{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:46:38Z","timestamp":1774554398290,"version":"3.50.1"},"reference-count":262,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100010665","name":"European Union\u2019s Horizon 2020 research and innovation programme under the Marie Sk\u0142odowska-Curie","doi-asserted-by":"publisher","award":["764785"],"award-info":[{"award-number":["764785"]}],"id":[{"id":"10.13039\/100010665","id-type":"DOI","asserted-by":"publisher"}]},{"name":"FORA\u2013Fog Computing for Robotics and Industrial Automation"},{"name":"Poul V. Andersen Fund"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/comst.2020.3011208","type":"journal-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T16:54:21Z","timestamp":1595436861000},"page":"2489-2520","source":"Crossref","is-referenced-by-count":352,"title":["A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities"],"prefix":"10.1109","volume":"22","author":[{"given":"Koen","family":"Tange","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9056-9281","authenticated-orcid":false,"given":"Michele","family":"De Donno","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9871-0013","authenticated-orcid":false,"given":"Xenofon","family":"Fafoutis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9575-2990","authenticated-orcid":false,"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/3361758.3361763"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2912308"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/3361758.3361762"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2019.0126"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA47632.2019.9035260"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2019.8913891"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.10.004"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/METROI4.2019.8792884"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2014.6842314"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/ICIRD.2018.8376320"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2952645"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2015.7392493"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2015.7281913"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SACI.2018.8440945"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2019.2893037"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6562953"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2791956"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2014.7005086"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2014.7038800"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/RNDM48015.2019.8949107"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024687"},{"key":"ref181","first-page":"1","article-title":"A multi-model-based approach to detect cyber stealth attacks in industrial Internet of Things","author":"en?chescu","year":"2019","journal-title":"Proc Int Conf Softw Telecommun Comput Netw (SoftCOM)"},{"key":"ref180","first-page":"1","article-title":"Modern problems require modern solutions: Hybrid concepts for industrial intrusion detection","author":"anton","year":"2019","journal-title":"Proc 24th ITG Symp Mobile Commun Technol Appl"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2019.8913895"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2763954"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920699"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2018.8502660"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539533"},{"key":"ref188","first-page":"4415","article-title":"Robust malware defense in industrial IoT applications using machine learning with selective adversarial samples","volume":"56","author":"khoda","year":"2020","journal-title":"IEEE Trans Ind Appl"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2601918"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014337"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2737630"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2017.2759342"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2019.11.362"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.79"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.03.007"},{"key":"ref22","first-page":"439","article-title":"Google scholar&#x2019;s ranking algorithm: An introductory overview","author":"beel","year":"2009","journal-title":"Proc 12th Int Conf Scientometrics Informetrics (ISSI)"},{"key":"ref21","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"kitchenham","year":"2007"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ReCoSoC.2017.8016157"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2018.8402377"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2513672"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2017.8104889"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/IE.2016.15"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSE.2018.8520195"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2890203"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2907092"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN41052.2019.8972167"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2923068"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.027"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959771"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2903342"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2921113"},{"key":"ref147","first-page":"4519","article-title":"Anonymous aggregate encryption scheme for industrial Internet of Things","volume":"14","author":"deng","year":"2018","journal-title":"IEEE Syst J"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908780"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2793350"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2016.7878793"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2012.55"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2008.4554519"},{"key":"ref56","first-page":"172","article-title":"Simple keys for simple smart objects","author":"bergmann","year":"2012","journal-title":"Workshop on Smart Object Security"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2846297"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2963328"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloudW.2017.71"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8390811"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2016.7819251"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2953937"},{"key":"ref166","year":"2016","journal-title":"Regulation(EU) 2016\/679 of the European Parliament & of the Council"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2019.8888136"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00052"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2018.8402353"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/3241403.3241450"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2914117"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800507"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7178164"},{"key":"ref3","first-page":"807","article-title":"Analysis of DDoS-sapable IoT malwares","author":"de donno","year":"2017","journal-title":"Proc Fed Conf Comput Sci Inf Syst (FedCSIS)"},{"key":"ref6","article-title":"CRASHOVERRIDE: Analysis of the threat to electric grid operations","author":"lee","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref8","article-title":"OpenFog reference architecture for fog computing","year":"2017"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2784395"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2017.09.047"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00190"},{"key":"ref9","article-title":"Good practices for security of Internet of Things in the context of smart manufacturing","year":"2018"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2019.8869163"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2019.00-13"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.23919\/AE.2017.8053600"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930814"},{"key":"ref47","article-title":"2018 OWASP IoT top 10","year":"2018"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2017.8104888"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2017.65"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2018.8534521"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2832853"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941575"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2877690"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICE.2018.8436244"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2808190"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8390799"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773666"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2942271"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2934947"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2787800"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767327"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2019.8769499"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/WCICSS.2015.7420319"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2019.8869262"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2865212"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2901011"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1049\/trit.2018.0010"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2017.56"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2017.7915575"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9489-2"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569610"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC47392.2019.8958717"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8387655"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2856368"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844794"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR48224.2019.8971062"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.23919\/AE.2019.8867032"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN41052.2019.8972171"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00026"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941701"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/BlackSeaCom.2019.8812786"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2813304"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