{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T15:09:36Z","timestamp":1767625776213,"version":"build-2065373602"},"reference-count":76,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Fundos Europeus Estruturais e de Investimento (FEEI)","award":["(POCI)\/PORTUGAL 2020","UIDB\/50008\/2020"],"award-info":[{"award-number":["(POCI)\/PORTUGAL 2020","UIDB\/50008\/2020"]}]},{"DOI":"10.13039\/501100001871","name":"FCT\/MEC","doi-asserted-by":"publisher","award":["(POCI)\/PORTUGAL 2020","UIDB\/50008\/2020"],"award-info":[{"award-number":["(POCI)\/PORTUGAL 2020","UIDB\/50008\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronics"],"abstract":"<jats:p>The advance of industrialization regarding the optimization of production to obtain greater productivity and consequently generate more profits has led to the emergence of Industry 4.0, which aims to create an environment called smart manufacturing. On the other hand, the Internet of Things is a global network of interrelated physical devices, such as sensors, actuators, intelligent applications, computers, mechanical machines, objects, and people, becoming an essential part of the Internet. These devices are data sources that provide abundant information on manufacturing processes in an industrial environment. A concern of this type of system is processing large sets of data and generating knowledge. These challenges often raise concerns about security, more specifically cybersecurity. Good cybersecurity practices make it possible to avoid damage to production lines and information. With the growing increase in threats in terms of security, this paper aims to carry out a review of existing technologies about cybersecurity in intelligent manufacturing and an introduction to the architecture of the IoT and smart manufacturing.<\/jats:p>","DOI":"10.3390\/electronics11111742","type":"journal-article","created":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:25:12Z","timestamp":1653956712000},"page":"1742","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["A Brief Review on Internet of Things, Industry 4.0 and Cybersecurity"],"prefix":"10.3390","volume":"11","author":[{"given":"Roman","family":"Rudenko","sequence":"first","affiliation":[{"name":"Institute for Systems and Computer Engineering, Technology and Science (INESC TEC), University of Tr\u00e1s-os-Montes e Alto Douro, Quinta de Prados, 5001-801 Vila Real, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3394-6762","authenticated-orcid":false,"given":"Ivan Miguel","family":"Pires","sequence":"additional","affiliation":[{"name":"Escola de Ci\u00eancias e Tecnologia, University of Tr\u00e1s-os-Montes e Alto Douro, Quinta de Prados, 5001-801 Vila Real, Portugal"},{"name":"Instituto de Telecomunica\u00e7\u00f5es, Universidade da Beira Interior, 6200-001 Covilh\u00e3, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2737-8479","authenticated-orcid":false,"given":"Paula","family":"Oliveira","sequence":"additional","affiliation":[{"name":"Escola de Ci\u00eancias e Tecnologia, University of Tr\u00e1s-os-Montes e Alto Douro, Quinta de Prados, 5001-801 Vila Real, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4847-5104","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Barroso","sequence":"additional","affiliation":[{"name":"Institute for Systems and Computer Engineering, Technology and Science (INESC TEC), University of Tr\u00e1s-os-Montes e Alto Douro, Quinta de Prados, 5001-801 Vila Real, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9818-7090","authenticated-orcid":false,"given":"Ars\u00e9nio","family":"Reis","sequence":"additional","affiliation":[{"name":"Institute for Systems and Computer Engineering, Technology and Science (INESC TEC), University of Tr\u00e1s-os-Montes e Alto Douro, Quinta de Prados, 5001-801 Vila Real, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Nwakanma, C., Islam, F., Maharani, M., Lee, J.-M., and Kim, D.-S. (2021). Detection and Classification of Human Activity for Emergency Response in Smart Factory Shop Floor. Appl. Sci., 11.","key":"ref_1","DOI":"10.3390\/app11083662"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"103165","DOI":"10.1016\/j.compind.2019.103165","article-title":"Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts","volume":"114","author":"Corallo","year":"2020","journal-title":"Comput. Ind."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MPEL.2017.2761422","article-title":"Cybersecurity and Power Electronics: Addressing the Security Vulnerabilities of the Internet of Things","volume":"4","author":"Balda","year":"2017","journal-title":"IEEE Power Electron. Mag."