{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:29:34Z","timestamp":1775744974868,"version":"3.50.1"},"reference-count":200,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2023,11,3]],"date-time":"2023-11-03T00:00:00Z","timestamp":1698969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European University of the Atlantic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Internet of Things (IoT) is an innovative technology that presents effective and attractive solutions to revolutionize various domains. Numerous solutions based on the IoT have been designed to automate industries, manufacturing units, and production houses to mitigate human involvement in hazardous operations. Owing to the large number of publications in the IoT paradigm, in particular those focusing on industrial IoT (IIoT), a comprehensive survey is significantly important to provide insights into recent developments. This survey presents the workings of the IoT-based smart industry and its major components and proposes the state-of-the-art network infrastructure, including structured layers of IIoT architecture, IIoT network topologies, protocols, and devices. Furthermore, the relationship between IoT-based industries and key technologies is analyzed, including big data storage, cloud computing, and data analytics. A detailed discussion of IIoT-based application domains, smartphone application solutions, and sensor- and device-based IIoT applications developed for the management of the smart industry is also presented. Consequently, IIoT-based security attacks and their relevant countermeasures are highlighted. By analyzing the essential components, their security risks, and available solutions, future research directions regarding the implementation of IIoT are outlined. Finally, a comprehensive discussion of open research challenges and issues related to the smart industry is also presented.<\/jats:p>","DOI":"10.3390\/s23218958","type":"journal-article","created":{"date-parts":[[2023,11,3]],"date-time":"2023-11-03T10:59:54Z","timestamp":1699009194000},"page":"8958","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4095-8868","authenticated-orcid":false,"given":"Muhammad Shoaib","family":"Farooq","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Management and Technology, Lahore 54000, Pakistan"}]},{"given":"Muhammad","family":"Abdullah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Management and Technology, Lahore 54000, Pakistan"}]},{"given":"Shamyla","family":"Riaz","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Management and Technology, Lahore 54000, Pakistan"}]},{"given":"Atif","family":"Alvi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Management and Technology, Lahore 54000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8403-1047","authenticated-orcid":false,"given":"Furqan","family":"Rustam","sequence":"additional","affiliation":[{"name":"School of Computer Science, University College Dublin, D04 V1W8 Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5524-5366","authenticated-orcid":false,"given":"Miguel Angel L\u00f3pez","family":"Flores","sequence":"additional","affiliation":[{"name":"Research Group on Foods, Universidad Europea del Atlantico, Isabel Torres 21, 39011 Santander, Spain"},{"name":"Research Group on Foods, Universidad Internacional Iberoamericana, Campeche 24560, Mexico"},{"name":"Instituto Polit\u00e9cnico Nacional, UPIICSA, Ciudad de M\u00e9xico 04510, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7156-9585","authenticated-orcid":false,"given":"Juan Castanedo","family":"Gal\u00e1n","sequence":"additional","affiliation":[{"name":"Research Group on Foods, Universidad Europea del Atlantico, Isabel Torres 21, 39011 Santander, Spain"},{"name":"Universidad Internacional Iberoamericana, Arecibo, PR 00613, USA"},{"name":"Department of Projects, Universidade Internacional do Cuanza, Cuito EN250, Bie, Angola"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1990-6924","authenticated-orcid":false,"given":"Md Abdus","family":"Samad","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8271-6496","authenticated-orcid":false,"given":"Imran","family":"Ashraf","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2023,11,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1007\/s11390-011-1189-5","article-title":"Internet of things: Objectives and scientific challenges","volume":"26","author":"Ma","year":"2011","journal-title":"J. Comput. Sci. Technol."},{"key":"ref_2","unstructured":"Okano, M.T. (2017, January 17\u201320). IOT and industry 4.0: The industrial new revolution. Proceedings of the International Conference on Management and Information Systems, Istanbul, Turkey."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1016\/j.egyr.2020.09.022","article-title":"Green Industrial Internet of Things from a smart industry perspectives","volume":"6","author":"Tabaa","year":"2020","journal-title":"Energy Rep."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","article-title":"A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications","volume":"4","author":"Lin","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1109\/COMST.2018.2863956","article-title":"Security services using blockchains: A state of the art survey","volume":"21","author":"Salman","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Cardenas, A.A., Amin, S., and Sastry, S. (2008, January 17\u201320). Secure control: Towards survivable cyber-physical systems. Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, Beijing, China.","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"106522","DOI":"10.1016\/j.compeleceng.2019.106522","article-title":"Industrial internet of things: Recent advances, enabling technologies and open challenges","volume":"81","author":"Khan","year":"2020","journal-title":"Comput. Electr. Eng."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"6505","DOI":"10.1109\/ACCESS.2017.2783682","article-title":"Smart factory of industry 4.0: Key technologies, application case, and challenges","volume":"6","author":"Chen","year":"2017","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.iotcps.2023.04.006","article-title":"Internet of things for smart factories in industry 4.0, a review","volume":"3","author":"Soori","year":"2023","journal-title":"Internet Things-Cyber-Phys. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Tange, K., De Donno, M., Fafoutis, X., and Dragoni, N. (2019, January 15). Towards a systematic survey of industrial IoT security requirements: Research method and quantitative analysis. Proceedings of the Workshop on Fog Computing and the IoT, New York, NY, USA.","DOI":"10.1145\/3313150.3313228"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Yu, X., and Guo, H. (2019, January 28\u201330). A survey on IIoT security. Proceedings of the 2019 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS), Singapore.","DOI":"10.1109\/VTS-APWCS.2019.8851679"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"102481","DOI":"10.1016\/j.jnca.2019.102481","article-title":"A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT","volume":"149","author":"Sengupta","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_13","first-page":"7373","article-title":"Software-defined industrial internet of things in the context of industry 4.0","volume":"16","author":"Wan","year":"2016","journal-title":"IEEE Sens. J."