [Google Scholar]
- Szymanski, T.H. Strengthening security and privacy in an ultra-dense green 5G Radio Access Network for the industrial and tactile Internet of Things. In Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 26–30 June 2017. [Google Scholar]
- Demertzis, K.; Kikiras, P.; Tziritas, N.; Sanchez, S.L.; Iliadis, L. The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence. Big Data Cogn. Comput. 2018, 2, 35. [Google Scholar] [CrossRef]
- Hassanzadeh, A.; Modi, S.; Mulchandani, S. Towards effective security control assignment in the Industrial Internet of Things. In Proceedings of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, 14–16 December 2015. [Google Scholar]
- Occhiuzzi, C.; Amendola, S.; Manzari, S.; Marrocco, G. Industrial RFID sensing networks for critical infrastructure security. In Proceedings of the 46th European Microwave Conference (EuMC), London, UK, 4–6 October 2016. [Google Scholar]
- He, D.; Zeadally, S. An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography. IEEE Internet Things J. 2015, 2, 72–83. [Google Scholar] [CrossRef]
- Sajid, A.; Abbas, H.; Saleem, K. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges. IEEE Access 2016, 4, 1375–1384. [Google Scholar] [CrossRef]
- Barati, M.; Rana, O.; Petri, I.; Theodorakopoulos, G. GDPR Compliance Verification in Internet of Things. IEEE Access 2020, 8, 119697–119709. [Google Scholar] [CrossRef]
- Satrio Wicaksono, M.G.; Suryani, E.; Hendrawan, R.A. Increasing productivity of rice plants based on IoT (Internet Of Things) to realize Smart Agriculture using System Thinking approach. Procedia Comput. Sci. 2022, 197, 607–616. [Google Scholar] [CrossRef]
- Xi, W.; Ling, L. Research on IoT Privacy Security Risks. In Proceedings of the 2016 International Conference on Industrial Informatics—Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII), Wuhan, China, 3–4 December 2016. [Google Scholar]
- Drias, Z.; Serhrouchni, A.; Vogel, O. Analysis of cyber security for industrial control systems. In Proceedings of the 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), Shanghai, China, 5–7 August 2015. [Google Scholar]
- Weber, R.H. Internet of things: Privacy issues revisited. Comput. Law Secur. Rev. 2015, 31, 618–627. [Google Scholar] [CrossRef]
- Tsiknas, K.; Taketzis, D.; Demertzis, K.; Skianis, C. Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures. IoT 2021, 2, 163–186. [Google Scholar] [CrossRef]
- Sannervik, F.; Magdum, P. Security Assessment of IoT-Devices Grouped by Similar Attributes : Researching Patterns in Vulnerabilities of IoT-Devices by Grouping Devices Based on Which Protocols are Running. 2021. Available online: https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302147 (accessed on 19 June 2023).
- Electronics|Free Full-Text|A Blockchained AutoML Network Traffic Analyzer to Industrial Cyber Defense and Protection. Available online: https://www.mdpi.com/2079-9292/12/6/1484 (accessed on 19 June 2023).
- Papanikolaou, A.; Alevizopoulos, A.; Ilioudis, C.; Demertzis, K.; Rantos, K. An autoML network traffic analyzer for cyber threat detection. Int. J. Inf. Secur. 2023, 1–20. [Google Scholar] [CrossRef]
- Mircică, N. Cyber-physical systems for cognitive Industrial Internet of Things: Sensory big data, smart mobile devices, and automated manufacturing processes. Anal. Metaphys. 2019, 18, 37–43. [Google Scholar]
- Liu, B.; Zhou, W.; Zhu, T.; Gao, L.; Xiang, Y. Location Privacy and Its Applications: A Systematic Study. IEEE Access 2018, 6, 17606–17624. [Google Scholar] [CrossRef]
- Ziegeldorf, J.H.; Morchon, O.G.; Wehrle, K. Privacy in the Internet of Things: Threats and challenges, Security Comm. Networks 2014, 7, 2728–2742. [Google Scholar] [CrossRef]
