{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T20:22:15Z","timestamp":1777148535965,"version":"3.51.4"},"reference-count":188,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:00:00Z","timestamp":1705017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"United Arab Emirates University and Zayed University (UAEU-ZU), United Arab Emirates","award":["12R141"],"award-info":[{"award-number":["12R141"]}]},{"name":"Blekinge Institute of Technology (BTH), Sweden"},{"name":"Swedish Knowledge Foundation through the Project Symphony-Supply-and-Demand-Based Service Exposure Using Robust Distributed Concepts","award":["20190111"],"award-info":[{"award-number":["20190111"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2024,5,31]]},"abstract":"<jats:p>The Industrial Internet of Things (IIoT) has been positioned as a key pillar of the Industry 4.0 revolution, which is projected to continue accelerating and realizing digital transformations. The IIoT is becoming indispensable, providing the means through which modern communication is conducted across industries and offering improved efficiency, scalability, and robustness. However, the structural and dynamic complexity introduced by the continuous integration of the IIoT has widened the scope for cyber-threats, as the processes and data generated by this integration are susceptible and vulnerable to attacks. This article presents an in-depth analysis of the state-of-the-art in the IIoT ecosystem from security and digital forensics perspectives. The dimensions of this study are twofold: first, we present an overview of the cutting-edge security of IIoT ecosystems, and second, we survey the literature on digital forensics. The key achievements, open challenges, and future directions are identified in each case. The challenges and directions for future studies that we identify will provide important guidance for cybersecurity researchers and practitioners.<\/jats:p>","DOI":"10.1145\/3635030","type":"journal-article","created":{"date-parts":[[2023,12,9]],"date-time":"2023-12-09T12:11:02Z","timestamp":1702123862000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions"],"prefix":"10.1145","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4071-4596","authenticated-orcid":false,"given":"Victor R.","family":"Kebande","sequence":"first","affiliation":[{"name":"Secure Distributed Systems (SDS) Group, Department of Computer Science (DIDA), Blekinge Institute of Technology, Karlskrona, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3800-0757","authenticated-orcid":false,"given":"Ali Ismail","family":"Awad","sequence":"additional","affiliation":[{"name":"College of Information Technology, United Arab Emirates University, United Arab Emirates and Faculty of Engineering, Al-Azhar University, Egypt"}]}],"member":"320","published-online":{"date-parts":[[2024,1,12]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04203-5_3"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18030817"},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","unstructured":"M. Hermann T. Pentek and B. Otto. 2016. Design principles for Industrie 4.0 scenarios. IEEE Computer Society1730 Massachusetts Ave. NW Washington DCUnited States.","DOI":"10.1109\/HICSS.2016.488"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1142\/S2424862217500142"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2016.57"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2018.8368997"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2998105"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/3ICT51146.2020.9311942"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108667"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsir.2022.100257"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","unstructured":"Victor Rigworo Kebande.Industrial Internet of Things (IIoT) Forensics: challenges opportunities and future directions. 10.2139\/ssrn.4343061","DOI":"10.2139\/ssrn.4343061"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1049\/me:19960606"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2020.11.017"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.107198"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3011208"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/OPTRONIX.2019.8862436"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2884906"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3057766"},{"key":"e_1_3_1_22_2","article-title":"Industrial internet of things (IIoT) applications of edge and fog computing: A review and future directions","author":"Chalapathi G. Sai Sesha","year":"2019","unstructured":"G. Sai Sesha Chalapathi, Vinay Chamola, Aabhaas Vaish, and Rajkumar Buyya. 