/CSNET.2018.8602927"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2894108"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2265083"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2927597"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909040"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2018.8368997"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2017.8228043"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2897018"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.23919\/AEIT.2017.8240552"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.03.003"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2913627"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2832041"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3341482"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2946047"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095187"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794991"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.036"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.005"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2944631"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/CMT.2019.8931327"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2018.8591182"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2822842"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/LSENS.2019.2909323"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800479"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834095"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon42311.2019.9020516"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2955152"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912022"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2018.8534574"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.017"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587389"},{"key":"ref211","first-page":"1","article-title":"FastVPN&#x2014;Secure and flexible networking for industry 4.0","author":"bluschke","year":"2018","journal-title":"Proc 12th ITG Symp Broadband Coverage Germany"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.12.001"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2017.7991960"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2013.6622965"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2814063"},{"key":"ref215","first-page":"1","article-title":"Physical layer security for IIoT and CPPS: A cellular-network security approach","author":"lipps","year":"2019","journal-title":"Proc 24th ITG Symp Mobile Commun Technol Appl"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/NEXTCOMP.2019.8883600"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767279"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/ICUWB.2015.7324414"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2018.8502539"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2019.8758010"},{"key":"ref222","author":"alaluna","year":"2017","journal-title":"Secure multi-cloud virtual network embedding"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2018.8402355"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.03.004"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6979984"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2014.6864831"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2019.000042"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2017.8098906"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8460110"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2751586"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3341481"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICII.2018.00025"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT.2016.7765386"},{"key":"ref124","year":"2018"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.23919\/SEEDA-CECNSM.2017.8088234"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2019.8924452"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203896"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/AQTR.2014.6857843"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2019.02.293"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ICGHIT.2019.00032"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389155"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.015"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2019.0169"},{"key":"ref230","first-page":"122","article-title":"RERUM: Building a reliable IoT upon privacy-and security- enabled smart objects","author":"p\u00f6hls","year":"2014","journal-title":"Proc IEEE Wireless Commun Netw Conf Workshops (WCNCW)"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2019.8923479"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT.2019.8770010"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2019.8651751"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2016.7733634"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2019.8927590"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2019.0128"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2019.00087"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/ASMC.2018.8373213"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2703922"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773646"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN41052.2019.8972209"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/3338507.3358620"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800478"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2871174"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/NetSys.2019.8854501"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/CBI.2018.10060"},{"key":"ref2","first-page":"129","article-title":"The Internet of hackable things","author":"dragoni","year":"2017","journal-title":"Proc Int Conf Software Eng Defence Appl"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2019.8869428"},{"key":"ref1","article-title":"Winning with the industrial Internet of Things: How to accelerate the journey to productivity and growth","author":"daugherty","year":"2015"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68899-0"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/CoDIT.2017.8102711"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2903242"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666558"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2019.8781238"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2019.00095"},{"key":"ref248","year":"2019","journal-title":"Intel&#x2014;Software Guard Extensions"},{"key":"ref247","year":"2019","journal-title":"Trustzone"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2700268"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2019.02.007"},{"key":"ref249","year":"2015"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2891079"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC.2018.8585365"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019861"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/EMPDP.2019.8671586"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2017.8104789"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2019.8935019"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343245"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.072511.102283"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/SIES.2018.8442088"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905925"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863244"},{"key":"ref250","year":"2019","journal-title":"Axiomtek&#x2019;s Fanless Embedded System With TPM 1 2 and Flexible Expansions"},{"key":"ref251","year":"2019","journal-title":"Cc2652r simplelink multiprotocol 2 4-ghz wireless mcu"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947652"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.3390\/fi11060127"},{"key":"ref252","article-title":"The 3rd generation partnership project website","year":"0"},{"key":"ref253","author":"kagermann","year":"2013","journal-title":"Recommendations for Implementing the Strategic Initiative INDUSTRIE 4 0&#x2014;Securing the Future of German Manufacturing Industry"},{"key":"ref257","article-title":"Intel&#x2014;SGX data protections now available for mainstream cloud platforms","author":"skillern","year":"2019"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2018.8423800"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00008"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/VTS-APWCS.2019.8851679"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2855198"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2935189"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.09.004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3239235.3239242"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2014.10"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2014.7005136"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2549047"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2019.8869524"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.23919\/ICITST.2017.8356438"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2019.8869110"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/IoTSMS.2018.8554484"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/SOLI.2018.8476769"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700621"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8390801"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/IRC.2019.00019"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2019.8927559"},{"key":"ref123","article-title":"Industrial Internet of Things volume G4: Security framework","year":"2016"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/CFEC.2019.8733144"},{"key":"ref261","first-page":"59","article-title":"AntibIoTic: Protecting IoT devices against DDoS attacks","author":"de donno","year":"2016","journal-title":"Proc Int Conf Softw Eng Defence Appl"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.02.009"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/9265420\/09146364.pdf?arnumber=9146364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:49:21Z","timestamp":1641988161000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9146364\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":262,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2020.3011208","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}