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"4674","DOI":"10.1109\/TII.2018.2855198","article-title":"Deploying fog computing in industrial internet of things and industry 4.0","volume":"14","author":"Aazam","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"4118","DOI":"10.1109\/JIOT.2018.2875544","article-title":"Fog\/edge computing-based IoT (FECIoT): Architecture, applications, and research issues","volume":"6","author":"Omoniwa","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.compind.2018.04.015","article-title":"The industrial internet of things (IIoT): An analysis framework","volume":"101","author":"Boyes","year":"2018","journal-title":"Comput. Ind."},{"key":"ref_17","first-page":"45","article-title":"Taxonomies for reasoning about cyber-physical attacks in IoT-based manufacturing systems","volume":"4","author":"Pan","year":"2017","journal-title":"Int. J. Interact. Multimed. Artif. Intell."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","article-title":"Internet of things security: A top-down survey","volume":"141","author":"Kouicem","year":"2018","journal-title":"Comput. Netw."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Chhetri, S.R., Rashid, N., Faezi, S., and Al Faruque, M.A. (2017, January 13\u201316). Security trends and advances in manufacturing systems in the era of industry 4.0. Proceedings of the 2017 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), Irvine, CA, USA.","DOI":"10.1109\/ICCAD.2017.8203896"},{"key":"ref_20","first-page":"899","article-title":"Scanning the industry 4.0: A literature review on technologies for manufacturing systems","volume":"22","year":"2019","journal-title":"Eng. Sci. Technol. Int. J."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s10845-018-1433-8","article-title":"Literature review of Industry 4.0 and related technologies","volume":"31","author":"Oztemel","year":"2020","journal-title":"J. Intell. Manuf."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Mabkhot, M.M., Al-Ahmari, A.M., Salah, B., and Alkhalefah, H. (2018). Requirements of the smart factory system: A survey and perspective. Machines, 6.","DOI":"10.3390\/machines6020023"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.tele.2019.03.005","article-title":"Paradigm of IoT big data analytics in the healthcare industry: A review of scientific literature and mapping of research trends","volume":"41","author":"Saheb","year":"2019","journal-title":"Telemat. Inform."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"4167","DOI":"10.1007\/s12652-018-0820-5","article-title":"Real-time data processing scheme using big data analytics in internet of things based smart transportation environment","volume":"10","author":"Babar","year":"2019","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Hossein Motlagh, N., Mohammadrezaei, M., Hunt, J., and Zakeri, B. (2020). Internet of Things (IoT) and the energy sector. Energies, 13.","DOI":"10.3390\/en13020494"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.compeleceng.2017.06.005","article-title":"High-level modeling and synthesis of smart sensor networks for Industrial Internet of Things","volume":"61","author":"Chen","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"25344","DOI":"10.1109\/ACCESS.2021.3057766","article-title":"A taxonomy of security issues in Industrial Internet-of-Things: Scoping review for existing solutions, future implications, and research challenges","volume":"9","author":"Jayalaxmi","year":"2021","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.jnca.2011.10.015","article-title":"An overview of the Internet of Things for people with disabilities","volume":"35","author":"Domingo","year":"2012","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Jia, X., Feng, Q., Fan, T., and Lei, Q. (2012, January 21\u201323). RFID technology and its applications in Internet of Things (IoT). Proceedings of the 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), Yichang, China.","DOI":"10.1109\/CECNet.2012.6201508"},{"key":"ref_30","first-page":"214","article-title":"Improved layered architecture for Internet of Things","volume":"4","author":"Darwish","year":"2015","journal-title":"Int. J. Comput. Acad. Res."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Burhan, M., Rehman, R.A., Khan, B., and Kim, B.S. (2018). IoT elements, layered architectures and security issues: A comprehensive survey. Sensors, 18.","DOI":"10.3390\/s18092796"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Iqbal, F., Altaf, A., Waris, Z., Aray, D.G., Flores, M.A.L., D\u00edez, I.d.l.T., and Ashraf, I. (2023). Blockchain-Modeled Edge-Computing-Based Smart Home Monitoring System with Energy Usage Prediction. Sensors, 23.","DOI":"10.3390\/s23115263"},{"key":"ref_33","first-page":"2677","article-title":"A survey on cyber security threats in iot-enabled maritime industry","volume":"24","author":"Ashraf","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Almujally, N.A., Aljrees, T., Saidani, O., Umer, M., Faheem, Z.B., Abuzinadah, N., Alnowaiser, K., and Ashraf, I. (2023). Monitoring Acute Heart Failure Patients Using Internet-of-Things-Based Smart Monitoring System. Sensors, 23.","DOI":"10.3390\/s23104580"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MCOM.2018.1700622","article-title":"Edge computing in the industrial internet of things environment: Software-defined-networks-based edge-cloud interplay","volume":"56","author":"Kaur","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.promfg.2018.03.002","article-title":"Business model innovation through Industry 4.0: A review","volume":"22","author":"Ibarra","year":"2018","journal-title":"Procedia Manuf."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s40684-016-0015-5","article-title":"Smart manufacturing: Past research, present findings, and future directions","volume":"3","author":"Kang","year":"2016","journal-title":"Int. J. Precis. Eng.-Manuf.-Green Technol."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Jiang, H., and Xu, W. (2014, January 9\u201312). How to find your appropriate doctor: An integrated recommendation framework in big data context. Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Healthcare and e-Health (CICARE), Orlando, FL, USA.","DOI":"10.1109\/CICARE.2014.7007848"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"102225","DOI":"10.1016\/j.rcim.2021.102225","article-title":"Design choices for next-generation IIoT-connected MES\/MOM: An empirical study on smart factories","volume":"73","author":"Mantravadi","year":"2022","journal-title":"Robot.-Comput.-Integr. Manuf."