- Langheinrich, M. A survey of RFID privacy approaches. Pers. Ubiquitous Comput 2009, 13, 413–421. [Google Scholar] [CrossRef]
- Camenisch, J.A.; Sommer, D.; Fischer-Hubner, S.; Hansen, M.; Krasemann, H.; Lacoste, G.; Leenes, R.; Tseng, J. Privacy and identity management for everyone. In Proceedings of the 2005 workshop on Digital identity management, DIM ’05, ACM, Fairfax, VA, USA, 11 November 2005. [Google Scholar]
- Zhang, W.; Wang, C.; Feng, T. GPˆ2S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data (concise contribution). Sixth Annu. IEEE Int. Conf. 2008, 179–184. [Google Scholar] [CrossRef]
- Rios, R.; Cuellar, J.; Lopez, J. Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. In Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS 2012), LNCS, Pisa, Italy, 10–12 September 2012; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7459, pp. 163–180. [Google Scholar]
- Chan, A.C.F.; Castelluccia, C. A security framework for privacy-preserving data aggregation in wireless sensor networks. ACM Trans. Sens. Netw. TOSN 2011, 7, 1–45. [Google Scholar] [CrossRef]
- Camenisch, J.; Herreweghen, E. Design and implementation of the idemix anonymous credential system. In Proceedings of the 9th ACM conference on Computer and communications security, CCS ’02, ACM, Washington, DC USA, 18 –22 November 2002. [Google Scholar]
- Ashur, T.; Delvaux, J.; Lee, S.; Maene, P.; Marin, E.; Nikova, S.; Reparaz, O.; Rozic, V.; Singelée, D.; Yang, B.; et al. A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network (LPWAN). In Cryptology and Network Security, #E International Conference, CANS 2017, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar]
- Cnudde, T.; Nikova, S. Securing the PRESENT Block Cipher Against Combined Side-Channel Analysis and Fault Attacks. IEEE Trans. Very Large Scale Integr. VLSI Syst. 2017, 25, 1–11. [Google Scholar] [CrossRef]
- Hamid, A.; Baba, I.B.; Sani, W. Proposal for the risk management implementation phase in oil field development project by adding value on the refurbishment of critical equipment. MATEC Web Conf 2017, 97, 01067. [Google Scholar] [CrossRef]
- Fitzpatrick, J.; Dancho, M.; Higgins, J.M.; Ellis, R.W.; Rub, B. U.S. Patent No. 9,431,113.
- Manogaran, G.; Thota, C.; Lopez, D.; Sundarasekar, R. Big Data Security Intelligence for Healthcare Industry 4.0; Springer Series in Advanced Manufacturing; Springer: Cham, Germany, 2017. [Google Scholar]
- King, J.; Stallings, J.; Riaz, M. To log, or not to log: Using heuristics to identify mandatory log events—a controlled experiment. Empir Softw. Eng 2017, 22, 2684. [Google Scholar] [CrossRef]
- Cheng, Y.; Naslund, M.; Selander, G.; Fogelström, E. Privacy in machine-to-machine communications A state-of-the-art survey. In Proceedings of the 2012 IEEE International Conference on Communication Systems (ICCS), Singapore, 21–23 November 2012; pp. 75–79. [Google Scholar]
- Demertzis, K.; Iliadis, L. Adaptive Elitist Differential Evolution Extreme Learning Machines on Big Data: Intelligent Recognition of Invasive Species. In Advances in Big Data; Angelov, P., Manolopoulos, Y., Iliadis, L., Roy, A., Vellasco, M., Eds.; Springer International Publishing: Cham, Germany, 2017; pp. 333–345. [Google Scholar]
- Bartoli, A.; Hernandez-Serrano, J.; Soriano, M.; Dohler, M.; Kountouris, A.; Barthel, D. Secure Lossless Aggregation for Smart Grid M2M Networks. In Proceedings of the 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, 4–6 October 2010; pp. 333–338. [Google Scholar]
- Nicholson, H. CyberReef Solutions Inc Network-based Machine-To-Machine (M2M) Private Networking System. U.S. Patent 20160337784 A1.
