{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:01:59Z","timestamp":1773655319797,"version":"3.50.1"},"reference-count":25,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080071","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"956-961","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Requirements on Providing a Sustainability of Industrial Internet of Things"],"prefix":"10.3103","volume":"55","author":[{"given":"A. D.","family":"Dakhnovich","sequence":"first","affiliation":[]},{"given":"D. A.","family":"Moskvin","sequence":"additional","affiliation":[]},{"given":"D. P.","family":"Zegzhda","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7422_CR1","unstructured":"Ulltveit-Moe, N., Nergaard, H., and Erd\u00f6di, L., Gj\u00f8s\u00e6ter, T., Kolstad, E. and Berg, P., Secure information sharing in an industrial Internet of Things, 2016. arXiv:1601.04301 [cs.CR]"},{"key":"7422_CR2","unstructured":"Aberle, L., A comprehensive guide to enterprise IoT project success, IoT Agenda, 2015. http:\/\/internetofthingsagenda.techtarget.com\/essentialguide\/A-comprehensive-guide-to-enterprise-IoT-project-success. Cited September 10, 2020."},{"key":"7422_CR3","unstructured":"Conway, J., The industrial Internet of Things: An evolution to a smart manufacturing enterprise, Schneider Electric Whitepaper, 2015. https:\/\/it-resource.schneider-electric.com\/white-papers\/the-industrial-internet-of-things-an-evolution-to-a-smart-manufacturing-enterprise. Cited October 5, 2020."},{"key":"7422_CR4","unstructured":"Helmir, P., Open source in industrial internet of things: A systematic literature review, Master\u2019s Thesis, Lappeenranta: Lappeenranta Univ. of Technology, 2018."},{"key":"7422_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compind.2018.04.015","volume":"101","author":"H. Boyes","year":"2018","unstructured":"Boyes, H., Hallaq, B., Cunningham, J., and Watson, T., The industrial internet of things (IIoT): An analysis framework, Comput. Ind., 2018, vol. 101, pp. 1\u201312.\u00a0https:\/\/doi.org\/10.1016\/j.compind.2018.04.015","journal-title":"Comput. Ind."},{"key":"7422_CR6","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MSP.2012.74","volume":"10","author":"L. Strigin","year":"2012","unstructured":"Strigin, L., Resilience: What is it, and how much do we want?, IEEE Secur. Privacy, 2012, vol. 10, no. 3, pp. 72\u201375. https:\/\/doi.org\/10.1109\/MSP.2012.74","journal-title":"IEEE Secur. Privacy"},{"key":"7422_CR7","unstructured":"Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., Moscow, 2019, Basarab, M. and Markov, A.S., Eds., Moscow: CEUR Workshop Proceedings, 2019, pp. 60\u201364."},{"key":"7422_CR8","doi-asserted-by":"publisher","first-page":"627","DOI":"10.3103\/S0146411615080192","volume":"49","author":"P.D. Zegzhda","year":"2015","unstructured":"Zegzhda, P.D., Zegzhda, D.P., and Stepanova, T.V., Approach to the construction of the generalized functional-semantic cyber security model, Autom. Control Comput. Sci., 2015, vol.\u00a049, no. 8, pp. 627\u2013633. \u00a0https:\/\/doi.org\/10.3103\/S0146411615080192","journal-title":"Autom. Control Comput. Sci."},{"key":"7422_CR9","doi-asserted-by":"publisher","unstructured":"Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, Proc. 10th Int. Conf. on Security of Information and Networks, Jaipur, India, 2017, New York: Association for Computing Machinery, 2017, pp.\u00a0295\u2013298. \u00a0https:\/\/doi.org\/10.1145\/3136825.3136857","DOI":"10.1145\/3136825.3136857"},{"key":"7422_CR10","doi-asserted-by":"publisher","first-page":"713","DOI":"10.3103\/S0146411615080167","volume":"49","author":"N.S. Vert","year":"2015","unstructured":"Vert, N.S., Volkova, A.S., Zegzhda, D.P., and Kalinin, M.O., Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp.\u00a0713\u2013720. \u00a0https:\/\/doi.org\/10.3103\/S0146411615080167","journal-title":"Autom. Control Comput. Sci."},{"key":"7422_CR11","doi-asserted-by":"publisher","first-page":"984","DOI":"10.3103\/S0146411618080291","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-sustainability of software-defined networks based on situational management, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 984\u2013992. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080291","journal-title":"Autom. Control Comput. Sci."},{"key":"7422_CR12","unstructured":"Kalinin, M.O., Zegzhda, D.P., and Zegzhda, P.D., IT systems security monitoring and control via advanced concern with integrity property, Int. Conf. on Information Security and Privacy, Orlando, Fla., 2010, 2010, pp.\u00a074\u201379."},{"key":"7422_CR13","series-title":"Clarifying integrity control at the trusted information environment","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14706-7_27","volume-title":"Computer Network Security. MMM-ACNS 2010","author":"D.P. Zegzhda","year":"2010","unstructured":"Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment,  Computer Network Security. MMM-ACNS 2010, Kotenko, I. and Skormin, V., Eds., Lecture Notes in Computer Science, vol. 6528, Berlin: Springer, 2010, pp.