2019. Industrial internet of things (IIoT) applications of edge and fog computing: A review and future directions. arXiv preprint arXiv:1912.00595 (2019).","journal-title":"arXiv preprint arXiv:1912.00595"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2834151"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3471936"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-018-1433-8"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3376123"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2019.01.006"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.04.015"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023507"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICST53116.2021.9497829"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100081"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v11i5.7072"},{"key":"e_1_3_1_34_2","article-title":"Nine challenges of Industry 4.0","author":"Zaouini M.","year":"2017","unstructured":"M. Zaouini. 2017. Nine challenges of Industry 4.0. IIoT World. Retrieved from https:\/\/iiot-world.com\/-connected-industry\/nine-challenges-of-industry-4-0\/","journal-title":"IIoT World"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3063002"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372823"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3232848"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18092796"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2737630"},{"key":"e_1_3_1_40_2","first-page":"39","volume-title":"International Workshop on Interoperability and Open-source Solutions","author":"Schmid Stefan","year":"2016","unstructured":"Stefan Schmid, Arne Br\u00f6ring, Denis Kramer, Sebastian K\u00e4bisch, Achille Zappa, Martin Lorenz, Yong Wang, Andreas Rausch, and Luca Gioppo. 2016. An architecture for interoperable IoT ecosystems. In International Workshop on Interoperability and Open-source Solutions. Springer, 39\u201355."},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.2"},{"key":"e_1_3_1_42_2","first-page":"1","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networking","author":"Mazhelis Oleksiy","year":"2012","unstructured":"Oleksiy Mazhelis, Eetu Luoma, and Henna Warma. 2012. Defining an internet-of-things ecosystem. In Internet of Things, Smart Spaces, and Next Generation Networking. Springer, 1\u201314."},{"key":"e_1_3_1_43_2","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/978-3-642-32686-8_2","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networking","author":"Leminen Seppo","year":"2012","unstructured":"Seppo Leminen, Mika Westerlund, Mervi Rajahonka, and Riikka Siuruainen. 2012. Towards IoT ecosystems and business models. In Internet of Things, Smart Spaces, and Next Generation Networking. Springer, 15\u201326."},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/807"},{"key":"e_1_3_1_45_2","first-page":"25","volume-title":"1st International Workshop on Software Engineering for Systems-of-systems","author":"Delicato Flavia C.","year":"2013","unstructured":"Flavia C. Delicato, Paulo F. Pires, Thais Batista, Everton Cavalcante, Bruno Costa, and Thomaz Barros. 2013. Towards an IoT ecosystem. In 1st International Workshop on Software Engineering for Systems-of-systems. 25\u201328."},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.06.007"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2951728"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3162106"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2832041"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101933"},{"key":"e_1_3_1_51_2","doi-asserted-by":"crossref","unstructured":"V. Skwarek. 2017. Blockchains as security-enabler for industrial IoT-applications. Asia Pacific Journal of Innovation and Entrepreneurship 11 3 (2017) 301\u2013311.","DOI":"10.1108\/APJIE-12-2017-035"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.3182\/20080706-5-KR-1001.02391"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2010.02.008"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2692247"},{"issue":"3","key":"e_1_3_1_55_2","first-page":"75","article-title":"Predators and prey: A new ecology of competition","volume":"71","author":"Moore James F.","year":"1993","unstructured":"James F. Moore. 