- Graham, J.; Hieb, J.; Naber, J. Improving cybersecurity for Industrial Control Systems. In Proceedings of the 2016 IEEE 25th International Symposium on Industrial Electronics (ISIE), Santa Clara, CA, USA, 8–10 June 2016; pp. 618–623. [Google Scholar]
- Demertzis, K.; Iliadis, L.; Pimenidis, E.; Tziritas, N.; Koziri, M.; Kikiras, P. Blockchained Adaptive Federated Auto MetaLearning BigData and DevOps CyberSecurity Architecture in Industry 4.0. In Proceedings of the 22nd Engineering Applications of Neural Networks Conference; Iliadis, L., Macintyre, J., Jayne, C., Pimenidis, E., Eds.; Springer International Publishing: Cham, Germany, 2021; pp. 345–363. [Google Scholar]
- Wang, P.; Ali, A.; Kelly, W. Data security and threat modeling for smart city infrastructure. In Proceedings of the 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), Shanghai, China, 5–7 August 2015; pp. 1–6. [Google Scholar]
- Colella, A.; Castiglione, A.; Colombini, C.M. Industrial Control System Cyber Threats Indicators in Smart Grid Technology. In Proceedings of the 17th International Conference on Network-Based Information Systems, Salerno, Italy, 10–12 September 2014; pp. 374–380. [Google Scholar]
- Razzaq, A.; Hur, A.; Ahmad, H.F.; Masood, M. Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. In Proceedings of the 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), Mexico City, Mexico, 6–8 March 2013; pp. 1–6. [Google Scholar]
- GSM Association Official Document CLP.13—IIoT Security Guidelines Endpoint Ecosystem. Version 2016, 1.
- Hristova, A.; Obermeier, S.; Schlegel, R. Secure design of engineering software tools in Industrial Automation and Control Systems. In Proceedings of the 11th IEEE International Conference on Industrial Informatics (INDIN), Bochum, Germany, 29–31 July 2013; pp. 695–700. [Google Scholar]
- Chang, H.; Kang, J.; Kwon, H.; Lee, C. A Research Design on Technology Development for Securing Industrial Assets. In Proceedings of the 2nd International Conference on Information Technology Convergence and Services, Cebu, Philippines, 11–13 August 2010; pp. 1–4. [Google Scholar]
- Edwards, L.; McAuley, D.; Diver, L. From Privacy Impact Assessment to Social Impact Assessment. In Proceedings of the 2016 IEEE Security and Privacy Workshops (SPW), San Jose, CA, USA, 22–26 May 2016; pp. 53–57. [Google Scholar]
- Bebrov, G.; Dimova, R.; Pencheva, E. Quantum approach to the information privacy in Smart Grid. In Proceedings of the International Conference on Optimization of Electrical and Electronic Equipment (OPTIM) & 2017 Intl Aegean Conference on Electrical Machines and Power Electronics (ACEMP), Brasov, Romania, 25–27 May 2017; pp. 971–976. [Google Scholar]
- Rudolph, M.; Feth, D.; Doerr, J.; Spilker, J. Requirements Elicitation and Derivation of Security Policy Templates—An Industrial Case Study. In Proceedings of the 2016 IEEE 24th International Requirements Engineering Conference (RE), Beijing, China, 12–16 September 2016; pp. 283–292. [Google Scholar]
- Fabiano, N. The Internet of Things ecosystem: The blockchain and privacy issues. The challenge for a global privacy standard. In Proceedings of the 2017 International Conference on Internet of Things for the Global Community (IoTGC), Funchal, Portugal, 10–13 July 2017; pp. 1–7. [Google Scholar]
- Feng, T.; Du, Z.; Sun, Y.; Wei, J.; Bi, J.; Liu, J. Real-Time Anomaly Detection of Short-Time-Scale GWAC Survey Light Curves. In Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA, 25–30 June 2017; pp. 224–231. [Google Scholar]
- Islam, S.M.R.; Kwak, D.; Kabir, M.H.; Hossain, M.; Kwak, K.S. The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access 2015, 3, 678–708. [Google Scholar] [CrossRef]
- Borisov, A. A Novel Approach for User Authentication to Industrial Components Using QR Codes. In Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference, Taichung, Taiwan, 1–5 July 2015; pp. 61–66. [Google Scholar]
- Hou, R.; Tang, F.; Liang, S.; Ling, G. Multi-Party Verifiable Privacy-Preserving Federated k-Means Clustering in Outsourced Environment. Secur. Commun. Netw. 2021, 2021, e3630312. [Google Scholar] [CrossRef]
- Liyanage, M.; Ylianttila, M.; Gurtov, A. Secure Hierarchical VPLS Architecture for Provider Provisioned Networks. IEEE Access 2015, 3, 967–984. [Google Scholar] [CrossRef]
- Arasu, A.; Eguro, K.; Joglekar, M.; Kaushik, R.; Kossmann, D.; Ramamurthy, R. Transaction processing on confidential data using cipherbase. In Proceedings of the 2015 IEEE 31st International Conference on Data Engineering, Seoul, Republic of Korea, 13–17 April 2015; pp. 435–446. [Google Scholar]
- Chen, T.H.; Shang, W.; Hassan, A.E.; Nasser, M.; Flora, P. Detecting Problems in the Database Access Code of Large Scale Systems—An Industrial Experience Report. In Proceedings of the 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C), Austin, TX, USA; 2016; pp. 71–80. [Google Scholar]