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Shrouf, F., Ordieres, J., and Miragliotta, G. (2014, January 9\u201312). Smart factories in Industry 4.0: A review of the concept and of energy management approached in production based on the Internet of Things paradigm. Proceedings of the 2014 IEEE International Conference on Industrial Engineering and Engineering Management, Selangor, Malaysia.","DOI":"10.1109\/IEEM.2014.7058728"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Vogel-Heuser, B., Weber, J., and Folmer, J. (2015, January 8\u201311). Evaluating reconfiguration abilities of automated production systems in Industrie 4.0 with metrics. Proceedings of the 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA), Luxembourg.","DOI":"10.1109\/ETFA.2015.7301441"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1080\/09537287.2011.591619","article-title":"Sustainable manufacturing: Trends and research challenges","volume":"23","author":"Garetti","year":"2012","journal-title":"Prod. Plan. Control"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Souza, V., Cruz, R., Silva, W., Lins, S., and Lucena, V. (2019, January 11\u201313). A digital twin architecture based on the industrial internet of things technologies. Proceedings of the 2019 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA.","DOI":"10.1109\/ICCE.2019.8662081"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"86769","DOI":"10.1109\/ACCESS.2019.2923610","article-title":"A smart manufacturing service system based on edge computing, fog computing, and cloud computing","volume":"7","author":"Qi","year":"2019","journal-title":"IEEE Access"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1016\/j.neucom.2021.04.021","article-title":"Applications of information channels to physics-informed neural networks for WiFi signal propagation simulation at the edge of the industrial internet of things","volume":"454","author":"Olivares","year":"2021","journal-title":"Neurocomputing"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Dobrilovic, D., Brtka, V., Stojanov, Z., Jotanovic, G., Perakovic, D., and Jausevac, G. (2021). A Model for Working Environment Monitoring in Smart Manufacturing. Appl. Sci., 11.","DOI":"10.3390\/app11062850"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"P\u00f6tsch, A., and Hammer, F. (2019, January 27\u201329). Towards end-to-end latency of LoRaWAN: Experimental analysis and IIoT applicability. Proceedings of the 2019 15th IEEE International Workshop on Factory Communication Systems (WFCS), Sundsvall, Sweden.","DOI":"10.1109\/WFCS.2019.8758033"},{"key":"ref_48","first-page":"10","article-title":"Industrial IoT in 5G environment towards smart manufacturing","volume":"10","author":"Cheng","year":"2018","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_49","first-page":"8","article-title":"Delay-aware and reliability-aware contention-free MF\u2013TDMA protocol for automated RFID monitoring in industrial IoT","volume":"3","author":"Zhai","year":"2016","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1016\/j.asoc.2018.10.030","article-title":"A hybrid intelligent model for network selection in the industrial Internet of Things","volume":"74","author":"Goudarzi","year":"2019","journal-title":"Appl. Soft Comput."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Shahzad, K., and O\u2019Nils, M. (2018, January 16\u201318). Condition monitoring in industry 4.0-design challenges and possibilities: A case study. Proceedings of the 2018 Workshop on Metrology for Industry 4.0 and IoT, Brescia, Italy.","DOI":"10.1109\/METROI4.2018.8428306"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1016\/j.procs.2013.06.079","article-title":"A DNS architecture for the internet of things: A case study in transport logistics","volume":"19","author":"Karakostas","year":"2013","journal-title":"Procedia Comput. Sci."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s12525-020-00407-6","article-title":"Core, intertwined, and ecosystem-specific clusters in platform ecosystems: Analyzing similarities in the digital transformation of the automotive, blockchain, financial, insurance and IIoT industry","volume":"31","author":"Riasanow","year":"2021","journal-title":"Electron. Mark."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Suchy, J., and Paces, P. (2014, January 16\u201318). BMW iDrive automotive hid device in EFIS control. Proceedings of the 2014 IEEE\/AIAA 33rd Digital Avionics Systems Conference (DASC), Atlanta, GA, USA.","DOI":"10.1109\/DASC.2014.6979432"},{"key":"ref_56","unstructured":"Zhang, Y., Chen, B., and Lu, X. (2011). International Conference on Wireless Communications and Applications, Springer."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Dikmen, M., and Burns, C. (2017, January 5\u20138). Trust in autonomous vehicles: The case of Tesla autopilot and summon. Proceedings of the 2017 IEEE International Conference on Systems, MAN, and Cybernetics (SMC), Banff, AB, Canada.","DOI":"10.1109\/SMC.2017.8122757"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"106739","DOI":"10.1016\/j.compeleceng.2020.106739","article-title":"Internet of energy: Opportunities, applications, architectures and challenges in smart industries","volume":"86","author":"Shahzad","year":"2020","journal-title":"Comput. Electr. Eng."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MIC.2009.120","article-title":"Perci: Pervasive service interaction with the internet of things","volume":"13","author":"Broll","year":"2009","journal-title":"IEEE Internet Comput."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"2462","DOI":"10.1109\/COMST.2020.3009103","article-title":"Edge computing in industrial internet of things: Architecture, advances and challenges","volume":"22","author":"Qiu","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"6083","DOI":"10.1109\/TII.2019.2955152","article-title":"A unified trustworthy environment establishment based on edge computing in industrial IoT","volume":"16","author":"Wang","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Rejeb, A., Keogh, J.G., and Treiblmaier, H. (2019). Leveraging the internet of things and blockchain technology in supply chain management. Future Internet, 11.","DOI":"10.3390\/fi11070161"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Cerruela Garc\u00eda, G., Luque Ruiz, I., and G\u00f3mez-Nieto, M.\u00c1. (2016). State of the art, trends and future of bluetooth low energy, near field communication and visible light communication in the development of smart cities. Sensors, 16.","DOI":"10.3390\/s16111968"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"012037","DOI":"10.1088\/1742-6596\/1714\/1\/012037","article-title":"Convergence of IOT in Tourism Industry: A Pragmatic Analysis","volume":"1714","author":"Verma","year":"2021","journal-title":"J. Phys. Conf. Ser. IOP Publ."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"2736","DOI":"10.1109\/TII.2018.2808190","article-title":"Context-sensitive access in industrial internet of things (IIoT) healthcare applications","volume":"14","author":"Alturjman","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"1504","DOI":"10.1109\/COMST.2017.2691349","article-title":"Industrial internet: A survey on the enabling technologies, applications, and challenges","volume":"19","author":"Li","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_67","unstructured":"Pang, Z., Chen, Q., Tian, J., Zheng, L., and Dubrova, E. (2013, January 27\u201330). Ecosystem analysis in the design of open platform-based in-home healthcare terminals towards the internet-of-things. Proceedings of the 2013 15th International Conference on Advanced Communications Technology (ICACT), PyeongChang, Republic of Korea."