1993. Predators and prey: A new ecology of competition. Harv. Busin. Rev. 71, 3 (1993), 75\u201386.","journal-title":"Harv. Busin. Rev."},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2017.8384164"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95450-9_3"},{"key":"e_1_3_1_58_2","first-page":"49","volume-title":"5th European Workshop on Software-Defined Networks (EWSDN\u201916)","author":"Ogrodowczyk \u0141ukasz","year":"2016","unstructured":"\u0141ukasz Ogrodowczyk, Bartosz Belter, and Marc LeClerc. 2016. IoT ecosystem over programmable SDN infrastructure for smart city applications. In 5th European Workshop on Software-Defined Networks (EWSDN\u201916). IEEE, 49\u201351."},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2018.05.004"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44881-7_22"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.11.016"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.01.006"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2973314"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","unstructured":"Yousaf Bin Zikria Muhammad Khalil Afzal and Sung Won Kim. 2020. Internet of Multimedia Things (IoMT): Opportunities Challenges and Solutions. DOI:10.3390\/s20082334","DOI":"10.3390\/s20082334"},{"key":"e_1_3_1_65_2","first-page":"1","volume-title":"IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS\u201919)","author":"Yu Xingjie","year":"2019","unstructured":"Xingjie Yu and Huaqun Guo. 2019. A survey on IIoT security. In IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS\u201919). IEEE, 1\u20135."},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi11030066"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.3390\/su13010338"},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus.2018.8317246"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22186842"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.3021367"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3186891"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2935548"},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001610"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.3390\/e24020157"},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-67361-1"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119607755"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12330-7_2"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3053595"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"e_1_3_1_80_2","first-page":"641","volume-title":"21st International Conference on System Theory, Control and Computing (ICSTCC\u201917)","author":"Lier Ben van","year":"2017","unstructured":"Ben van Lier. 2017. The Industrial Internet of Things and cyber security: An ecological and systemic perspective on security in digital industrial ecosystems. In 21st International Conference on System Theory, Control and Computing (ICSTCC\u201917). IEEE, 641\u2013647."},{"key":"e_1_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"e_1_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485130"},{"key":"e_1_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2018.12.002"},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721741"},{"key":"e_1_3_1_85_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100610"},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462513"},{"key":"e_1_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"e_1_3_1_88_2","volume-title":"Modern Authentication with Azure Active Directory for Web Applications","author":"Bertocci Vittorio","year":"2015","unstructured":"Vittorio Bertocci. 2015. Modern Authentication with Azure Active Directory for Web Applications. Microsoft Press."},{"key":"e_1_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"e_1_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.5120\/19547-1280"},{"key":"e_1_3_1_91_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT.2013.6967233"},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1145\/1072989.1072992"},{"key":"e_1_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMTECH.2017.8065757"},{"key":"e_1_3_1_95_2","volume-title":"RSA Conference","author":"Miessler Daniel","year":"2015","unstructured":"Daniel Miessler. 2015. Securing the internet of things: Mapping attack surface areas using the OWASP IoT top 10. In RSA Conference."},{"key":"e_1_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.010"},{"key":"e_1_3_1_97_2","unstructured":"A. Bicaku. 