- Cinar, O.; Guncer, R.H.; Yazici, A. Database Security in Private Database Clouds. In Proceedings of the 2016 International Conference on Information Science and Security (ICISS), Pattaya, Thailand, 19–22 December 2016; pp. 1–5. [Google Scholar]
- Lesjak, C.; Bock, H.; Hein, D.; Maritsch, M. Hardware-secured and transparent multi-stakeholder data exchange for industrial IoT. In Proceedings of the 2016 IEEE 14th International Conference on Industrial Informatics (INDIN), Poitiers, France, 19–21 July 2016; pp. 706–713. [Google Scholar]
- Katsikeas, S. Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol. In Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 3–6 July 2017; pp. 1193–1200. [Google Scholar]
- Bartman, T.; Carson, K. Securing communications for SCADA and critical industrial systems. In Proceedings of the 69th Annual Conference for Protective Relay Engineers (CPRE), College Station, TX, USA, 4–7 April 2016; pp. 1–10. [Google Scholar]
- Ma, M.; He, D.; Kumar, N.; Choo, K.K.R.; Chen, J. Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things. IEEE Trans. Ind. Inform. 2017, 14, 759–767. [Google Scholar] [CrossRef]
- Gowthami, J.; Shanthi, N.; Krishnamoorthy, N. Secure Three-Factor Remote user Authentication for E-Governance of Smart Cities. In Proceedings of the 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT), Coimbatore, India, 1–3 March 2018; pp. 1–8. [Google Scholar]
- Jara, A.J.; Genoud, D.; Bocchi, Y. Big Data for Cyber Physical Systems: An Analysis of Challenges, Solutions and Opportunities. In Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Birmingham, UK, 2–4 July 2014; pp. 376–380. [Google Scholar]
- Spyridopoulos, T.; Tryfonas, T.; May, J. Incident analysis & digital forensics in SCADA and industrial control systems. In Proceedings of the 8th IET International System Safety Conference incorporating the Cyber Security Conference 2013, Cardiff, UK, 16–17 October 2013. [Google Scholar]
- Adepu, S.; Mathur, A. Distributed Attack Detection in a Water Treatment Plant: Method and Case Study. IEEE Trans. Dependable Secur. Comput. 2021, 18, 86–99. [Google Scholar] [CrossRef]
- Duan, L. Automated Policy Combination for Secure Data Sharing in Cross-Organizational Collaborations. IEEE Access 2016, 4, 3454–3468. [Google Scholar] [CrossRef]
- Thilakanathan, D.; Chen, S.; Nepal, S.; Calvo, R. SafeProtect: Controlled Data Sharing With User-Defined Policies in Cloud-Based Collaborative Environment. IEEE Trans. Emerg. Top. Comput. 2016, 4, 301–315. [Google Scholar] [CrossRef]
- Hummer, M.; Kunz, M.; Netter, M.; Fuchs, L.; Pernul, G. Advanced Identity and Access Policy Management Using Contextual Data. In Proceedings of the 10th International Conference on Availability, Reliability and Security, Toulouse, France, 24–27 August 2015; pp. 40–49. [Google Scholar]
- Golightly, L.; Wnuk, K.; Shanmugan, N.; Shaban, A.; Longstaff, J.; Chang, V. Towards a Working Conceptual Framework: Cyber Law for Data Privacy and Information Security Management for the Industrial Internet of Things Application Domain. In Proceedings of the 2022 International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC), Beijing, China, 23–25 September 2022; pp. 86–94. [Google Scholar]
- Smadi, A.A.; Ajao, B.T.; Johnson, B.K.; Lei, H.; Chakhchoukh, Y.; Abu Al-Haija, Q. A Comprehensive Survey on Cyber-Physical Smart Grid Testbed Architectures: Requirements and Challenges. Electronics 2021, 10, 1043. [Google Scholar] [CrossRef]
Advantages | |
---|---|
Enhanced efficiency and productivity | IIoT devices can help to streamline and automate industrial processes, reducing manual labor and increasing efficiency and productivity. |
Improved data collection and analysis | IIoT devices can generate large amounts of data that can be used to monitor and optimize industrial processes, leading to better decision-making and improved outcomes. |
Cost savings | IIoT devices can help to reduce costs by optimizing energy usage, reducing waste, and improving asset management. |
Remote monitoring and control | IIoT devices can be monitored and controlled remotely, reducing the need for on-site personnel and enabling real-time monitoring and intervention. |
Disadvantages | |
Security risks | IIoT devices are vulnerable to cyberattacks and hacking, compromising sensitive data and disrupting industrial processes. |
Compatibility issues | IIoT devices may not be compatible with existing industrial systems or other IIoT devices, leading to integration challenges and additional costs. |
Lack of standardization | There currently needs to be a widely accepted standard for IIoT devices, leading to issues with interoperability and compatibility. |