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"S41","DOI":"10.1370\/afm.1474","article-title":"Process and outcomes of patient-centered medical care with Alaska Native people at Southcentral Foundation","volume":"11","author":"Driscoll","year":"2013","journal-title":"Ann. Fam. Med."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"S28","DOI":"10.1097\/MLR.0b013e3181cad65c","article-title":"Primary care practice transformation is hard work: Insights from a 15-year developmental program of research","volume":"49","author":"Crabtree","year":"2011","journal-title":"Med. Care"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Sha, L., Gopalakrishnan, S., Liu, X., and Wang, Q. (2008, January 11\u201313). Cyber-physical systems: A new frontier. Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008), Taichung, Taiwan.","DOI":"10.1109\/SUTC.2008.85"},{"key":"ref_71","first-page":"642","article-title":"From offline toward real time: A hybrid systems model checking and CPS codesign approach for medical device plug-and-play collaborations","volume":"25","author":"Li","year":"2013","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/JSYST.2015.2460747","article-title":"Health-CPS: Healthcare cyber-physical system assisted by cloud and big data","volume":"11","author":"Zhang","year":"2015","journal-title":"IEEE Syst. J."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1016\/j.future.2018.04.036","article-title":"Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier","volume":"86","author":"Kumar","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_74","first-page":"100129","article-title":"Industry 4.0 and health: Internet of things, big data, and cloud computing for healthcare 4.0","volume":"18","author":"Aceto","year":"2020","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1109\/JSAC.2009.090506","article-title":"Remote patient monitoring service using heterogeneous wireless access networks: Architecture and optimization","volume":"27","author":"Niyato","year":"2009","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_76","unstructured":"Huang, Y.F., Liu, P., Pan, Q., and Lin, J.S. (2012, January 17\u201319). A doctor recommendation algorithm based on doctor performances and patient preferences. Proceedings of the 2012 International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP), Chengdu, China."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.comnet.2016.01.009","article-title":"Cloud-assisted industrial internet of things (iiot)-enabled framework for health monitoring","volume":"101","author":"Hossain","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"431047","DOI":"10.1155\/2015\/431047","article-title":"Data mining for the internet of things: Literature review and challenges","volume":"11","author":"Chen","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"1353","DOI":"10.1007\/s12541-017-0161-x","article-title":"A big data analytics platform for smart factories in small and medium-sized manufacturing enterprises: An empirical case study of a die casting factory","volume":"18","author":"Lee","year":"2017","journal-title":"Int. J. Precis. Eng. Manuf."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"3159805","DOI":"10.1155\/2016\/3159805","article-title":"Implementing smart factory of industrie 4.0: An outlook","volume":"12","author":"Wang","year":"2016","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"101370","DOI":"10.1016\/j.aei.2021.101370","article-title":"An IIoT-driven and AI-enabled framework for smart manufacturing system based on three-terminal collaborative platform","volume":"50","author":"Bu","year":"2021","journal-title":"Adv. Eng. Inform."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Scheuermann, C., Verclas, S., and Bruegge, B. (2015, January 19\u201321). Agile factory-an example of an industry 4.0 manufacturing process. Proceedings of the 2015 IEEE 3rd International Conference on Cyber-Physical Systems, Networks, and Applications, Kowloon, Hong Kong.","DOI":"10.1109\/CPSNA.2015.17"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"1875","DOI":"10.1016\/j.proeng.2014.12.341","article-title":"A review on lean manufacturing implementation techniques","volume":"97","author":"Sundar","year":"2014","journal-title":"Procedia Eng."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"1787","DOI":"10.1007\/s00170-019-04653-7","article-title":"Digital twin-based cyber physical production system architectural framework for personalized production","volume":"106","author":"Park","year":"2020","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Moens, P., Bracke, V., Soete, C., Vanden Hautte, S., Nieves Avendano, D., Ooijevaar, T., Devos, S., Volckaert, B., and Van Hoecke, S. (2020). Scalable fleet monitoring and visualization for smart machine maintenance and industrial IoT applications. Sensors, 20.","DOI":"10.3390\/s20154308"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.future.2019.04.020","article-title":"The role of big data analytics in industrial Internet of Things","volume":"99","author":"Yaqoob","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Saldivar, A.A.F., Li, Y., Chen, W.n., Zhan, Z.h., Zhang, J., and Chen, L.Y. (2015, January 11\u201312). Industry 4.0 with cyber-physical integration: A design and manufacture perspective. Proceedings of the 2015 21st International Conference on Automation and Computing (ICAC), Glasgow, UK.","DOI":"10.1109\/IConAC.2015.7313954"},{"key":"ref_88","first-page":"54","article-title":"Industry 4.0: The future of productivity and growth in manufacturing industries","volume":"9","author":"Lorenz","year":"2015","journal-title":"Boston Consult. Group"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"103500","DOI":"10.1016\/j.csi.2020.103500","article-title":"Secure transmission lines monitoring and efficient electricity management in ultra-reliable low latency industrial Internet of Things","volume":"77","author":"Judge","year":"2021","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_90","unstructured":"Bhattacharjee, S., and Nandi, C. (2019). The Internet of Things in the Industrial Sector, Springer."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.aej.2023.07.025","article-title":"Performance analysis and optimization of multiple IIoT devices radio frequency energy harvesting NOMA mobile edge computing networks","volume":"79","author":"Truong","year":"2023","journal-title":"Alex. Eng. J."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/s40684-017-0028-8","article-title":"Sustainability aspects of a digitalized industry\u2014A comparative study from China and Germany","volume":"4","author":"Beier","year":"2017","journal-title":"Int. J. Precis. Eng.-Manuf.-Green Technol."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1016\/j.comcom.2019.12.011","article-title":"Intelligent remote monitoring and manufacturing system of production line based on industrial Internet of Things","volume":"150","author":"Huang","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_94","first-page":"4","article-title":"Industrial Internet of Things monitoring solution for advanced predictive maintenance applications","volume":"7","author":"Civerchia","year":"2017","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"4093","DOI":"10.1109\/TII.2018.2832853","article-title":"A security analysis method for industrial Internet of Things","volume":"14","author":"Mouratidis","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/TETC.2015.2390034","article-title":"The emerging internet of things marketplace from an industrial perspective: A survey","volume":"3","author":"Perera","year":"2015","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"107439","DOI":"10.1016\/j.compeleceng.2021.107439","article-title":"An industrial IoT sensor system for high-temperature measurement","volume":"95","author":"Chang","year":"2021","journal-title":"Comput. Electr. Eng."