2020. Security Standard Compliance in System of Systems (Doctoral dissertation Lule\u00e5 University of Technology). https:\/\/www.diva-portal.org\/smash\/record.jsf?pid=diva2%3A1459036&dswid=2436"},{"key":"e_1_3_1_98_2","doi-asserted-by":"publisher","DOI":"10.36244\/ICJ.2019.1.1"},{"key":"e_1_3_1_99_2","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720922731"},{"key":"e_1_3_1_100_2","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/2899007.2899013","volume-title":"2nd ACM International Workshop on IoT Privacy, Trust, and Security","author":"Aman Muhammad N.","year":"2016","unstructured":"Muhammad N. Aman, Kee Chaing Chua, and Biplab Sikdar. 2016. Position paper: Physical unclonable functions for IoT security. In 2nd ACM International Workshop on IoT Privacy, Trust, and Security. 10\u201313."},{"key":"e_1_3_1_101_2","doi-asserted-by":"crossref","unstructured":"Hongmei He Carsten Maple Tim Watson Ashutosh Tiwari J\u00f6rn Mehnen Yaochu Jin and Bogdan Gabrys. 2016. The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In 2016 IEEE Congress on Evolutionary Computation (CEC\u201916). IEEE 1015\u20131021.","DOI":"10.1109\/CEC.2016.7743900"},{"key":"e_1_3_1_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554472"},{"key":"e_1_3_1_103_2","doi-asserted-by":"crossref","unstructured":"Tim Dierks and Eric Rescorla. 2008. The transport layer security (TLS) protocol version 1.2. (2008).","DOI":"10.17487\/rfc5246"},{"key":"e_1_3_1_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud49737.2020.00032"},{"key":"e_1_3_1_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2008.4554519"},{"key":"e_1_3_1_106_2","article-title":"What is the difference between IEEE 802.15.4 and ZigBee wireless","volume":"22","author":"Frenzel Lou","year":"2013","unstructured":"Lou Frenzel. 2013. What is the difference between IEEE 802.15.4 and ZigBee wireless. Electron. Des. 22 (2013).","journal-title":"Electron. Des."},{"key":"e_1_3_1_107_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18103568"},{"key":"e_1_3_1_108_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.08.056"},{"key":"e_1_3_1_109_2","volume-title":"IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things","author":"Hanes David","year":"2017","unstructured":"David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, and Jerome Henry. 2017. IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things. Cisco Press."},{"key":"e_1_3_1_110_2","doi-asserted-by":"publisher","DOI":"10.3390\/jsan7030028"},{"key":"e_1_3_1_111_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600546CM"},{"key":"e_1_3_1_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCA.2012.6179149"},{"key":"e_1_3_1_113_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.63"},{"key":"e_1_3_1_114_2","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/1023646.1023654","volume-title":"3rd ACM Workshop on Wireless Security","author":"Sastry Naveen","year":"2004","unstructured":"Naveen Sastry and David Wagner. 2004. Security considerations for IEEE 802.15.4 networks. In 3rd ACM Workshop on Wireless Security. 32\u201342."},{"key":"e_1_3_1_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2009.5347043"},{"key":"e_1_3_1_116_2","article-title":"IIC endpoint security best practices","author":"Hanna Steve","year":"2018","unstructured":"Steve Hanna, Srinivas Kumar, and Dean Weber. 2018. IIC endpoint security best practices. Guide d\u2019usage, Industrial Internet Consortium (2018). https:\/\/www.iiconsortium.org\/pdf\/Endpoint_Security_Best_Practices_Final_Mar_2018.pdf","journal-title":"Guide d\u2019usage, Industrial Internet Consortium"},{"key":"e_1_3_1_117_2","first-page":"162","article-title":"OpenFog reference architecture for fog computing","volume":"20817","author":"Group OpenFog Consortium Architecture Working","year":"2017","unstructured":"OpenFog Consortium Architecture Working Group et\u00a0al. 2017. OpenFog reference architecture for fog computing. OPFRA001 20817 (2017), 162.","journal-title":"OPFRA001"},{"issue":"1","key":"e_1_3_1_118_2","first-page":"1","article-title":"29115: 2013 information technology\u2013Security techniques\u2013Entity authentication assurance framework, 2013","volume":"1","year":"2016","unstructured":"ISO\/IEC. 2016. 29115: 2013 information technology\u2013Security techniques\u2013Entity authentication assurance framework, 2013. ISO.org 1, 1 (2016), 1\u201330.","journal-title":"ISO.org"},{"issue":"1","key":"e_1_3_1_119_2","first-page":"1","article-title":"62443: 2020 standard specifies security capabilities for control system components","volume":"1","year":"2020","unstructured":"ISA\/IEC. 2020. 