{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:13Z","timestamp":1773510913431,"version":"3.50.1"},"reference-count":78,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3057766","type":"journal-article","created":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T07:23:42Z","timestamp":1612855422000},"page":"25344-25359","source":"Crossref","is-referenced-by-count":77,"title":["A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7590-371X","authenticated-orcid":false,"given":"Pls","family":"Jayalaxmi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3921-9512","authenticated-orcid":false,"given":"Rahul","family":"Saha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0026-149X","authenticated-orcid":false,"given":"Gulshan","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-3947","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0117-8102","authenticated-orcid":false,"given":"Tai-Hoon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4301409"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2946791"},{"key":"ref71","first-page":"359","article-title":"Traffic characteristic map-based intrusion detection model for industrial Internet","volume":"20","author":"dong","year":"2018","journal-title":"Int J Netw Secur"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2019.8758024"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-018-1433-8"},{"key":"ref77","first-page":"899","article-title":"Scanning the industry 4.0: A literature review on technologies for manufacturing systems","volume":"22","author":"alc\u00e1cer","year":"2019","journal-title":"Eng Sci Technol Int J"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.015"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref75","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of Things in industries: A survey","volume":"10","author":"da xu","year":"2014","journal-title":"IEEE Trans Ind Informat"},{"key":"ref38","year":"2020","journal-title":"Industrial Automation Siemens"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.5220\/0006426301160128"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.005"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2897133"},{"key":"ref31","article-title":"Lightweight searchable public-key encryption with forward privacy over IIoT outsourced data","author":"chen","year":"2019","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.01.006"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101933"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2903342"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2890203"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1165"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2995133"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3009180"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0998-6"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2975227"},{"key":"ref28","first-page":"601","article-title":"A framework for rapid integration of IoT Systems with industrial environments","author":"o\u2019leary","year":"2019","journal-title":"Proc IEEE 5th World Forum Internet Things (WF-IoT)"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343179"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2789442"},{"key":"ref65","first-page":"73","article-title":"SCADA system forensic analysis within IoT","author":"eden","year":"2017","journal-title":"Proc Cybersecur Ind"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI.2018.00038"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2019.8869524"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIDS.2019.8862038"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2019.8766399"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2019.106436"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863244"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2894108"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2017.8228043"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927597"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700621"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794442"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2891079"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2894573"},{"key":"ref50","first-page":"126","article-title":"Deep learning techniques for cyber security intrusion detection: A detailed analysis","author":"ferrag","year":"2019","journal-title":"Proc 6th Int Symp Cyber Secur Res"},{"key":"ref51","article-title":"Robust detection for network intrusion of industrial IoT based on multi-CNN fusion","volume":"154","author":"li","year":"2019","journal-title":"Measurement"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/6757685"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101974"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.107077"},{"key":"ref56","first-page":"414","author":"bae","year":"2019","journal-title":"Autoencoder-Based on Anomaly Detection with Intrusion Scoring for Smart Factory Environments"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014337"},{"key":"ref54","first-page":"55","article-title":"A deep learning approach for intrusion detection system in industry network","author":"hijazi","year":"2018","journal-title":"Proc BDCSIntell"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.05.002"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5435794"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2048-0"},{"key":"ref40","article-title":"Machine learning techniques for intrusion detection","author":"zamani","year":"2013","journal-title":"arXiv 1312 2177"},{"key":"ref12","article-title":"Introduction to IoT security","author":"jurcut","year":"2019","journal-title":"IoT Security Advances in Authentication"},{"key":"ref13","first-page":"1","article-title":"Internet of Things security, device authentication and access control: A review","volume":"14","author":"ali","year":"2016","journal-title":"Int J Comput Sci Inf Secur"},{"key":"ref14","article-title":"Adaptation of cryptographic algorithms according to the applications requirements and limitations: Design, analyze and lessons learned","author":"noura","year":"2016"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2737630"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2857811"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773666"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2808190"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794991"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.04.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228402"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"2796","DOI":"10.3390\/s18092796","article-title":"IoT elements, layered architectures and security issues: A comprehensive survey","volume":"18","author":"burhan","year":"2018","journal-title":"SENSORS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9324035"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718794615"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2019.102481","article-title":"A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT","volume":"149","author":"sengupta","year":"2020","journal-title":"J Netw Comput Appl"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2998983"},{"key":"ref9","author":"wylie","year":"2018","journal-title":"The 2018 SANS Industrial IoT Security Survey Shaping IIoT Security Concerns Written by Barbara Filkins Advisor"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912022"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1115\/1.4042053"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICSITech46713.2019.8987524"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587389"},{"key":"ref42","first-page":"65","article-title":"Anomaly detection in industrial networks using machine learning: A roadmap","author":"meshram","year":"2016","journal-title":"Proc Mach Learn Cyber Phys Syst"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIPC.2016.7470786"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2219-z"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2016.7805855"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09349442.pdf?arnumber=9349442","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T11:45:38Z","timestamp":1643283938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9349442\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":78,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3057766","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}