},{"key":"ref_98","unstructured":"Chavhan, S., Kulkarni, R.A., and Zilpe, A.R. (2021). Smart Sensors for Industrial Internet of Things, Springer."},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Park, D., Kim, S., An, Y., and Jung, J.Y. (2018). LiReD: A light-weight real-time fault detection system for edge computing using LSTM recurrent neural networks. Sensors, 18.","DOI":"10.3390\/s18072110"},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"1949","DOI":"10.1109\/TII.2021.3102158","article-title":"SEGA: Secured Edge Gateway Microservices Architecture for IIoT-based Machine Monitoring","volume":"18","author":"Ghosh","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Strau\u00df, P., Schmitz, M., W\u00f6stmann, R., and Deuse, J. (2018, January 12\u201313). Enabling of predictive maintenance in the brownfield through low-cost sensors, an IIoT-architecture and machine learning. Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA.","DOI":"10.1109\/BigData.2018.8622076"},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Sinha, N., Pujitha, K.E., and Alex, J.S.R. (2015, January 8\u201310). Xively based sensing and monitoring system for IoT. Proceedings of the 2015 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India.","DOI":"10.1109\/ICCCI.2015.7218144"},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.apacoust.2014.08.016","article-title":"Application of empirical mode decomposition and artificial neural network for automatic bearing fault diagnosis based on vibration signals","volume":"89","author":"Ali","year":"2015","journal-title":"Appl. Acoust."},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Budiarti, R.P.N., Tjahjono, A., Hariadi, M., and Purnomo, M.H. (2019, January 16\u201317). Development of IoT for automated water quality monitoring system. Proceedings of the 2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE), Jember, Indonesia.","DOI":"10.1109\/ICOMITEE.2019.8920900"},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Ashraf, I., Narra, M., Umer, M., Majeed, R., Sadiq, S., Javaid, F., and Rasool, N. (2022). A deep learning-based smart framework for cyber-physical and satellite system security threats detection. Electronics, 11.","DOI":"10.3390\/electronics11040667"},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"78879","DOI":"10.1109\/ACCESS.2023.3298371","article-title":"Unleashing the Potential of Blockchain and Machine Learning: Insights and Emerging Trends from Bibliometric Analysis","volume":"11","author":"Hanine","year":"2023","journal-title":"IEEE Access"},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Akram, U., Sharif, W., Shahroz, M., Mushtaq, M.F., Aray, D.G., Thompson, E.B., Diez, I.d.l.T., Djuraev, S., and Ashraf, I. (2023). IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System. Sensors, 23.","DOI":"10.3390\/s23146379"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Kim, J., Park, J., and Lee, J.H. (2023, January 20\u201323). Analysis of recent IIoT security technology trends in a smart factory environment. Proceedings of the 2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Bali, Indonesia.","DOI":"10.1109\/ICAIIC57133.2023.10067004"},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Nawir, M., Amir, A., Yaakob, N., and Lynn, O.B. (2016, January 11\u201312). Internet of Things (IoT): Taxonomy of security attacks. Proceedings of the 2016 3rd International Conference on Electronic Design (ICED), Phuket, Thailand.","DOI":"10.1109\/ICED.2016.7804660"},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Tamilmani, S., Mohan, T., Jeyalakshmi, S., Shukla, G.P., Gehlot, A., and Shukla, S.K. (2023, January 27\u201329). Blockchain integrated with Industrial IOT towards Industry 4.0. Proceedings of the 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), Greater Noida, India.","DOI":"10.1109\/AISC56616.2023.10085226"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Rustam, F., Mushtaq, M.F., Hamza, A., Farooq, M.S., Jurcut, A.D., and Ashraf, I. (2022). Denial of service attack classification using machine learning with multi-features. Electronics, 11.","DOI":"10.3390\/electronics11223817"},{"key":"ref_112","doi-asserted-by":"crossref","unstructured":"Kambourakis, G., Kolias, C., and Stavrou, A. (2017, January 23\u201325). The mirai botnet and the iot zombie armies. Proceedings of the MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), Baltimore, MD, USA.","DOI":"10.1109\/MILCOM.2017.8170867"},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MPRV.2008.6","article-title":"Denial-of-service in wireless sensor networks: Attacks and defenses","volume":"7","author":"Raymond","year":"2008","journal-title":"IEEE Pervasive Comput."},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"2573","DOI":"10.1109\/COMST.2017.2731979","article-title":"A survey of wearable devices and challenges","volume":"19","author":"Seneviratne","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","article-title":"A survey on IoT security: Application areas, security threats, and solution architectures","volume":"7","author":"Hassija","year":"2019","journal-title":"IEEE Access"},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1109\/JSAC.2005.843561","article-title":"Statistical en-route filtering of injected false data in sensor networks","volume":"23","author":"Ye","year":"2005","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_117","doi-asserted-by":"crossref","unstructured":"Al-Khurafi, O.B., and Al-Ahmad, M.A. (2015, January 8\u201310). Survey of web application vulnerability attacks. Proceedings of the 2015 4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ACSAT.2015.46"},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Shah, S., Simnani, S.S.A., and Banday, M.T. (2018, January 3\u20134). A study of security attacks on internet of things and its possible solutions. Proceedings of the 2018 International Conference on Automation and Computational Engineering (ICACE), Greater Noida, India.","DOI":"10.1109\/ICACE.2018.8687091"},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.jpdc.2022.10.001","article-title":"Malware detection using image representation of malware data and transfer learning","volume":"172","author":"Rustam","year":"2023","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"96538","DOI":"10.1109\/ACCESS.2022.3205019","article-title":"A comprehensive review of denial of service attacks in blockchain ecosystem and open challenges","volume":"10","author":"Chaganti","year":"2022","journal-title":"IEEE Access"},{"key":"ref_121","first-page":"2228","article-title":"Dynamic policies in internet of things: Enforcement and synchronization","volume":"4","author":"Sicari","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"3235","DOI":"10.1007\/s13042-020-01248-7","article-title":"IoT enabled depthwise separable convolution neural network with deep support vector machine for COVID-19 diagnosis and classification","volume":"12","author":"Le","year":"2021","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"7702","DOI":"10.1109\/JIOT.2019.2901840","article-title":"Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities","volume":"6","author":"Shen","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"6816","DOI":"10.1109\/JSEN.2017.2743460","article-title":"Cute mote, a customizable and trustable end-device for the internet of things","volume":"17","author":"Gomes","year":"2017","journal-title":"IEEE Sens. J."