Cybersecurity in the Internet of Things in Industrial Management
Abstract
:1. Introduction
2. Literature Review: Key Concepts
2.1. Cybersecurity
2.2. The Internet of Things
2.3. The Industrial Internet of Things (IIoT)
3. Materials and Methods
4. Discussion
4.1. Cybersecurity
4.2. Machine Learning
4.3. The Internet of Things (IoT)
4.4. Industry 4.0 (IIoT)
4.5. Blockchain and Cloud Computing
5. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
Appendix A
Documents | 2014 | 2015 | 2016 | 2017 | 2018 | 2019 | 2020 | 2021 | Total | |
---|---|---|---|---|---|---|---|---|---|---|
An Intelligent Tree-Based Intrusion Detection Model for Cybe... | 2021 | - | - | - | - | - | - | - | 1 | 1 |
User values and the development of a cybersecurity public po... | 2021 | - | - | - | - | - | - | 1 | 1 | 2 |
A Security-UTAUT Framework for Evaluating Key Security Deter... | 2021 | - | - | - | - | - | - | - | 1 | 1 |
On Australia’s cyber and critical technology international e... | 2020 | - | - | - | - | - | - | - | 1 | 1 |
Internet-scale Insecurity of Consumer Internet of Things | 2020 | - | - | - | - | - | - | 1 | 1 | 2 |
A Blockchain Solution for Enhancing Cybersecurity Defence of... | 2020 | - | - | - | - | - | - | - | 1 | 1 |
Scalable and Secure Architecture for Distributed IoT Systems | 2020 | - | - | - | - | - | - | - | 1 | 1 |
Modeling for malicious traffic detection in 6G next generati... | 2020 | - | - | - | - | - | - | 3 | 1 | 4 |
Awareness and readiness of Industry 4.0: The case of Turkish... | 2020 | - | - | - | - | - | - | 1 | 6 | 7 |
Technologies, opportunities and challenges of the industrial... | 2020 | - | - | - | - | - | - | 2 | 8 | 10 |
An overview of distributed denial of service and internet of... | 2020 | - | - | - | - | - | - | - | 1 | 1 |
Artificial intelligence techniques for a scalable energy tra... | 2020 | - | - | - | - | - | - | - | 1 | 1 |
20 years of scientific evolution of cyber security: A scienc... | 2020 | - | - | - | - | - | - | 12 | 3 | 15 |
A review on the research growth of industry 4.0: IIoT busine... | 2020 | - | - | - | - | - | - | - | 4 | 4 |
Toward a cloud computing learning community | 2019 | - | - | - | - | - | - | 1 | 2 | 3 |
Towards the integration of a post-hoc interpretation step in... | 2019 | - | - | - | - | - | - | - | 2 | 2 |
Proactive antifragility: A new paradigm for next-generation... | 2019 | - | - | - | - | - | - | - | 1 | 1 |
A Research on the Vulnerabilities of PLC using Search Engine | 2019 | - | - | - | - | - | - | 1 | - | 1 |
Cyber security threat intelligence using data mining techniq... | 2019 | - | - | - | - | - | - | 2 | 1 | 3 |
Addressing Industry 4.0 Cybersecurity Challenges | 2019 | - | - | - | - | - | 1 | 9 | 12 | 22 |
FACTS approach to address cybersecurity issues in electric v... | 2019 | - | - | - | - | - | 4 | 3 | 3 | 10 |
Towards Industry 4.0: Mapping digital technologies for suppl... | 2019 | - | - | - | - | - | 12 | 50 | 47 | 111 |
Evaluating security of low-power internet of things networks | 2019 | - | - | - | - | - | 1 | 7 | - | 8 |
Legitimate firms or hackers—who is winning the global cybe... | 2019 | - | - | - | - | - | - | 2 | 1 | 3 |
Foresight of cyber security threat drivers and affecting tec... | 2018 | - | - | - | - | - | 1 | 3 | 5 | 9 |
Agile Business Growth and Cyber Risk: | 2018 | - | - | - | - | - | 1 | 1 | - | 2 |
How to compete in the age of artificial intelligence: Implem... | 2018 | - | - | - | - | - | 1 | 1 | 2 | 4 |
Solving Global Cybersecurity Problems by Connecting Trust Us... | 2018 | - | - | - | - | - | 1 | - | 1 | 2 |
A Cybersecurity Case for the Adoption of Blockchain in the F... | 2018 | - | - | - | - | - | - | 1 | 1 | 2 |