\u00a0337\u2013344. \u00a0https:\/\/doi.org\/10.1007\/978-3-642-14706-7_27"},{"key":"7422_CR14","doi-asserted-by":"publisher","unstructured":"Kalinin, M.O., Permanent protection of information systems with method of automated security and integrity control, Proc. 3rd Int. Conf. on Security of Information and Networks, Taganrog, Russia, 2010, New York: Association for Computing Machinery, 2010, pp. 118\u2013123. \u00a0https:\/\/doi.org\/10.1145\/1854099.1854125","DOI":"10.1145\/1854099.1854125"},{"key":"7422_CR15","doi-asserted-by":"publisher","unstructured":"Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, Proc. 9th Int. Conf. on Security of Information and Networks, Newark, N.J., 2016, New York: Association for Computing Machinery, 2016, pp. 81\u201387. \u00a0https:\/\/doi.org\/10.1145\/2947626.2947639","DOI":"10.1145\/2947626.2947639"},{"key":"7422_CR16","doi-asserted-by":"publisher","unstructured":"Pavlenko, E., Zegzhda, D., and Poltavtseva, M., Ensuring the sustainability of cyberphysical systems based on dynamic reconfiguration, IEEE Int. Conf. on Industrial Cyber Physical Systems (ICPS), Taipei, 2019, IEEE, 2019, pp. 785\u2013789. \u00a0https:\/\/doi.org\/10.1109\/ICPHYS.2019.8780193","DOI":"10.1109\/ICPHYS.2019.8780193"},{"key":"7422_CR17","doi-asserted-by":"publisher","unstructured":"Krundyshev, V., Kalinin, M., and Zegzhda, P., Artificial swarm algorithm for vanet protection against routing attacks, IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, 2018, IEEE, 2018, pp. 795\u2013800.\u00a0https:\/\/doi.org\/10.1109\/ICPHYS.2018.8390808","DOI":"10.1109\/ICPHYS.2018.8390808"},{"key":"7422_CR18","doi-asserted-by":"publisher","first-page":"805","DOI":"10.3103\/S0146411617080260","volume":"51","author":"D.P. Zegzhda","year":"2017","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 805\u2013816. \u00a0https:\/\/doi.org\/10.3103\/S0146411617080260","journal-title":"Autom. Control Comput. Sci."},{"key":"7422_CR19","unstructured":"Delic, K.A. and Penkler, D.M., Architecting resilient IoT systems, 2018. www.researchgate.net\/publication\/331072091_Architecting_Resilient_IoT_Systems\/stats. Cited October 6, 2020."},{"key":"7422_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2822885","volume":"2016","author":"K.A. Delic","year":"2016","unstructured":"Delic, K.A., On resilience of IoT systems: The Internet of Things (ubiquity symposium), Ubiquity, 2016, vol.\u00a02016, no. February, p. 1. https:\/\/doi.org\/10.1145\/2822885","journal-title":"Ubiquity"},{"key":"7422_CR21","doi-asserted-by":"crossref","unstructured":"Lin, S., Crawford, M., and Mellor, S., The industrial Internet of Things, Volume G1: Reference Architecture, 2017. https:\/\/www.iiconsortium.org\/IIC_PUB_G1_V1.80_2017-01-31.pdf. Cited February 19, 2019.","DOI":"10.1093\/eurheartj\/sux040"},{"key":"7422_CR22","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","volume":"4","author":"A.R. Sfar","year":"2018","unstructured":"Sfar, A.R., Natalizio, E., Challal, Y., and Chtourou, Z., A roadmap for security challenges in the Internet of Things, Digital Commun. \n               Networks, 2018, vol. 4, no. 2, pp. 118\u2013137. \u00a0https:\/\/doi.org\/10.1016\/j.dcan.2017.04.003","journal-title":"Networks"},{"key":"7422_CR23","doi-asserted-by":"publisher","unstructured":"Le, Q., Ngo-Quynh, T., and Magedanz, T., RPL-based multipath routing protocols for Internet of Things on wireless sensor networks, Int. Conf. on Advanced Technologies for Communications (ATC 2014), Hanoi, 2014, IEEE, 2014, pp. 424\u2013429. \u00a0https:\/\/doi.org\/10.1109\/ATC.2014.7043425","DOI":"10.1109\/ATC.2014.7043425"},{"key":"7422_CR24","doi-asserted-by":"publisher","unstructured":"Pavkovi\u0107, B., Theoleyre, F., and Duda, A., Multipath opportunistic RPL routing over IEEE\u00a0802.15.4, Proc. 14th ACM Int. Conf. on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami, 2011, New York: Association for Computing Machinery, 2011, pp. 179\u2013186. https:\/\/doi.org\/10.1145\/2068897.2068929","DOI":"10.1145\/2068897.2068929"},{"key":"7422_CR25","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s12243-016-0530-y","volume":"72","author":"D.P. Abreu","year":"2017","unstructured":"Abreu, D.P., Velasquez, K., Curado, M., and Monteiro, E., A resilient Internet of Things architecture for smart cities, Ann. Telecommun., 2017, vol. 72, nos. 1\u20132, pp. 19\u201330. \u00a0https:\/\/doi.org\/10.1007\/s12243-016-0530-y","journal-title":"Ann. Telecommun."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080071.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080071","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080071.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:19Z","timestamp":1773612199000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080071"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":25,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7422"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080071","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"23 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}