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","article-title":"Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications","volume":"17","author":"Guizani","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"doi-asserted-by":"crossref","unstructured":"Shrouf, F., Ordieres, J., and Miragliotta, G. (2014, January 9\u201312). Smart factories in Industry 4.0: A review of the concept and of energy management approached in production based on the Internet of Things paradigm. Proceedings of the 2014 IEEE International Conference on Industrial Engineering and Engineering Management, Selangor Darul Ehsan, Malaysia.","key":"ref_5","DOI":"10.1109\/IEEM.2014.7058728"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.jmsy.2018.04.007","article-title":"Security of smart manufacturing systems","volume":"47","author":"Tuptuk","year":"2018","journal-title":"J. Manuf. Syst."},{"doi-asserted-by":"crossref","unstructured":"Angelopoulos, A., Michailidis, E.T., Nomikos, N., Trakadas, P., Hatziefremidis, A., Voliotis, S., and Zahariadis, T. (2020). Tackling Faults in the Industry 4.0 Era\u2014A Survey of Machine-Learning Solutions and Key Aspects. Sensors, 20.","key":"ref_7","DOI":"10.3390\/s20010109"},{"key":"ref_8","first-page":"55","article-title":"Comparision of snowball sampling and sequential sampling technique","volume":"3","author":"Etikan","year":"2016","journal-title":"Biom. Biostat. Int. J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"n71","DOI":"10.1136\/bmj.n71","article-title":"The PRISMA 2020 statement: An updated guideline for reporting systematic reviews","volume":"372","author":"Page","year":"2021","journal-title":"BMJ"},{"key":"ref_10","first-page":"100190","article-title":"A blockchain-based architecture for secure and trustworthy operations in the industrial Internet of Things","volume":"21","author":"Latif","year":"2021","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.jmsy.2020.05.014","article-title":"A physical hash for preventing and detecting cyber-physical attacks in additive manufacturing systems","volume":"56","author":"Brandman","year":"2020","journal-title":"J. Manuf. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"103050","DOI":"10.1016\/j.jnca.2021.103050","article-title":"Blockchain based solutions to secure IoT: Background, integration trends and a way forward","volume":"181","author":"Saxena","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"55595","DOI":"10.1109\/ACCESS.2021.3071766","article-title":"A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things","volume":"9","author":"Huma","year":"2021","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"89337","DOI":"10.1109\/ACCESS.2020.2994079","article-title":"A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network","volume":"8","author":"Latif","year":"2020","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"23235","DOI":"10.1109\/ACCESS.2021.3056650","article-title":"A Review of Cybersecurity Guidelines for Manufacturing Factories in Industry 4.0","volume":"9","author":"Mullet","year":"2021","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1109\/TDSC.2018.2857811","article-title":"Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things","volume":"17","author":"Srinivas","year":"2018","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"96899","DOI":"10.1109\/ACCESS.2020.2995887","article-title":"Dynamic Analysis for IoT Malware Detection with Convolution Neural Network Model","volume":"8","author":"Jeon","year":"2020","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"115429","DOI":"10.1109\/ACCESS.2021.3105297","article-title":"Experimental Setup for Online Fault Diagnosis of Induction Machines via Promising IoT and Machine Learning: Towards Industry 4.0 Empowerment","volume":"9","author":"Tran","year":"2021","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2103","DOI":"10.1109\/JIOT.2018.2869847","article-title":"Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics","volume":"6","author":"Lu","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","article-title":"IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices","volume":"6","author":"Meneghello","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"151054","DOI":"10.1109\/ACCESS.2019.2947723","article-title":"Review on Security of Internet of Things Authentication Mechanism","volume":"7","author":"Nandy","year":"2019","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Khoa, T.V., Saputra, Y.M., Hoang, D.T., Trung, N.L., Nguyen, D., Ha, N.V., and Dutkiewicz, E. (2020, January 25\u201328). Collaborative Learning Model for Cyberattack Detection Systems in IoT Industry 4.0. Proceedings of the 2020 IEEE Wireless Communications and Networking Conference (WCNC), Seoul, Korea.","key":"ref_22","DOI":"10.1109\/WCNC45663.2020.9120761"},{"key":"ref_23","first-page":"387","article-title":"A reliable next generation cyber security architecture for industrial internet of things environment","volume":"10","author":"Vijayakumaran","year":"2020","journal-title":"Int. J. Electr. Comput. Eng."