Security and Privacy in 5G-IIoT Smart Factories: Novel Approaches, Trends, and Challenges
Mobile Networks and Applications - Trang 1-16 - 2023
Tóm tắt
To implement various artificial intelligence and automation applications in smart factories, edge computing and industrial Internet of Things (IIoT) devices must be widely deployed, so as to increase the demand of coping with huge-scale and high-diversity data. Through deployment of fifth-generation (5G) networks (providing wide broadband, low latency, and massive machine type communications), industrial wireless networks, cloud, and fixed/mobile end devices in smart factories are interoperated in a harmony. However, with the huge-scale deployment of 5G networks and the IIoT in smart factories, threats and attacks against various vulnerabilities increase enormously, and cause considerable security and privacy challenges. Consequently, this article investigates crucial security and privacy issues for 5G-IIoT smart factories in three entities (i.e., physical layer, data layer and application layer), and further surveys recent approaches based on deep learning, reinforcement learning, and blockchain. In addition, this article provides future perspectives and challenges along this line of research.
Tài liệu tham khảo
Lien SY, Hung SC, Deng DJ, Wang YJ (2018) Optimum ultra-reliable and low latency communications in 5G new radio. Mob Networks Appl 23(4):1020–1027
Sisinni E, Saifullah A, Han S, Jennehag U, Gidlund M (2018) Industrial internet of things: challenges, opportunities, and directions. IEEE Trans Industr Inf 14(11):4724–4734
Gebremichael T, Ledwaba LP, Eldefrawy MH, Hancke GP, Pereira N, Gidlund M, Akerberg J (2020) Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access 8:152351–152366
Vitturi S, Zunino C, Sauter T (2019) Industrial communication systems and their future challenges: next-generation ethernet, IIoT, and 5G. Proc IEEE 107(6):944–961
Tange K, De Donno M, Fafoutis X, Dragoni N (2020) A systematic survey of industrial internet of things security: requirements and fog computing opportunities. IEEE Commun Surv Tutorials 22(4):2489–2520
Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl 88:10–28
Ogonji MM, Okeyo G, Wafula JM (2020) A survey on privacy and security of internet of things. Comput Sci Rev 38:100312
Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 141:199–221
Xu H, Yu W, Griffith D, Golmie N (2018) A survey on industrial internet of things: a cyber-physical systems perspective. IEEE Access 6:78238–78259
Al-Naji FH, Zagrouba R (2020) A survey on continuous authentication methods in internet of things environment. Comput Commun 163:109–133
Fang H, Qi A, Wang X (2020) Fast authentication and progressive authorization in large-scale IoT: how to leverage AI for security enhancement. IEEE Network 34(3):24–29
Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2018) Smart contract-based access control for the internet of things. IEEE Internet Things J 6(2):1594–1605
Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J Netw Comput Appl 149:102481
Amiri-Zarandi M, Dara RA, Fraser E (2020) A survey of machine learning-based solutions to protect privacy in the internet of things. Comput Secur 96:101921
Eugster P, Kumar S, Savvides S, Stephen JJ (2019) Ensuring confidentiality in the cloud of things. IEEE Pervasive Comput 18(1):10–18
Chen YJ, Wang LC, Wang S (2018) Stochastic blockchain for IoT data integrity. IEEE Trans Netw Sci Eng 7(1):373–384
Xiong J, Ren J, Chen L, Yao Z, Lin M, Wu D, Niu B (2018) Enhancing privacy and availability for data clustering in intelligent electrical service of IoT. IEEE Internet Things J 6(2):1530–1540
Li S, Da Xu L, Zhao S (2018) 5G internet of things: a survey. J Industr Inform Integr 10:1–9
Wollschlaeger M, Sauter T, Jasperneite J (2017) The future of industrial communication: automation networks in the era of the internet of things and industry 4.0. IEEE Ind Electron Mag 11(1):17–27
Chettri L, Bera R (2019) A comprehensive survey on internet of things (IoT) toward 5G wireless systems. IEEE Internet Things J 7(1):16–32
Vo NS, Duong TQ, Guizani M, Kortun A (2018) 5G optimized caching and downlink resource sharing for smart cities. IEEE Access 6:31457–31468