},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Bolotnyy, L., and Robins, G. (2007, January 19\u201323). Physically unclonable function-based security and privacy in RFID systems. Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom\u201907), White Plains, NY, USA.","DOI":"10.1109\/PERCOM.2007.26"},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Saivarun, K., Ramakrishnan, R., and Kishore, M. (2022, January 18\u201319). Iot Based Smart Industry Monitoring And Alerting System. Proceedings of the 2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC), Bengaluru, India.","DOI":"10.1109\/IIHC55949.2022.10059702"},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"357430","DOI":"10.1155\/2014\/357430","article-title":"PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications","volume":"10","author":"Porambage","year":"2014","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/j.infsof.2016.02.005","article-title":"Securing web applications from injection and logic vulnerabilities: Approaches and challenges","volume":"74","author":"Deepa","year":"2016","journal-title":"Inf. Softw. Technol."},{"key":"ref_129","doi-asserted-by":"crossref","unstructured":"Chahid, Y., Benabdellah, M., and Azizi, A. (2017, January 19\u201320). Internet of things security. Proceedings of the 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), Fez, Morocco.","DOI":"10.1109\/WITS.2017.7934655"},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.jnca.2018.10.008","article-title":"A survey on location privacy protection in wireless sensor networks","volume":"125","author":"Jiang","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_131","unstructured":"Damghani, H., Damghani, L., Hosseinian, H., and Sharifi, R. (2019, January 20\u201321). Classification of attacks on IoT. Proceedings of the 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation, Tehran City, Iran."},{"key":"ref_132","first-page":"58","article-title":"A survey: DDOS attack on Internet of Things","volume":"10","author":"Sonar","year":"2014","journal-title":"Int. J. Eng. Res. Dev."},{"key":"ref_133","first-page":"840","article-title":"Real time intrusion and wormhole attack detection in internet of things","volume":"121","author":"Pongle","year":"2015","journal-title":"Int. J. Comput. Appl."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"2010","DOI":"10.1587\/transinf.2015INP0005","article-title":"MDMA: A multi-data and multi-ACK verified Selective Forwarding Attack Detection Scheme in WSNs","volume":"99","author":"Liu","year":"2016","journal-title":"IEICE Trans. Inf. Syst."},{"key":"ref_135","doi-asserted-by":"crossref","unstructured":"Yang, X., Karampatzakis, E., Doerr, C., and Kuipers, F. (2018, January 17\u201320). Security Vulnerabilities in LoRaWAN. Proceedings of the 2018 IEEE\/ACM 3rd International Conference on Internet-of-Things Design and Implementation (IoTDI), Orlando, FL, USA.","DOI":"10.1109\/IoTDI.2018.00022"},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1109\/JIOT.2018.2843769","article-title":"Analytical model for sybil attack phases in internet of things","volume":"6","author":"Mishra","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_137","first-page":"1503","article-title":"Handling of man-in-the-middle attack in wsn through intrusion detection system","volume":"8","author":"Mohapatra","year":"2020","journal-title":"Int. J."},{"key":"ref_138","doi-asserted-by":"crossref","first-page":"2524","DOI":"10.1109\/LCOMM.2017.2738629","article-title":"DIO suppression attack against routing in the Internet of Things","volume":"21","author":"Perazzo","year":"2017","journal-title":"IEEE Commun. Lett."},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"1206","DOI":"10.1109\/JIOT.2018.2799820","article-title":"Epic: A differential privacy framework to defend smart homes against internet traffic analysis","volume":"5","author":"Liu","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"5904","DOI":"10.1109\/JIOT.2020.3032518","article-title":"SRAM-PUF-based entities authentication scheme for resource-constrained IoT devices","volume":"8","author":"Farha","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_141","doi-asserted-by":"crossref","unstructured":"Glissa, G., Rachedi, A., and Meddeb, A. (2016, January 4\u20138). A secure routing protocol based on RPL for Internet of Things. Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA.","DOI":"10.1109\/GLOCOM.2016.7841543"},{"key":"ref_142","doi-asserted-by":"crossref","first-page":"2579","DOI":"10.1109\/TII.2018.2791941","article-title":"Locating compromised data sources in IoT-enabled smart cities: A great-alternative-region-based approach","volume":"14","author":"Tao","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_143","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","article-title":"A survey of intrusion detection in Internet of Things","volume":"84","author":"Miani","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_144","doi-asserted-by":"crossref","unstructured":"Anju, J., and Sminesh, C. (2014, January 18\u201321). An improved clustering-based approach for wormhole attack detection in MANET. Proceedings of the 2014 3rd International Conference on Eco-Friendly Computing and Communication Systems, Mangalore, India.","DOI":"10.1109\/Eco-friendly.2014.105"},{"key":"ref_145","first-page":"102467","article-title":"Trust-aware and cooperative routing protocol for IoT security","volume":"52","author":"Djedjig","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1186\/s13638-019-1402-8","article-title":"Secure-MQTT: An efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things","volume":"2019","author":"Haripriya","year":"2019","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_147","first-page":"1","article-title":"ECC based inter-device authentication and authorization scheme using MQTT for IoT networks","volume":"46","author":"Lohachab","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_148","doi-asserted-by":"crossref","first-page":"2904","DOI":"10.1109\/JIOT.2017.2741580","article-title":"Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments","volume":"5","author":"Karati","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_149","doi-asserted-by":"crossref","first-page":"24694","DOI":"10.1109\/ACCESS.2018.2831284","article-title":"A DDoS attack detection and mitigation with software-defined Internet of Things framework","volume":"6","author":"Yin","year":"2018","journal-title":"IEEE Access"},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","article-title":"A survey on security and privacy issues in Internet-of-Things","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_151","first-page":"1","article-title":"Iot malware: Comprehensive survey, analysis framework and case studies","volume":"1","author":"Costin","year":"2018","journal-title":"BlackHat USA"},{"key":"ref_152","first-page":"215","article-title":"Secure my data or pay the price: Consumer remedy for the negligent enablement of data breach","volume":"4","author":"Fisher","year":"2012","journal-title":"Wm. Mary Bus. L. Rev."