},{"doi-asserted-by":"crossref","unstructured":"AbuEmera, E.A., ElZouka, H.A., and Saad, A.A. (2022, January 14\u201316). Security Framework for Identifying threats in Smart Manufacturing Systems Using STRIDE Approach. Proceedings of the 2022 2nd International Conference on Consumer Electronics and Computer Engineering (ICCECE), Guangzhou, China.","key":"ref_24","DOI":"10.1109\/ICCECE54139.2022.9712770"},{"doi-asserted-by":"crossref","unstructured":"Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L.F., and Abdulkadir, S.J. (2022). Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics, 11.","key":"ref_25","DOI":"10.3390\/electronics11020198"},{"key":"ref_26","first-page":"7704","article-title":"Deep-IFS: Intrusion Detection Approach for Industrial Internet of Things Traffic in Fog Environment","volume":"17","author":"Chang","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"107734","DOI":"10.1016\/j.compeleceng.2022.107734","article-title":"Digital payment fraud detection methods in digital ages and Industry 4.0","volume":"100","author":"Chang","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1109\/TSMC.2020.3040789","article-title":"Blockchain-Secured Smart Manufacturing in Industry 4.0: A Survey","volume":"51","author":"Leng","year":"2020","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"doi-asserted-by":"crossref","unstructured":"Dhirani, L.L., Armstrong, E., and Newe, T. (2021). Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap. Sensors, 21.","key":"ref_29","DOI":"10.3390\/s21113901"},{"doi-asserted-by":"crossref","unstructured":"Shah, Y., and Sengupta, S. (2020, January 28\u201331). A survey on Classification of Cyber-attacks on IoT and IIoT devices. Proceedings of the 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA.","key":"ref_30","DOI":"10.1109\/UEMCON51285.2020.9298138"},{"doi-asserted-by":"crossref","unstructured":"ElMamy, S., Mrabet, H., Gharbi, H., Jemai, A., and Trentesaux, D. (2020). A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0. Sustainability, 12.","key":"ref_31","DOI":"10.3390\/su12219179"},{"doi-asserted-by":"crossref","unstructured":"lhan, \u0130., and Karak\u00f6se, M. (2019, January 21\u201322). Requirement Analysis for Cybersecurity Solutions in Industry 4.0 Platforms. Proceedings of the 2019 International Artificial Intelligence and Data Processing Symposium (IDAP), Malatya, Turkey.","key":"ref_32","DOI":"10.1109\/IDAP.2019.8875930"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"4506","DOI":"10.1007\/s11227-017-2219-z","article-title":"Design and implementation of cybersecurity testbed for industrial IoT systems","volume":"74","author":"Lee","year":"2018","journal-title":"J. Supercomput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1016\/j.promfg.2017.09.047","article-title":"Network and information security challenges within Industry 4.0 paradigm","volume":"13","author":"Pereira","year":"2017","journal-title":"Procedia Manuf."},{"doi-asserted-by":"crossref","unstructured":"Mozzaquatro, B.A., Agostinho, C., Goncalves, D., Martins, J., and Jardim-Goncalves, R. (2018). An Ontology-Based Cybersecurity Framework for the Internet of Things. Sensors, 18.","key":"ref_35","DOI":"10.3390\/s18093053"},{"doi-asserted-by":"crossref","unstructured":"Bovenzi, G., Aceto, G., Ciuonzo, D., Persico, V., and Pescap\u00e9, A. (2020, January 7\u201311). A hierarchical hybrid intrusion detection approach in IoT scenarios. Proceedings of the GLOBECOM 2020\u20142020 IEEE Global Communications Conference, Taipei, Taiwan.","key":"ref_36","DOI":"10.1109\/GLOBECOM42002.2020.9348167"},{"doi-asserted-by":"crossref","unstructured":"Nascita, A., Cerasuolo, F., Di Monda, D., Garcia, J.T.A., Montieri, A., and Pescape, A. (2022, January 2\u20135). Machine and Deep Learning Approaches for IoT Attack Classification. Proceedings of the 2022 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Virtual.","key":"ref_37","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9797971"},{"key":"ref_38","first-page":"111","article-title":"Industry 4.0 conception","volume":"10","year":"2017","journal-title":"Acta Tech. Corviniensis-Bull. Eng."},{"doi-asserted-by":"crossref","unstructured":"Hermann, M., Pentek, T., and Otto, B. (2016, January 5\u20138). Design principles for industrie 4.0 scenarios. Proceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS), Koloa, HI, USA.","key":"ref_39","DOI":"10.1109\/HICSS.2016.488"},{"key":"ref_40","first-page":"90","article-title":"Smart factories in the age of Industry 4.0","volume":"28","author":"Grabowska","year":"2020","journal-title":"Manag. Syst. Prod. Eng."},{"unstructured":"Wheeler, K. (2019, November 12). How a \u2018Segment of One\u2019 Approach Can Help Businesses Connect with Their Customers. Available online: https:\/\/www.fourthsource.com\/general\/how-a-segmentof-one-approach-can-help-businesses-connect-with-theircustomers-23392.","key":"ref_41"},{"key":"ref_42","first-page":"138","article-title":"Have your objects call my objects","volume":"80","author":"Ferguson","year":"2002","journal-title":"Harv. Bus. Rev."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"164","DOI":"10.4236\/jcc.2015.35021","article-title":"Internet of Things (IoT): A literature review","volume":"3","author":"Madakam","year":"2015","journal-title":"J. Comput. Commun."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"4","DOI":"10.37335\/ijek.v7i1.84","article-title":"Internet of things in the context of industry 4.0: An overview","volume":"7","author":"Georgios","year":"2019","journal-title":"Int. J. Entrep. Knowl."},{"doi-asserted-by":"crossref","unstructured":"Mahmoud, R., Yousuf, T., Aloul, F., and Zualkernan, I. (2015, January 14\u201316). Internet of things (IoT) security: Current status, challenges and prospective measures. Proceedings of the 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK.","key":"ref_45","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"3594","DOI":"10.1016\/j.comnet.2012.07.010","article-title":"The social internet of things (siot)\u2014When social networks meet the internet of things: Concept, architecture and network characterization","volume":"56","author":"Atzori","year":"2012","journal-title":"Comput. Netw."},{"doi-asserted-by":"crossref","unstructured":"Leo, M., Battisti, F., Carli, M., and Neri, A. (2014, January 12\u201315). A federated architecture approach for Internet of Things security. Proceedings of the 2014 Euro Med Telco Conference (EMTC), Naples, Italy.","key":"ref_47","DOI":"10.1109\/EMTC.2014.6996632"},{"doi-asserted-by":"crossref","unstructured":"Zhao, K., and Ge, L. (2013, January 14\u201315). A survey on the internet of things security. Proceedings of the 2013 Ninth International Conference on Computational Intelligence and Security, Emeishan, Chinay.","key":"ref_48","DOI":"10.1109\/CIS.2013.145"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"983","DOI":"10.1007\/s12083-016-0456-1","article-title":"The IoT electric business model: Using blockchain technology for the internet of things","volume":"10","author":"Zhang","year":"2017","journal-title":"Peer-to-Peer Netw. Appl."},{"doi-asserted-by":"crossref","unstructured":"Deogirikar, J., and Vidhate, A. (Cloud), January Analytics). Security attacks in IoT: A survey. Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 10\u201311 February 2017.","key":"ref_50","DOI":"10.1109\/I-SMAC.2017.8058363"},{"doi-asserted-by":"crossref","unstructured":"El-Hajj, M., Fadlallah, A., Chamoun, M., and Serhrouchni, A. (2019). A Survey of Internet of Things (IoT) Authentication Schemes. Sensors, 19.","key":"ref_51","DOI":"10.3390\/s19051141"},{"doi-asserted-by":"crossref","unstructured":"Kumar, S., Sahoo, S., Mahapatra, A., Swain, A.K., and Mahapatra, K.K. (2017, January 18\u201320). Security enhancements to system on chip devices for IoT perception layer. Proceedings of the 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), Bhopal, India.","key":"ref_52","DOI":"10.1109\/iNIS.2017.39"},{"unstructured":"Yang, Z., Yue, Y., Yang, Y., Peng, Y., Wang, X., and Liu, W. (2011, January 26\u201328). Study and application on the architecture and key technologies for IOT. Proceedings of the 2011 International Conference on Multimedia Technology, Hangzhou, China.","key":"ref_53"},{"doi-asserted-by":"crossref","unstructured":"Santos, L., Rabadao, C., and Gon\u00e7alves, R. (2018, January 13\u201316). Intrusion detection systems in Internet of Things: A literature review. Proceedings of the 2018 13th Iberian Conference on Information Systems and Technologies (CISTI), Caceres, Spain.","key":"ref_54","DOI":"10.23919\/CISTI.2018.8399291"},{"doi-asserted-by":"crossref","unstructured":"Nastase, L. (2017, January 29\u201331). Security in the internet of things: A survey on application layer protocols. Proceedings of the 2017 21st International Conference on Control Systems and Computer Science (CSCS), Bucharest, Romania.","key":"ref_55","DOI":"10.1109\/CSCS.2017.101"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"11","DOI":"10.4236\/jcc.2020.84002","article-title":"An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions","volume":"8","author":"Islam","year":"2020","journal-title":"J. Comput. Commun."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/S1353-4858(19)30011-X","article-title":"Solving the security challenges of IoT with public key cryptography","volume":"2019","author":"Hodgson","year":"2019","journal-title":"Netw. Secur."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","article-title":"The Elliptic Curve Digital Signature Algorithm (ECDSA)","volume":"1","author":"Johnson","year":"2001","journal-title":"Int. J. Inf. Secur."