Tang Y, Dananjayan S, Hou C, Guo Q, Luo S, He Y (2021) A survey on the 5G network and its impact on agriculture: challenges and opportunities. Comput Electron Agric 180:105895
Selem E, Fatehy M, Abd El-Kader SM (2019) E-Health applications over 5G networks: challenges and state of the art. In: Proc. of 2019 6th International Conference on Advanced Control Circuits and Systems (ACCS) & 2019 5th International Conference on New Paradigms in Electronics & information Technology (PEIT):111–118
Rao SK, Prasad R (2018) Impact of 5G technologies on industry 4.0. Wireless Pers Commun 100(1):145–159
Bera B, Saha S, Das AK, Kumar N, Lorenz P, Alazab M (2020) Blockchain-envisioned secure data delivery and collection scheme for 5G-based IoT-enabled internet of drones environment. IEEE Trans Veh Technol 69(8):9097–9111
Oyekanlu EA, Smith AC, Thomas WP, Mulroy G, Hitesh D, Ramsey M, Sun D (2020) A review of recent advances in automated guided vehicle technologies: integration challenges and research areas for 5G-based smart manufacturing applications. IEEE Access 8:202312–202353
Ordonez-Lucena J, Chavarria JF, Contreras LM, Pastor A (2019) The use of 5G non-public networks to support Industry 4.0 scenarios. In: Proc. of 2019 IEEE Conference on Standards for Communications and Networking (CSCN):1–7
Khan R, Kumar P, Jayakody DNK, Liyanage M (2019) A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions. IEEE Commun Surv Tutorials 22(1):196–248
Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2018) Overview of 5G security challenges and solutions. IEEE Commun Stand Mag 2(1):36–43
Sicari S, Rizzardi A, Coen-Porisini A (2020) 5G in the internet of things era: an overview on security and privacy challenges. Comput Netw 179:107345
Deng DJ, Chen KC, Cheng RS (2014) IEEE 802.11 ax: next generation wireless local area networks. In: Proc. of IEEE 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness:77–82
Deng DJ, Gan M, Guo YC, Yu J, Lin YP, Lien SY, Chen KC (2019) IEEE 802.11ba: low-power wake-up radio for green IoT. IEEE Commun Mag 57(7):106–112
Deng J, Chang RS (1999) A priority scheme for IEEE 802. 11 DCF access method. IEICE Trans Commun 82(1):96–102
Pham TN, Tsai MF, Nguyen DB, Dow CR, Deng DJ (2015) A cloud-based smart-parking system based on internet-of-things technologies. IEEE Access 3:1581–1591
Lien SY, Deng DJ, Lin CC, Tsai HL, Chen T, Guo C, Cheng SM (2020) 3GPP NR sidelink transmissions toward 5G V2X. IEEE Access 8:35368–35382
Deng DJ, Lin YP, Yang X, Zhu J, Li YB, Luo J, Chen KC (2017) IEEE 802.11ax: highly efficient WLANs for intelligent information infrastructure. IEEE Commun Mag 55(12):52–59
Deng DJ, Lien SY, Lee J, Chen KC (2016) On quality-of-service provisioning in IEEE 802.11 ax WLANs. IEEE Access 4:6086–6104
Wang K, Qi X, Shu L, Deng DJ, Rodrigues JJPC (2016) Toward trustworthy crowdsourcing in the social internet of things. IEEE Wirel Commun 23(5):30–36
Gope P, Sikdar B (2018) Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J 6(1):580–589
Gope P, Das AK, Kumar N, Cheng Y (2019) Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans Industr Inf 15(9):4957–4968
Gu Z, Chen H, Xu P, Li Y, Vucetic B (2020) Physical layer authentication for non-coherent massive SIMO-enabled industrial IoT communications. IEEE Trans Inf Forensics Secur 15:3722–3733
Jangirala S, Das AK, Vasilakos AV (2019) Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment. IEEE Trans Industr Inf 16(11):7081–7093
Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J Sel Areas Commun 38(5):942–954
Pan F, Pang Z, Wen H, Luvisotto M, Xiao M, Liao RF, Chen J (2019) Threshold-free physical layer authentication based on machine learning for industrial wireless CPS. IEEE Trans Industr Inf 15(12):6481–6491
Chen S, Pang Z, Wen H, Yu K, Zhang T, Lu Y (2020) Automated labeling and learning for physical layer authentication against clone node and sybil attacks in industrial wireless edge networks. IEEE Trans Industr Inf 17(3):2041–2051
Han T, Liu C, Wu L, Sarkar S, Jiang D (2019) An adaptive spatiotemporal feature learning approach for fault diagnosis in complex systems. Mech Syst Signal Process 117:170–187
Ma S, Chu F (2019) Ensemble deep learning-based fault diagnosis of rotor bearing systems. Comput Ind 105:143–152
Wang Y, Pan Z, Yuan X, Yang C, Gui W (2020) A novel deep learning based fault diagnosis approach for chemical process with extended deep belief network. ISA Trans 96:457–467
Xu Y, Sun Y, Liu X, Zheng Y (2019) A digital-twin-assisted fault diagnosis using deep transfer learning. IEEE Access 7:19990–19999
Naik B, Obaidat MS, Nayak J, Pelusi D, Vijayakumar P, Islam SH (2019) Intelligent secure ecosystem based on Metaheuristic and functional link neural network for edge of things. IEEE Trans Industr Inf 16(3):1947–1956
Tian Z, Luo C, Qiu J, Du X, Guizani M (2019) A distributed deep learning system for web attack detection on edge devices. IEEE Trans Industr Inf 16(3):1963–1971
Tian Z, Shi W, Wang Y, Zhu C, Du X, Su S, Guizani N (2019) Real-time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans Industr Inf 15(7):4285–4294
Yang C, Shi Z, Zhang H, Wu J, Shi X (2019) Multiple attacks detection in cyber-physical systems using random finite set theory. IEEE Trans Cybernetics 50(9):4066–4075
Krithivasan K, Pravinraj S, VS SS (2020) Detection of cyberattacks in industrial control systems using enhanced principal component analysis and hypergraph-based convolution neural network (EPCA-HG-CNN). IEEE Trans Ind Appl 56(4):4394–4404
Hu Y, Li H, Luan TH, Yang A, Sun L, Wang Z, Wang R (2020) Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. Future Gener Comput Syst 108:1230–1240
Wang K, Zhou Y, Liu Z, Shao Z, Luo X, Yang Y (2020) Online task scheduling and resource allocation for intelligent NOMA-based industrial internet of things. IEEE J Sel Areas Commun 38(5):803–815
Jie Y, Guo C, Choo KKR, Liu CZ, Li M (2020) Game-theoretic resource allocation for fog-based industrial internet of things environment. IEEE Internet Things J 7(4):3041–3052
Wu H, Tian H, Fan S, Ren J (2020) Data age aware scheduling for wireless powered mobile-edge computing in industrial internet of things. IEEE Trans Industr Inf 17(1):398–408
Li X, Wan J, Dai HN, Imran M, Xia M, Celesti A (2019) A hybrid computing solution and resource scheduling strategy for edge computing in smart manufacturing. IEEE Trans Industr Inf 5(7):4225–4234
Deng S, Xiang Z, Zhao P, Taheri J, Gao H, Yin J, Zomaya AY (2020) Dynamical resource allocation in edge for trustable internet-of-things systems: a reinforcement learning method. IEEE Trans Industr Inf 16(9):6103–6113
Zhang G, Chen Y, Shen Z, Wang L (2018) Distributed energy management for multiuser mobile-edge computing systems with energy harvesting devices and QoS constraints. IEEE Internet Things J 6(3):4035–4048
Wang J, Jiang C, Zhang K, Hou X, Ren Y, Qian Y (2019) Distributed Q-learning aided heterogeneous network association for energy-efficient IIoT. IEEE Trans Industr Inf 16(4):2756–2764
Wan J, Yang J, Wang S, Li D, Li P, Xia M (2019) Cross-network fusion and scheduling for heterogeneous networks in smart factory. IEEE Trans Industr Inf 16(9):6059–6068
Wang X, Chai L, Zhou Y, Dan F (2021) Dual-network task scheduling in cyber-physical systems: a co-optimization approach. IEEE Trans Industr Inf 17(5):3143–3152
Huang V, Chen G, Zhang P, Li H, Hu C, Pan T, Fu Q (2020) A scalable approach to SDN control plane management: high utilization comes with low latency. IEEE Trans Netw Serv Manage 17(2):682–695
Li J, Shi W, Zhang N, Shen X (2021) Delay-aware VNF scheduling: a reinforcement learning approach with variable action set. IEEE Trans Cogn Commun Netw 7(1):304–318
Messaoud S, Bradai A, Moulay E (2019) Online GMM clustering and mini-batch gradient descent based optimization for industrial IoT 4.0. IEEE Trans Industr Inf 16(2):1427–1435
Xiang H, Yan S, Peng M (2020) A realization of fog-RAN slicing via deep reinforcement learning. IEEE Trans Wireless Commun 19(4):2515–2527
Qu K, Zhuang W, Ye Q, Shen X, Li X, Rao J (2020) Dynamic flow migration for embedded services in SDN/NFV-enabled 5G core networks. IEEE Trans Commun 68(4):2394–2408
Estrada-Solano F, Caicedo OM, Da Fonseca NL (2019) Nelly: flow detection using incremental learning at the server side of SDN-based data centers. IEEE Trans Industr Inf 16(2):1362–1372
Ravi N, Shalinie SM (2020) Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J 7(4):3559–3570
Fang L, Zhao B, Li Y, Liu Z, Ge C, Meng W (2020) Countermeasure based on smart contracts and AI against DoS/DDoS attack in 5G circumstances. IEEE Network 34(6):54–61
