Next Article in Journal
Denoising the ECG from the EMG Using Stationary Wavelet Transform and Template Matching
Previous Article in Journal
Development of an Extended-Band mTRL Calibration Kit for On-Wafer Characterization of InP-HEMTs up to 1.1 THz
Previous Article in Special Issue
From Shore-A 85 to Shore-D 70: Multimaterial Transitions in 3D-Printed Exoskeleton
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Review

Review of Fuzzy Methods Application in IIoTSecurity—Challenges and Perspectives

by
Emanuel Krzysztoń
,
Dariusz Mikołajewski
and
Piotr Prokopowicz
*
Faculty of Computer Science, Kazimierz Wielki University, 85-064 Bydgoszcz, Poland
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(17), 3475; https://doi.org/10.3390/electronics14173475 (registering DOI)
Submission received: 28 July 2025 / Revised: 20 August 2025 / Accepted: 28 August 2025 / Published: 29 August 2025

Abstract

Traditional methods often fail when confronted with data characterised by uncertainty, incompleteness, and dynamically evolving threats within the Industrial Internet of Things (IIoT) environment. This paper presents the role of fuzzy set methods as a response to these challenges in ensuring IIoT security. A systematic literature review reveals how fuzzy set methods contribute to supporting and enabling actions ranging from anomaly detection to risk analysis. The work focuses on fuzzy systems such as the Fuzzy Inference System (FIS) and the Adaptive Neuro-Fuzzy Inference System (ANFIS), highlighting their strengths, including their resilience to imperfect data and the intuitiveness of their rules. It also identifies challenges related to optimisation and scalability. The article outlines directions for further research, indicating the potential of fuzzy methods as a cornerstone of future, intelligent IIoT cyber defence systems, capable of effectively responding to complex and changing attack scenarios.
Keywords: cybersecurity; threat; IIoT; risk assessment; fuzzy set theory; fuzzy logic; intrusion detection; anomaly detection; hybrid AI cybersecurity; threat; IIoT; risk assessment; fuzzy set theory; fuzzy logic; intrusion detection; anomaly detection; hybrid AI

Share and Cite

MDPI and ACS Style

Krzysztoń, E.; Mikołajewski, D.; Prokopowicz, P. Review of Fuzzy Methods Application in IIoTSecurity—Challenges and Perspectives. Electronics 2025, 14, 3475. https://doi.org/10.3390/electronics14173475

AMA Style

Krzysztoń E, Mikołajewski D, Prokopowicz P. Review of Fuzzy Methods Application in IIoTSecurity—Challenges and Perspectives. Electronics. 2025; 14(17):3475. https://doi.org/10.3390/electronics14173475

Chicago/Turabian Style

Krzysztoń, Emanuel, Dariusz Mikołajewski, and Piotr Prokopowicz. 2025. "Review of Fuzzy Methods Application in IIoTSecurity—Challenges and Perspectives" Electronics 14, no. 17: 3475. https://doi.org/10.3390/electronics14173475

APA Style

Krzysztoń, E., Mikołajewski, D., & Prokopowicz, P. (2025). Review of Fuzzy Methods Application in IIoTSecurity—Challenges and Perspectives. Electronics, 14(17), 3475. https://doi.org/10.3390/electronics14173475

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop