sensors-logo

Journal Browser

Journal Browser

Process-Aware Cyber Security Management in the Industrial Internet of Things

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: 31 July 2025 | Viewed by 3846

Special Issue Editor


E-Mail Website
Guest Editor
Institute for Management Information Systems, University of Regensburg, Universitätsstraße 31, 93053 Regensburg, Germany
Interests: business process management; industrial Internet of Things; process mining; process-aware IIoT security; IIoT-aware process modelling
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The Industrial Internet of Things (IIoT) offers a broad compendium of technologies from the Internet of Things (IoT) to automate and intelligently network production systems. This networking is achieved by connecting industrial operational technology (OT) with information technology (IT). The resulting convergence leads to more efficient systems and enables new solutions. However, the convergence of IT and OT has a significant drawback: machines and plants become vulnerable to external attacks. In the context of digital production systems, it is essential to understand that cyber security is a joint and overarching task in the fields of both IT and OT. Therefore, security aspects in IIoT environments require special attention, while new solutions for the maintenance of cyber security are necessary. For this reason, regulatory efforts to have been made to establish the implementation of security measures such as IEC62443 in the EU as a standard. According to the IEC62443 standard, respective organizations should follow a security by design paradigm. In this respect, to conduct meaningful and sustainable security management, it is crucial to know and define corporate assets that must be protected as well as operative processes and their information-related needs. Based thereon, risks can be identified, protective measures can be taken, and security incidents can be monitored.

This Special Issue therefore aims to amalgamate original research and review articles regarding recent advancements, technologies, solutions, applications, and new challenges in the field of Industrial IoT security with a strong interdisciplinary focus on underlying operative processes.

Potential topics include but are not limited to:

  • Modeling sensor-aware security aspects in IIoT processes;
  • (Sensor) technologies supporting privacy and security in IIoT processes;
  • IoT and ubiquitous technologies supporting processes;
  • Sensor-based security monitoring in IIoT processes;
  • Visual analytics enabling cyber security in IIoT;
  • IIoT-enhanced process model discovery, recognition, monitoring and prediction;
  • Process anomaly detection from sensor-based IIoT data.

Prof. Dr. Stefan Schönig
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • industrial IoT
  • cyber security
  • process management
  • process modelling
  • sensors

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 869 KiB  
Article
Reading between the Lines: Process Mining on OPC UA Network Data
by Markus Hornsteiner, Philip Empl, Timo Bunghardt and Stefan Schönig
Sensors 2024, 24(14), 4497; https://doi.org/10.3390/s24144497 - 11 Jul 2024
Cited by 3 | Viewed by 1401
Abstract
The introduction of the Industrial Internet of Things (IIoT) has led to major changes in the industry. Thanks to machine data, business process management methods and techniques could also be applied to them. However, one data source has so far remained untouched: The [...] Read more.
The introduction of the Industrial Internet of Things (IIoT) has led to major changes in the industry. Thanks to machine data, business process management methods and techniques could also be applied to them. However, one data source has so far remained untouched: The network data of the machines. In the business environment, process mining, for example, has already been carried out based on network data, but the IIoT, with its particular protocols such as OPC UA, has yet to be investigated. With the help of design science research and on the shoulders of CRISP-DM, we first develop a framework for process mining in the IIoT in this paper. We then apply the framework to real-world IIoT network traffic data and evaluate the outcome and performance of our approach in detail. We find tremendous potential in network traffic data but also limitations. Among other things, due to the dependence on process experts and the existence of case IDs. Full article
Show Figures

Figure 1

27 pages, 2711 KiB  
Article
A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World
by Tyler Cultice, Joseph Clark, Wu Yang and Himanshu Thapliyal
Sensors 2023, 23(24), 9886; https://doi.org/10.3390/s23249886 - 17 Dec 2023
Cited by 1 | Viewed by 1850
Abstract
As the popularity of 3D printing or additive manufacturing (AM) continues to increase for use in commercial and defense supply chains, the requirement for reliable, robust protection from adversaries has become more important than ever. Three-dimensional printing security focuses on protecting both the [...] Read more.
As the popularity of 3D printing or additive manufacturing (AM) continues to increase for use in commercial and defense supply chains, the requirement for reliable, robust protection from adversaries has become more important than ever. Three-dimensional printing security focuses on protecting both the individual Industrial Internet of Things (I-IoT) AM devices and the networks that connect hundreds of these machines together. Additionally, rapid improvements in quantum computing demonstrate a vital need for robust security in a post-quantum future for critical AM manufacturing, especially for applications in, for example, the medical and defense industries. In this paper, we discuss the attack surface of adversarial data manipulation on the physical inter-device communication bus, Controller Area Network (CAN). We propose a novel, hierarchical tree solution for a secure, post-quantum-supported security framework for CAN-based AM devices. Through using subnet hopping between isolated CAN buses, our framework maintains the ability to use legacy or third-party devices in a plug-and-play fashion while securing and minimizing the attack surface of hardware Trojans or other adversaries. The results of the physical implementation of our framework demonstrate 25% and 90% improvement in message costs for authentication compared to existing lightweight and post-quantum CAN security solutions, respectively. Additionally, we performed timing benchmarks on the normal communication (hopping) and authentication schemes of our framework. Full article
Show Figures

Figure 1

Back to TopTop