Hassan MM, Gumaei A, Huda S, Almogren A (2020) Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model. IEEE Trans Industr Inf 16(9):6154–6162
Saharkhizan M, Azmoodeh A, Dehghantanha A, Choo KKR, Parizi RM (2020) An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet Things J 7(9):8852–8859
Maimó LF, Celdrán AH, Pérez MG, Clemente FJG, Pérez GM (2019) Dynamic management of a deep learning-based anomaly detection system for 5G networks. J Ambient Intell Humaniz Comput 10(8):3083–3097
Wang N, Li W, Alipour-Fanid A, Jiao L, Dabaghchian M, Zeng K (2020) Pilot contamination attack detection for 5G MmWave grant-free IoT networks. IEEE Trans Inf Forensics Secur 16:658–670
Chattopadhyay A, Mitra U (2019) Security against false data-injection attack in cyber-physical systems. IEEE Trans Control Netw Syst 7(2):1015–1027
Hussain B, Du Q, Sun B, Han Z (2021) Deep learning-based DDoS-attack detection for cyber-physical system over 5G network. IEEE Trans Industr Inf 17(2):860–870
Diro AA, Chilamkurti N (2017) Distributed attack detection scheme using deep learning approach for internet of things. Future Gener Comput Syst 82:761–768
Dai Y, Xu D, Maharjan S, Chen Z, He Q, Zhang Y (2019) Blockchain and deep reinforcement learning empowered intelligent 5G beyond. IEEE Network 33(3):10–17
Rezvy S, Luo Y, Petridis M, Lasebae A, Zebin T (2019) An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. In: Proc. of 2019 53rd Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, pp 1–6
Qi S, Lu Y, Wei W, Chen X (2020) Efficient data access control with fine-grained data protection in cloud-assisted IIoT. IEEE Internet Things J 8(4):2886–2899
Xiong S, Ni Q, Wang L, Wang Q (2020) SEM-ACSIT: secure and efficient multiauthority access control for IoT cloud storage. IEEE Internet Things J 7(4):2914–2927
Huang J, Kong L, Chen G, Wu MY, Liu X, Zeng P (2019) Towards secure industrial IoT: blockchain system with credit-based consensus mechanism. IEEE Trans Industr Inf 15(6):3680–3689
Wu D, Ansari N (2020) A trust evaluation enhanced blockchain-secured industrial IoT system. IEEE Internet Things J 8(7):5510–5517
Castiglione A, Nappi M, Ricciardi S (2020) Trustworthy method for person identification in IIoT environments by means of facial dynamics. IEEE Trans Industr Inf 17(2):766–774
Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJ (2018) Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment. IEEE Internet Things J 5(6):4900–4913
Wan J, Li J, Imran M, Li D (2019) A blockchain-based solution for enhancing security and privacy in smart factory. IEEE Trans Industr Inf 15(6):3652–3660
Usman M, Jan MA, Jolfaei A, Xu M, He X, Chen J (2019) A distributed and anonymous data collection framework based on multilevel edge computing architecture. IEEE Trans Industr Inf 16(9):6114–6123
Lu Y, Huang X, Dai Y, Maharjan S, Zhang Y (2019) Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans Industr Inf 16(6):4177–4186
Zaghloul E, Zhou K, Ren J (2019) P-mod: secure privilege-based multilevel organizational data-sharing in cloud computing. IEEE Trans Big Data 6(4):804–815
Qi S, Lu Y, Zheng Y, Li Y, Chen X (2020) Cpds: enabling compressed and private data sharing for industrial internet of things over blockchain. IEEE Trans Industr Inf 17(4):2376–2387
Zhou R, Zhang X, Du X, Wang X, Yang G, Guizani M (2018) File-centric multi-key aggregate keyword searchable encryption for industrial internet of things. IEEE Trans Industr Inf 14(8):3648–3658
Xu G, Li H, Dai Y, Yang K, Lin X (2018) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inf Forensics Secur 14(4):870–885
Lu Y, Li J, Wang F (2020) Pairing-free certificate-based searchable encryption supporting privacy-preserving keyword search function for IIoTs. IEEE Trans Industr Inf 17(4):2696–2706
Liu S, Yu J, Xiao Y, Wan Z, Wang S, Yan B (2020) BC-SABE: blockchain-aided searchable attribute-based encryption for cloud-IoT. IEEE Internet Things J 7(9):7851–7867
Hao J, Liu J, Wu W, Tang F, Xian M (2019) Secure and fine-grained self-controlled outsourced data deletion in cloud-based IoT. IEEE Internet Things J 7(2):1140–1153
Xue L, Yu Y, Li Y, Au MH, Du X, Yang B (2019) Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf Sci 479:640–650