62443: 2020 standard specifies security capabilities for control system components. ISA.org 1, 1 (2020), 1\u201330.","journal-title":"ISA.org"},{"issue":"1","key":"e_1_3_1_120_2","first-page":"1","article-title":"24760: 2011 information technology\u2013Security techniques\u2013A framework for identity management assurance framework, 2011","volume":"1","year":"2011","unstructured":"ISO\/IEC. 2011. 24760: 2011 information technology\u2013Security techniques\u2013A framework for identity management assurance framework, 2011. ISO.org 1, 1 (2011), 1\u201330.","journal-title":"ISO.org"},{"issue":"1","key":"e_1_3_1_121_2","first-page":"1","article-title":"NISTSP800-82: 2015 Guide to Industrial Control Systems (ICS) security","volume":"1","year":"2019","unstructured":"NIST. 2019. NISTSP800-82: 2015 Guide to Industrial Control Systems (ICS) security. NIST.gov 1, 1 (2019), 1\u2013247.","journal-title":"NIST.gov"},{"issue":"1","key":"e_1_3_1_122_2","first-page":"1","article-title":"NIST: 2014 National Institute of Standards and Technology (NIST): Framework for improving critical infrastructure cybersecurity, version 1.0, National Institute of Standards and Technology","volume":"1","year":"2014","unstructured":"ISO\/IEC. 2014. NIST: 2014 National Institute of Standards and Technology (NIST): Framework for improving critical infrastructure cybersecurity, version 1.0, National Institute of Standards and Technology. ISO.org 1, 1 (2014), 1\u201330.","journal-title":"ISO.org"},{"issue":"1","key":"e_1_3_1_123_2","first-page":"2","article-title":"NISTIR-7628: 2014 guidelines for smart grid cybersecurity\u2014Smart grid cybersecurity strategy, architecture, and high-level requirements","volume":"1","year":"2014","unstructured":"NIST. 2014. NISTIR-7628: 2014 guidelines for smart grid cybersecurity\u2014Smart grid cybersecurity strategy, architecture, and high-level requirements. NIST.gov 1, 1 (2014), 2\u2013668.","journal-title":"NIST.gov"},{"issue":"1","key":"e_1_3_1_124_2","first-page":"1","article-title":"NIST: 2019 Securing the Industrial Internet of Things","volume":"1","author":"NIST Document","year":"2019","unstructured":"Document NIST. 2019. NIST: 2019 Securing the Industrial Internet of Things. NIST.gov 1, 1 (2019), 1\u201330.","journal-title":"NIST.gov"},{"key":"e_1_3_1_125_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.0-203"},{"key":"e_1_3_1_126_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010302"},{"key":"e_1_3_1_127_2","first-page":"1193","volume-title":"IEEE Symposium on Computers and Communications (ISCC\u201917)","author":"Katsikeas Sotirios","year":"2017","unstructured":"Sotirios Katsikeas, Konstantinos Fysarakis, Andreas Miaoudakis, Amaury Van Bemten, Ioannis Askoxylakis, Ioannis Papaefstathiou, and Anargyros Plemenos. 2017. Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol. In IEEE Symposium on Computers and Communications (ISCC\u201917). IEEE, 1193\u20131200."},{"key":"e_1_3_1_128_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794991"},{"key":"e_1_3_1_129_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2789442"},{"key":"e_1_3_1_130_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2963328"},{"key":"e_1_3_1_131_2","doi-asserted-by":"crossref","unstructured":"Zengpeng Li Zheng Yang Pawel Szalachowski and Jianying Zhou. 2020. Building low-interactivity multifactor authenticated key exchange for industrial internet of things. IEEE Internet of Things Journal 8 2 (2020) 844\u2013859.","DOI":"10.1109\/JIOT.2020.3008773"},{"key":"e_1_3_1_132_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2877146"},{"key":"e_1_3_1_133_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101948"},{"key":"e_1_3_1_134_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2846297"},{"key":"e_1_3_1_135_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN56760.2023.10073510"},{"key":"e_1_3_1_136_2","doi-asserted-by":"crossref","unstructured":"Roman-Valentyn Tkachuk Dragos Ilie Remi Robert Victor Kebande and Kurt Tutschku. 