High implementation costs | IIoT devices can be expensive to implement and maintain, particularly for small and medium-sized enterprises. |
Technology | Description | Privacy Benefits | Challenges | Comparison |
---|---|---|---|---|
Blockchain | Blockchain technology is a decentralized and distributed ledger system that offers enhanced security and privacy features. It ensures the integrity and immutability of data by storing transactions in a chain of blocks, making it difficult for malicious actors to alter or tamper with the data. | Data Transparency: Blockchain allows participants in the network to have access to a transparent and auditable history of transactions without revealing specific identifying information. | Scalability: Blockchain networks can face challenges in terms of scalability due to the consensus mechanisms and the need to replicate data across multiple nodes, resulting in slower transaction speeds. | Data Handling: Blockchain technology stores data directly on the ledger. |
Data Integrity: The decentralized nature of blockchain ensures that data stored on the ledger is tamper-resistant, making it difficult for unauthorized parties to modify or manipulate information. | Energy Consumption: Some blockchain networks, particularly those utilizing proof-of-work consensus, require significant computational power, leading to high-energy consumption. | Data Privacy: Blockchain provides transparency and integrity but may not provide strong privacy for data contents. | ||
Secure Transactions: Blockchain employs cryptographic techniques, such as digital signatures and encryption, to secure data transfers and ensure authenticity. | Data Privacy: While blockchain technology ensures data integrity and immutability, it does not inherently provide strong privacy protection for the contents of the data. The transparency of blockchain can potentially reveal sensitive information about transactions. | Trust Model: Blockchain is based on a decentralized trust model. | ||
Federated Learning | Federated learning is an approach where machine learning models are trained across multiple decentralized edge devices or servers without sharing the raw data. Instead, only model updates or aggregated information is exchanged between the devices and a central server, ensuring data privacy. | Data Localization: Federated learning allows data to remain on local devices or servers, reducing the risk of data breaches or unauthorized access. | Model Heterogeneity: Federated learning can be challenging when dealing with a diverse range of edge devices or servers with different computational capabilities, data distributions, or data quality. | Data Handling: Federated learning keeps the data locally and only exchanges model updates or aggregated information. |
Privacy-Preserving Model Training: The model updates or aggregated information shared during federated learning are typically anonymized and encrypted, preserving the privacy of individual data points. | Central Server Trust: While federated learning aims to preserve privacy, it still requires trust in the central server that aggregates model updates. A compromised or malicious server could potentially extract sensitive information from the updates. | Data Privacy: Federated learning focuses on preserving the privacy of individual data points during model training. | ||
Reduced Data Transmission: Federated learning minimizes the need to transfer large amounts of raw data to a central server, which can be beneficial in bandwidth-constrained environments or when dealing with sensitive data. | Model Interpretability and Debugging: Federated learning can make it challenging to interpret and debug models trained across multiple devices or edge nodes. Understanding the reasons behind model performance issues, identifying erroneous contributions, or diagnosing the root causes of failures may require specialized techniques and tools. | Trust Model: Federated learning relies on trust in the central server and the integrity of participants. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Demertzi, V.; Demertzis, S.; Demertzis, K. An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT). Algorithms 2023, 16, 378. https://doi.org/10.3390/a16080378
Demertzi V, Demertzis S, Demertzis K. An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT). Algorithms. 2023; 16(8):378. https://doi.org/10.3390/a16080378
Chicago/Turabian StyleDemertzi, Vasiliki, Stavros Demertzis, and Konstantinos Demertzis. 2023. "An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)" Algorithms 16, no. 8: 378. https://doi.org/10.3390/a16080378
APA StyleDemertzi, V., Demertzis, S., & Demertzis, K. (2023). An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT). Algorithms, 16(8), 378. https://doi.org/10.3390/a16080378