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","article-title":"Current research on Internet of Things (IoT) security: A survey","volume":"148","author":"Noor","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"121","DOI":"10.4236\/jcc.2017.51010","article-title":"A Review of Security Concerns in Internet of Things","volume":"5","author":"Leloglu","year":"2016","journal-title":"J. Comput. Commun."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1007\/s10845-017-1315-5","article-title":"Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods","volume":"30","author":"Wu","year":"2019","journal-title":"J. Intell. Manuf."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"6828","DOI":"10.1109\/JIOT.2020.2988126","article-title":"iTLS: Lightweight Transport-Layer Security Protocol for IoT with Minimal Latency and Perfect Forward Secrecy","volume":"7","author":"Li","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s41635-017-0029-7","article-title":"Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice","volume":"2","author":"Chen","year":"2018","journal-title":"J. Hardw. Syst. Secur."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/COMST.2019.2953364","article-title":"Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures","volume":"22","author":"Butun","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/BF00196791","article-title":"How to time-stamp a digital document","volume":"3","author":"Haber","year":"1991","journal-title":"J. Cryptol."},{"unstructured":"Nakamoto, S., and Bitcoin, A. (2022, May 14). A Peer-to-Peer Electronic Cash System. Bitcoin. Available online: https:\/\/bitcoin.org\/bitcoin.pdf.","key":"ref_66"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"1366","DOI":"10.1109\/TKDE.2017.2781227","article-title":"Untangling Blockchain: A Data Processing View of Blockchain Systems","volume":"30","author":"Dinh","year":"2018","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Rathi, R., Sharma, N., Manchanda, C., Bhushan, B., and Grover, M. (2020, January 10\u201312). Security challenges & controls in cyber physical system. Proceedings of the 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), Gwalior, India.","key":"ref_68","DOI":"10.1109\/CSNT48778.2020.9115778"},{"doi-asserted-by":"crossref","unstructured":"Halpin, H., and Piekarska, M. (2017, January 26\u201328). Introduction to Security and Privacy on the Blockchain. Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Paris, France.","key":"ref_69","DOI":"10.1109\/EuroSPW.2017.43"},{"doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., and Wang, H. (2017, January 25\u201330). An overview of blockchain technology: Architecture, consensus, and future trends. Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA.","key":"ref_70","DOI":"10.1109\/BigDataCongress.2017.85"},{"doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., and Gauravaram, P. (2017, January 13\u201317). Blockchain for IoT security and privacy: The case study of a smart home. Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, USA.","key":"ref_71","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1109\/TDSC.2016.2616861","article-title":"Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams","volume":"15","author":"Aitzhan","year":"2016","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"533","DOI":"10.4236\/jsea.2016.910036","article-title":"Blockchain Platform for Industrial Internet of Things","volume":"9","author":"Bahga","year":"2016","journal-title":"J. Softw. Eng. Appl."},{"doi-asserted-by":"crossref","unstructured":"Zhang, X.-D. (2020). Machine Learning, in a Matrix Algebra Approach to Artificial Intelligence, Springer.","key":"ref_74","DOI":"10.1007\/978-981-15-2770-8"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","article-title":"A survey of data mining and machine learning methods for cyber security intrusion detection","volume":"18","author":"Buczak","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"1686","DOI":"10.1109\/COMST.2020.2986444","article-title":"Machine Learning in IoT Security: Current Solutions and Future Challenges","volume":"22","author":"Hussain","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Electronics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-9292\/11\/11\/1742\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:22:17Z","timestamp":1760138537000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-9292\/11\/11\/1742"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":76,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2022,6]]}},"alternative-id":["electronics11111742"],"URL":"https:\/\/doi.org\/10.3390\/electronics11111742","relation":{},"ISSN":["2079-9292"],"issn-type":[{"type":"electronic","value":"2079-9292"}],"subject":[],"published":{"date-parts":[[2022,5,30]]}}}