2023. Towards efficient privacy and trust in decentralized blockchain-based peer-to-peer renewable energy marketplace. Sustainable Energy Grids and Networks 35 (2023) 101146.","DOI":"10.1016\/j.segan.2023.101146"},{"key":"e_1_3_1_137_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2890203"},{"key":"e_1_3_1_138_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2897133"},{"key":"e_1_3_1_139_2","doi-asserted-by":"crossref","unstructured":"Ningjie Gao Ru Huo Shuo Wang Tao Huang and Yunjie Liu. 2021. Sharding-hashgraph: A high-performance blockchain-based framework for industrial internet of things with hashgraph mechanism. IEEE Internet of Things Journal 9 18 (2021) 17070\u201317079.","DOI":"10.1109\/JIOT.2021.3126895"},{"key":"e_1_3_1_140_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2903342"},{"key":"e_1_3_1_141_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956748"},{"key":"e_1_3_1_142_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3017891"},{"key":"e_1_3_1_143_2","doi-asserted-by":"crossref","unstructured":"S. Zhao S. Li and Y. Yao. 2019. Blockchain enabled industrial internet of things technology. IEEE Transactions on Computational Social Systems 6 6 (2019) 1442\u20131453.","DOI":"10.1109\/TCSS.2019.2924054"},{"key":"e_1_3_1_144_2","first-page":"1","volume-title":"Advances in Computers","author":"Atlam Hany F.","year":"2019","unstructured":"Hany F. Atlam and Gary B. Wills. 2019. Technical aspects of blockchain and IoT. In Advances in Computers. Vol. 115. Elsevier, 1\u201339."},{"key":"e_1_3_1_145_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3009103"},{"key":"e_1_3_1_146_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2793350"},{"key":"e_1_3_1_147_2","doi-asserted-by":"publisher","DOI":"10.5120\/5508-7533"},{"issue":"2","key":"e_1_3_1_148_2","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1109\/TPDS.2013.112","article-title":"Key-aggregate cryptosystem for scalable data sharing in cloud storage","volume":"25","author":"Chu Cheng-Kang","year":"2013","unstructured":"Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert H. Deng. 2013. Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Trans. Parallel Distrib. Syst. 25, 2 (2013), 468\u2013477.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"e_1_3_1_149_2","first-page":"29","volume-title":"ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","author":"Pan Jianli","year":"2018","unstructured":"Jianli Pan and Zhicheng Yang. 2018. Cybersecurity challenges and opportunities in the new \u201cedge computing+ IoT\u201d world. In ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. 29\u201332."},{"key":"e_1_3_1_150_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.025"},{"key":"e_1_3_1_151_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.027"},{"key":"e_1_3_1_152_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.7"},{"key":"e_1_3_1_153_2","first-page":"878","volume-title":"IFIP\/IEEE International Symposium on Integrated Network Management (IM\u201915)","author":"Cruz Tiago","year":"2015","unstructured":"Tiago Cruz, Jorge Barrigas, Jorge Proen\u00e7a, Antonio Graziano, Stefano Panzieri, Leonid Lev, and Paulo Sim\u00f5es. 2015. Improving network security monitoring for industrial control systems. In IFIP\/IEEE International Symposium on Integrated Network Management (IM\u201915). IEEE, 878\u2013881."},{"key":"e_1_3_1_154_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50660-9_4"},{"key":"e_1_3_1_155_2","doi-asserted-by":"publisher","DOI":"10.1002\/wfs2.1322"},{"key":"e_1_3_1_156_2","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328748"},{"key":"e_1_3_1_157_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18020492"},{"key":"e_1_3_1_158_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2906946"},{"key":"e_1_3_1_159_2","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3104053"},{"key":"e_1_3_1_160_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.058"},{"key":"e_1_3_1_161_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.102061"},{"key":"e_1_3_1_162_2","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2015.46"},{"key":"e_1_3_1_163_2","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340504"},{"key":"e_1_3_1_164_2","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud.2018.00040"},{"key":"e_1_3_1_165_2","doi-asserted-by":"crossref","unstructured":"Mauro Conti Ali Dehghantanha Katrin Franke and Steve Watson. 2018. Internet of Things security and forensics: Challenges and opportunities. (2018).","DOI":"10.1016\/j.future.2017.07.060"},{"key":"e_1_3_1_166_2","doi-asserted-by":"crossref","unstructured":"A. Alenezi H. Atlam R. Alsagri M. Alassafi and G. Wills. 