},{"key":"ref_153","unstructured":"Miao, D., Cai, Z., Li, J., Gao, X., and Liu, X. (2020). Complexity and efficient algorithms for data inconsistency evaluating and repairing. arXiv."},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"e4228","DOI":"10.1002\/dac.4228","article-title":"A lightweight IoT-based security framework for inventory automation using wireless sensor network","volume":"33","author":"Batra","year":"2020","journal-title":"Int. J. Commun. Syst."},{"key":"ref_155","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/LES.2017.2774800","article-title":"Securing hardware accelerators: A new challenge for high-level synthesis","volume":"10","author":"Pilato","year":"2017","journal-title":"IEEE Embed. Syst. Lett."},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"89337","DOI":"10.1109\/ACCESS.2020.2994079","article-title":"A novel attack detection scheme for the industrial internet of things using a lightweight random neural network","volume":"8","author":"Latif","year":"2020","journal-title":"IEEE Access"},{"key":"ref_157","doi-asserted-by":"crossref","first-page":"28019","DOI":"10.1109\/ACCESS.2018.2840504","article-title":"Efficient and privacy-preserving medical data sharing in Internet of Things with limited computing power","volume":"6","author":"Zheng","year":"2018","journal-title":"IEEE Access"},{"key":"ref_158","doi-asserted-by":"crossref","first-page":"54840","DOI":"10.1109\/ACCESS.2021.3071031","article-title":"Secure ABE scheme for access management in blockchain-based IoT","volume":"9","author":"Zhang","year":"2021","journal-title":"IEEE Access"},{"key":"ref_159","doi-asserted-by":"crossref","first-page":"3059","DOI":"10.1109\/JIOT.2018.2830340","article-title":"Privacy-preserving content-oriented wireless communication in internet-of-things","volume":"5","author":"Gai","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_160","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/JIOT.2018.2846299","article-title":"Lightweight and privacy-preserving two-factor authentication scheme for IoT devices","volume":"6","author":"Gope","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_161","doi-asserted-by":"crossref","first-page":"1844","DOI":"10.1109\/JIOT.2017.2707489","article-title":"A privacy preserving communication protocol for IoT applications in smart homes","volume":"4","author":"Song","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_162","doi-asserted-by":"crossref","unstructured":"Khan, P.W., and Byun, Y. (2020). A blockchain-based secure image encryption scheme for the industrial Internet of Things. Entropy, 22.","DOI":"10.3390\/e22020175"},{"key":"ref_163","doi-asserted-by":"crossref","first-page":"2690","DOI":"10.1109\/TII.2018.2799685","article-title":"5G enabled codesign of energy-efficient transmission and estimation for industrial IoT systems","volume":"14","author":"Lyu","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_164","doi-asserted-by":"crossref","first-page":"533","DOI":"10.4236\/jsea.2016.910036","article-title":"Blockchain platform for industrial internet of things","volume":"9","author":"Bahga","year":"2016","journal-title":"J. Softw. Eng. Appl."},{"key":"ref_165","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/JIOT.2014.2312291","article-title":"Research directions for the internet of things","volume":"1","author":"Stankovic","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_166","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MIE.2016.2618724","article-title":"Massive Internet of Things for industrial applications: Addressing wireless IIoT connectivity challenges and ecosystem fragmentation","volume":"11","author":"Mumtaz","year":"2017","journal-title":"IEEE Ind. Electron. Mag."},{"key":"ref_167","doi-asserted-by":"crossref","first-page":"e4948","DOI":"10.1002\/dac.4948","article-title":"Efficient data uncertainty management for health industrial internet of things using machine learning","volume":"34","author":"Haseeb","year":"2021","journal-title":"Int. J. Commun. Syst."},{"key":"ref_168","doi-asserted-by":"crossref","unstructured":"Astarloa, A., Bidarte, U., Jim\u00e9nez, J., Zuloaga, A., and L\u00e1zaro, J. (2016, January 24\u201327). Intelligent gateway for Industry 4.0-compliant production. Proceedings of the IECON 2016\u201442nd Annual Conference of the IEEE Industrial Electronics Society, Florence, Italy.","DOI":"10.1109\/IECON.2016.7793890"},{"key":"ref_169","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MC.2020.2996212","article-title":"Blockchain and fog computing for cyberphysical systems: The case of smart industry","volume":"53","author":"Bouachir","year":"2020","journal-title":"Computer"},{"key":"ref_170","doi-asserted-by":"crossref","first-page":"102685","DOI":"10.1016\/j.adhoc.2021.102685","article-title":"Role of machine learning and deep learning in securing 5G-driven industrial IoT applications","volume":"123","author":"Sharma","year":"2021","journal-title":"Ad Hoc Netw."},{"key":"ref_171","unstructured":"IBM (2023, October 20). What Is Industry 4.0?. Available online: https:\/\/www.ibm.com\/topics\/industry-4-0."},{"key":"ref_172","unstructured":"Intel (2023, October 20). Industrial IoT (IIOT) and Automation Technology. Available online: https:\/\/www.intel.com\/content\/www\/us\/en\/manufacturing\/manufacturing-industrial-overview.html."},{"key":"ref_173","unstructured":"Oracle (2023, March 02). Remote Monitoring & Maintenance: Mission Critical Operations at the Competitive Edge. Available online: https:\/\/www.oracle.com\/us\/solutions\/internetofthings\/iot-remote-monitoring-brief-2881653.pdf."},{"key":"ref_174","unstructured":"Oracle (2023, March 02). What Is IoT?. Available online: https:\/\/www.oracle.com\/internet-of-things\/what-is-iot\/."},{"key":"ref_175","unstructured":"Microsoft (2023, March 02). Microsoft and Nokia Collaborate to Accelerate Digital Transformation and Industry 4.0 for Communications Service Providers and Enterprises. Available online: https:\/\/news.microsoft.com\/2019\/11\/05\/microsoft-and-nokia-collaborate-to-accelerate-digital-transformation-and-industry-4-0-for-communications-service-providers-and-enterprises\/."},{"key":"ref_176","unstructured":"HQ Software (2023, March 22). Development and Industrial IoT Solutions. Available online: https:\/\/hqsoftwarelab.com\/solutions\/internet-of-things\/industrial-iot\/."},{"key":"ref_177","unstructured":"Cisco (2023, March 22). Industrial IoT Solutions for Digital Manufacturing. Available online: https:\/\/www.cisco.com\/c\/en\/us\/solutions\/internet-of-things\/iot-digital-manufacturing-solution.html."