Cybersecurity Attacks and Defences for Unmanned Smart Ships | 2018 | - | - | - | - | - | - | 5 | 1 | 6 |
Avoiding the internet of insecure industrial things | 2018 | - | - | - | - | 5 | 14 | 8 | 9 | 36 |
The impact of China’s 2016 Cyber Security Law on foreign tec... | 2018 | - | - | - | - | 6 | 3 | 6 | 5 | 20 |
Adoption of industry 4.0 technologies in supply chains | 2018 | - | - | - | - | - | 1 | 3 | 2 | 6 |
Artificial intelligence in smart tourism: A conceptual frame... | 2018 | - | - | - | - | - | 1 | 2 | 5 | 8 |
Cybersecurity and the auto industry: The growing challenges... | 2018 | - | - | - | - | - | 3 | 5 | 1 | 9 |
Information innovation technology in smart cities | 2017 | - | - | - | - | - | 3 | - | - | 3 |
Kill switches, remote deletion, and intelligent agents: | 2017 | - | - | - | - | 2 | - | 2 | 3 | 7 |
Blockchain technology innovations | 2017 | - | - | - | - | 11 | 46 | 60 | 37 | 155 |
Personality traits and cyber-attack victimisation: Multiple... | 2017 | - | - | - | - | - | - | 4 | - | 4 |
STM32-based vehicle data acquisition system for Internet-of-... | 2017 | - | - | - | 1 | 2 | 4 | 5 | 5 | 17 |
Electronic finance—recent developments | 2017 | - | - | - | 2 | 1 | - | 6 | 3 | 12 |
Cybersecurity in the Internet of Things: Legal aspects | 2016 | - | - | - | 4 | 16 | 14 | 10 | 7 | 51 |
Total | 0 | 0 | 0 | 7 | 43 | 111 | 217 | 187 | 568 |
Appendix B
Documents | 2014 | 2015 | 2016 | 2017 | 2018 | 2019 | 2020 | 2021 | Total | |
---|---|---|---|---|---|---|---|---|---|---|
A Security-UTAUT Framework for Evaluating Key Security Deter... | 2021 | - | - | - | - | - | - | - | 1 | 1 |
On Australia’s cyber and critical technology international e... | 2020 | - | - | - | - | - | - | - | 1 | 1 |
Internet-scale Insecurity of Consumer Internet of Things | 2020 | - | - | - | - | - | - | 1 | - | 1 |
Modeling for malicious traffic detection in 6G next generati... | 2020 | - | - | - | - | - | - | 2 | - | 2 |
Technologies, opportunities and challenges of the industrial... | 2020 | - | - | - | - | - | - | - | 1 | 1 |
20 years of scientific evolution of cyber security: A scienc... | 2020 | - | - | - | - | - | - | 10 | - | 10 |
Toward a cloud computing learning community | 2019 | - | - | - | - | - | - | - | 1 | 1 |
Towards the integration of a post-hoc interpretation step in... | 2019 | - | - | - | - | - | - | - | 1 | 1 |
Addressing Industry 4.0 Cybersecurity Challenges | 2019 | - | - | - | - | - | - | - | 1 | 1 |
Emerging technologies and risk: How do we optimize enterpris... | 2019 | - | - | - | - | - | 4 | 3 | 1 | 8 |
FACTS approach to address cybersecurity issues in electric v... | 2019 | - | - | - | - | - | 1 | - | 1 | 2 |
Towards Industry 4.0: Mapping digital technologies for suppl... | 2019 | - | - | - | - | - | - | 5 | - | 5 |
Legitimate firms or hackers—who is winning the global cybe... | 2019 | - | - | - | - | - | - | 1 | 1 | 2 |
Solving Global Cybersecurity Problems by Connecting Trust Us... | 2018 | - | - | - | - | - | - | - | 1 | 1 |
Avoiding the internet of insecure industrial things | 2018 | - | - | - | - | - | 2 | - | - | 2 |
Adoption of industry 4.0 technologies in supply chains | 2018 | - | - | - | - | - | 1 | - | - | 1 |
Cybersecurity and the auto industry: The growing challenges... | 2018 | - | - | - | - | - | - | 1 | - | 1 |
Blockchain technology innovations | 2017 | - | - | - | - | 1 | 1 | - | 1 | 3 |
Electronic finance—recent developments | 2017 | - | - | - | - | - | - | 2 | - | 2 |
Cybersecurity in the Internet of Things: Legal aspects | 2016 | - | - | - | 1 | - | 1 | - | - | 2 |
Total | - | - | - | 1 | 1 | 10 | 25 | 11 | 48 |
References
- Alshboul, Y.; Bsoul, A.A.R.; Zamil, M.A.L.; Samarah, S. Cybersecurity of smart home systems: Sensor identity protection. J. Netw. Syst. Manag. 2021, 29, 22. [Google Scholar] [CrossRef]