2019. IoT forensics: A state-of-the-art review callenges and future directions. In Proceedings of the 4th International Conference on Complexity Future Information Systems and Risk. 92277.","DOI":"10.5220\/0007905401060115"},{"key":"e_1_3_1_167_2","first-page":"163","volume-title":"Conference on Complex, Intelligent, and Software Intensive Systems","author":"Alabdulsalam Saad Khalid","year":"2020","unstructured":"Saad Khalid Alabdulsalam, Trung Q. Duong, Kim-Kwang Raymond Choo, and Nhien-An Le-Khac. 2020. Evidence identification and acquisition based on network link in an internet of things environment. In Conference on Complex, Intelligent, and Software Intensive Systems. Springer, 163\u2013173."},{"key":"e_1_3_1_168_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6338-1"},{"key":"e_1_3_1_169_2","doi-asserted-by":"publisher","DOI":"10.1109\/WorldS450073.2020.9210366"},{"key":"e_1_3_1_170_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsir.2020.100122"},{"key":"e_1_3_1_171_2","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT.2018.00-19"},{"key":"e_1_3_1_172_2","first-page":"33","volume-title":"IEEE International Congress on Internet of Things (ICIOT\u201918)","author":"Hossain Mahmud","year":"2018","unstructured":"Mahmud Hossain, Yasser Karim, and Ragib Hasan. 2018. FIF-IoT: A forensic investigation framework for IoT using a public digital ledger. In IEEE International Congress on Internet of Things (ICIOT\u201918). IEEE, 33\u201340."},{"key":"e_1_3_1_173_2","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2013.71"},{"key":"e_1_3_1_174_2","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3104052"},{"key":"e_1_3_1_175_2","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.47"},{"key":"e_1_3_1_176_2","first-page":"1","volume-title":"5th International Symposium on Digital Forensic and Security (ISDFS\u201917)","author":"Harbawi Malek","year":"2017","unstructured":"Malek Harbawi and Asaf Varol. 2017. An improved digital evidence acquisition model for the internet of things forensic I: A theoretical framework. In 5th International Symposium on Digital Forensic and Security (ISDFS\u201917). IEEE, 1\u20136."},{"key":"e_1_3_1_177_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIPC.2015.7323000"},{"key":"e_1_3_1_178_2","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2013.254159"},{"key":"e_1_3_1_179_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622019"},{"key":"e_1_3_1_180_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.06.010"},{"key":"e_1_3_1_181_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2867466"},{"key":"e_1_3_1_182_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-018-0708-3"},{"key":"e_1_3_1_183_2","doi-asserted-by":"publisher","DOI":"10.3390\/technologies7010015"},{"key":"e_1_3_1_184_2","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/1023646.1023654","volume-title":"3rd ACM Workshop on Wireless Security","author":"Sastry Naveen","year":"2004","unstructured":"Naveen Sastry and David Wagner. 2004. Security considerations for IEEE 802.15.4 networks. In 3rd ACM Workshop on Wireless Security. 32\u201342."},{"key":"e_1_3_1_185_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2779820"},{"key":"e_1_3_1_186_2","unstructured":"Phillip Rogaway. 2011. Evaluation of some blockcipher modes of operation. Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan 630 (2011)."},{"key":"e_1_3_1_187_2","doi-asserted-by":"publisher","DOI":"10.1109\/EECSI.2017.8239179"},{"key":"e_1_3_1_188_2","first-page":"1","volume-title":"IEEE International Symposium on Hardware-Oriented Security and Trust (HOST\u201913)","author":"Helfmeier Clemens","year":"2013","unstructured":"Clemens Helfmeier, Christian Boit, Dmitry Nedospasov, and Jean-Pierre Seifert. 2013. Cloning physically unclonable functions. In IEEE International Symposium on Hardware-Oriented Security and Trust (HOST\u201913). IEEE, 1\u20136."},{"key":"e_1_3_1_189_2","doi-asserted-by":"publisher","unstructured":"Victor Rigworo Kebande. 2023. On the need for standardizing industrial Internet of Things (IIoT) Forensics Processes. 10.2139\/ssrn.4348065","DOI":"10.2139\/ssrn.4348065"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3635030","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3635030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:51:07Z","timestamp":1750287067000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3635030"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,12]]},"references-count":188,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,5,31]]}},"alternative-id":["10.1145\/3635030"],"URL":"https:\/\/doi.org\/10.1145\/3635030","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,12]]},"assertion":[{"value":"2022-02-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}