},{"key":"ref_178","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s11235-019-00557-9","article-title":"A survey on low-power wide area networks for IoT applications","volume":"71","author":"Bembe","year":"2019","journal-title":"Telecommun. Syst."},{"key":"ref_179","doi-asserted-by":"crossref","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","article-title":"Industrial internet of things: Challenges, opportunities, and directions","volume":"14","author":"Sisinni","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_180","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1109\/JSEN.2019.2939293","article-title":"Perovskite PV-powered RFID: Enabling low-cost self-powered IoT sensors","volume":"20","author":"Kantareddy","year":"2019","journal-title":"IEEE Sensors J."},{"key":"ref_181","doi-asserted-by":"crossref","first-page":"7225","DOI":"10.1109\/TII.2021.3067026","article-title":"Energy-efficient industrial internet of things: Overview and open issues","volume":"17","author":"Mao","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_182","doi-asserted-by":"crossref","first-page":"107198","DOI":"10.1016\/j.measurement.2019.107198","article-title":"Challenges and recommended technologies for the industrial internet of things: A comprehensive review","volume":"151","author":"Younan","year":"2020","journal-title":"Measurement"},{"key":"ref_183","doi-asserted-by":"crossref","first-page":"183665","DOI":"10.1109\/ACCESS.2020.3028764","article-title":"Privacy protection and energy optimization for 5G-aided industrial Internet of Things","volume":"8","author":"Humayun","year":"2020","journal-title":"IEEE Access"},{"key":"ref_184","doi-asserted-by":"crossref","unstructured":"del Campo, G., Calatrava, S., Ca\u00f1ada, G., Olloqui, J., Martinez, R., and Santamaria, A. (2018, January 4\u20137). IoT Solution for Energy Optimization in Industry 4.0: Issues of a Real-life Implementation. Proceedings of the 2018 Global Internet of Things Summit (GIoTS), Bilbao, Spain.","DOI":"10.1109\/GIOTS.2018.8534537"},{"key":"ref_185","doi-asserted-by":"crossref","first-page":"1375","DOI":"10.1109\/ACCESS.2016.2549047","article-title":"Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges","volume":"4","author":"Sajid","year":"2016","journal-title":"IEEE Access"},{"key":"ref_186","doi-asserted-by":"crossref","first-page":"2985","DOI":"10.1109\/TII.2020.3023507","article-title":"Challenges and opportunities in securing the industrial internet of things","volume":"17","author":"Serror","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_187","doi-asserted-by":"crossref","unstructured":"Stouffer, K., Falco, J., and Scarfone, K. (2008). Guide to Industrial Control Systems (ICS) Security, Technical Report.","DOI":"10.6028\/NIST.SP.800-82e2008"},{"key":"ref_188","doi-asserted-by":"crossref","unstructured":"Dolui, K., and Datta, S.K. (2017, January 6\u20139). Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. Proceedings of the 2017 Global Internet of Things Summit (GIoTS), Geneva, Switzerland.","DOI":"10.1109\/GIOTS.2017.8016213"},{"key":"ref_189","doi-asserted-by":"crossref","unstructured":"Shi, C., Ren, Z., Yang, K., Chen, C., Zhang, H., Xiao, Y., and Hou, X. (2018, January 15\u201318). Ultra-low latency cloud-fog computing for industrial internet of things. Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain.","DOI":"10.1109\/WCNC.2018.8377192"},{"key":"ref_190","doi-asserted-by":"crossref","first-page":"2759","DOI":"10.1109\/TPDS.2019.2926979","article-title":"Multi-hop cooperative computation offloading for industrial IoT\u2013edge\u2013cloud computing environments","volume":"30","author":"Hong","year":"2019","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_191","doi-asserted-by":"crossref","unstructured":"Pei-Breivold, H., and Sandstr\u00f6m, K. (2015, January 11\u201313). Internet of things for industrial automation-challenges and technical. Proceedings of the iThings 2015: The 8th IEEE International Conference on Internet of Things, Sydney, Australia.","DOI":"10.1109\/DSDIS.2015.11"},{"key":"ref_192","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/bs.adcom.2019.10.010","article-title":"Industry 4.0: Industrial internet of things (IIOT)","volume":"Volume 117","author":"Munirathinam","year":"2020","journal-title":"Advances in Computers"},{"key":"ref_193","doi-asserted-by":"crossref","unstructured":"Ghorpade, S., Zennaro, M., and Chaudhari, B. (2021). Survey of localization for internet of things nodes: Approaches, challenges and open issues. Future Internet, 13.","DOI":"10.3390\/fi13080210"},{"key":"ref_194","doi-asserted-by":"crossref","unstructured":"Saqlain, M., Piao, M., Shim, Y., and Lee, J.Y. (2019). Framework of an IoT-based industrial data management for smart manufacturing. J. Sens. Actuator Netw., 8.","DOI":"10.3390\/jsan8020025"},{"key":"ref_195","doi-asserted-by":"crossref","first-page":"2300","DOI":"10.1109\/JIOT.2020.3025916","article-title":"Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0","volume":"8","author":"Wu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_196","doi-asserted-by":"crossref","unstructured":"Iglesias-Urkia, M., Orive, A., Barcelo, M., Moran, A., Bilbao, J., and Urbieta, A. (2017, January 24\u201326). Towards a lightweight protocol for Industry 4.0: An implementation based benchmark. Proceedings of the 2017 IEEE International Workshop of Electronics, Control, Measurement, Signals and Their Application to Mechatronics (ECMSM), Donostia, Spain.","DOI":"10.1109\/ECMSM.2017.7945894"},{"key":"ref_197","doi-asserted-by":"crossref","first-page":"152351","DOI":"10.1109\/ACCESS.2020.3016937","article-title":"Security and privacy in the industrial internet of things: Current standards and future challenges","volume":"8","author":"Gebremichael","year":"2020","journal-title":"IEEE Access"},{"key":"ref_198","doi-asserted-by":"crossref","first-page":"1832","DOI":"10.1109\/TII.2016.2530404","article-title":"RESTful industrial communication with OPC UA","volume":"12","author":"Pfrommer","year":"2016","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_199","doi-asserted-by":"crossref","unstructured":"Ankele, R., Marksteiner, S., Nahrgang, K., and Vallant, H. (2019, January 26\u201329). Requirements and recommendations for IoT\/IIoT models to automate security assurance through threat modelling, security analysis and penetration testing. Proceedings of the 14th International Conference on Availability, Reliability and Security, Vienna, Austria.","DOI":"10.1145\/3339252.3341482"},{"key":"ref_200","doi-asserted-by":"crossref","first-page":"7009","DOI":"10.1109\/TII.2020.2998086","article-title":"Privacy preserving high-order bi-lanczos in cloud-fog computing for industrial applications","volume":"18","author":"Feng","year":"2020","journal-title":"IEEE Trans. Ind. Inform."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/21\/8958\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:16:38Z","timestamp":1760130998000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/21\/8958"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,3]]},"references-count":200,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2023,11]]}},"alternative-id":["s23218958"],"URL":"https:\/\/doi.org\/10.3390\/s23218958","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,3]]}}}