- Occa, R.; Borbon-Galvez, Y.; Strozzi, F. In search of lost security. A systematic literature review on how blockchain can save the iot revolution. In Proceedings of the XXV Summer School Francesco Turco, Bergamo, Italy, 11–13 September 2020. [Google Scholar]
- Khalid, A.; Sundararajan, A.; Hernandez, A.; Sarwat, A.I. FACTS approach to address cybersecurity issues in electric vehicle battery systems. Paper presented at the 2019 IEEE Technology and Engineering Management Conference (TEMSCON), Atlanta, GA, USA, 12–14 June 2019. [Google Scholar] [CrossRef]
- Xie, Y.; Su, X.; He, Y.; Chen, X.; Cai, G.; Xu, B.; Ye, W. STM32-based vehicle data acquisition system for internet-of-vehicles. In Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS), Wuhan, China, 24–26 May 2017; pp. 895–898. [Google Scholar] [CrossRef]
- Mangino, A.; Pour, M.S.; Bou-Harb, E. Internet-scale insecurity of consumer internet of things. ACM Trans. Manag. Inf. Syst. 2020, 11, 1–24. [Google Scholar] [CrossRef]
- Lee, T.; Kim, S.; Kim, K. A research on the vulnerabilities of PLC using search engine. In Proceedings of the 10th International Conference on ICT Convergence: ICT Convergence Leading the Autonomous Future, Jeju, Korea, 16–18 October 2019; pp. 184–188. [Google Scholar] [CrossRef]
- Sarı, T.; Güleş, H.K.; Yiğitol, B. Awareness and readiness of industry 4.0: The case of turkish manufacturing industry. Adv. Prod. Eng. Manag. 2020, 15, 57–68. [Google Scholar] [CrossRef]
- Gupta, S.; Sabitha, A.S.; Punhani, R. Cyber security threat intelligence using data mining techniques and artificial intelligence. Int. J. Recent Technol. Eng. 2019, 8, 6133–6140. [Google Scholar] [CrossRef]
- Uzunov, A.V.; Nepal, S.; Baruwal Chhetri, M. Proactive antifragility: A new paradigm for next-generation cyber defence at the edge. In Proceedings of the 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), Los Angeles, CA, USA, 12–14 December 2019; pp. 246–255. [Google Scholar] [CrossRef]
- Smith, K.J.; Dhillon, G.; Carter, L. User values and the development of a cybersecurity public policy for the IoT. Int. J. Inf. Manag. 2021, 56, 102123. [Google Scholar] [CrossRef]
- Furstenau, L.B.; Sott, M.K.; Homrich, A.J.O.; Kipper, L.M.; Al Abri, A.A.; Cardoso, T.F.; López-Robles, J.R.; Cobo, M.J. 20 years of scientific evolution of cyber security: A science mapping. In Proceedings of the International Conference on Industrial Engineering and Operations Management, Dubai, United Arab Emirates, 10–12 March 2020; pp. 314–325. [Google Scholar]
- Gorog, C.; Boult, T.E. Solving global cybersecurity problems by connecting trust using blockchain. In Proceedings of the 2018 IEEE Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1425–1432. [Google Scholar] [CrossRef]
- Urquhart, L.; McAuley, D. Avoiding the internet of insecure industrial things. Comput. Law Secur. Rev. 2018, 34, 450–466. [Google Scholar] [CrossRef]
- Dhieb, N.; Ghazzai, H.; Besbes, H.; Massoud, Y. Scalable and secure architecture for distributed IoT systems. In Proceedings of the 2020 IEEE Technology and Engineering Management Conference (TEMSCON), Novi, MI, USA, 3–6 June 2020. [Google Scholar] [CrossRef]
- Ghorbani, H.; Mohammadzadeh, M.S.; Ahmadzadegan, M.H. Modeling for malicious traffic detection in 6G next generation networks. In Proceedings of the 2020 International Conference on Technology and Entrepreneurship–Virtual (ICTE-V), San Jose, CA, USA, 20–21 April 2020. [Google Scholar] [CrossRef]
- Raban, Y.; Hauptman, A. Foresight of cyber security threat drivers and affecting technologies. Foresight 2018, 20, 353–363. [Google Scholar] [CrossRef]
- Vaccari, I.; Cambiaso, E.; Aiello, M. Evaluating security of low-power internet of things networks. Int. J. Comput. Digit. Syst. 2019, 8, 101–114. [Google Scholar] [CrossRef]
- Laskurain-Iturbe, I.; Arana-Landín, G.; Landeta-Manzano, B.; Uriarte-Gallastegi, N. Exploring the influence of industry 4.0 technologies on the circular economy. J. Clean. Prod. 2021, 321, 128944. [Google Scholar] [CrossRef]
- Kis, M.; Singh, B. A cybersecurity case for the adoption of blockchain in the financial industry. In Proceedings of the 2018 IEEE Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1491–1498. [Google Scholar] [CrossRef]
- Ahram, T.; Sargolzaei, A.; Sargolzaei, S.; Daniels, J.; Amaba, B. Blockchain technology innovations. In Proceedings of the 2017 IEEE Technology and Engineering Management Society Conference (TEMSCON), Santa Clara, CA, USA, 8–10 June 2017; pp. 137–141. [Google Scholar] [CrossRef]
- Parasol, M. The impact of china’s 2016 cyber security law on foreign technology firms, and on china’s big data and smart city dreams. Comput. Law Secur. Rev. 2018, 34, 67–98. [Google Scholar] [CrossRef]
- Khatkar, M.; Kumar, K.; Kumar, B. An overview of distributed denial of service and internet of things in healthcare devices. In Proceedings of the International Conference on Research, Innovation, Knowledge Management and Technology Application for Business Sustainability (INBUSH), Greater Noida, India, 19–21 February 2020; pp. 44–48. [Google Scholar] [CrossRef]
- Al-Omari, M.; Rawashdeh, M.; Qutaishat, F.; Alshira’H, M.; Ababneh, N. An intelligent tree-based intrusion detection model for cyber security. J. Netw. Syst. Manag. 2021, 29, 20. [Google Scholar] [CrossRef]
- Nomm, S.; Guerra-Manzanares, A.; Bahsi, H. Towards the integration of a post-hoc interpretation step into the machine learning workflow for IoT botnet detection. In Proceedings of the 18th IEEE International Conference on Machine Learning and Applications (ICMLA), Boca Raton, FL, USA, 16–19 December 2019; pp. 1162–1169. [Google Scholar] [CrossRef]
- Giannoutakis, K.M.; Spathoulas, G.; Filelis-Papadopoulos, C.K.; Collen, A.; Anagnostopoulos, M.; Votis, K.; Nijdam, N.A. A blockchain solution for enhancing cybersecurity defence of IoT. In Proceedings of the 2020 IEEE International Conference on Blockchain, Rhodes, Greece, 2–6 November 2020; pp. 490–495. [Google Scholar] [CrossRef]
- Ismail, L.; Zhang, L. Information Innovation Technology in Smart Cities; Springer: Singapore, 2017; pp. 1–356. [Google Scholar] [CrossRef]
- Dandapani, K. Electronic finance–recent developments. Manag. Financ. 2017, 43, 614–626. [Google Scholar] [CrossRef]
- Morris, D.; Madzudzo, G.; Garcia-Perez, A. Cybersecurity and the auto industry: The growing challenges presented by connected cars. Int. J. Automot. Technol. Manag. 2018, 18, 105–118. [Google Scholar] [CrossRef]
- Grandhi, L.S.; Grandhi, S.; Wibowo, S. A security-UTAUT framework for evaluating key security determinants in smart city adoption by the australian city councils. In Proceedings of the 2021 21st ACIS International Semi-Virtual Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter), Ho Chi Minh City, Vietnam, 20–30 January 2021; pp. 17–22. [Google Scholar] [CrossRef]
- Dalmarco, G.; Barros, A.C. Adoption of industry 4.0 technologies in supply chains. In Innovation and Supply Chain Management; Moreira, A., Ferreira, L., Zimmermann, R., Eds.; Springer: Cham, Switzerland, 2018. [Google Scholar] [CrossRef]
- Rafaqat, M.; Ishfaq, K.; Ahmed, N. Implementation of augmented reality in the context of industry 4.0: A comprehensive review. In Proceedings of the 9th Annual International Conference on Industrial Engineering and Operations Management, Bangkok, Thailand, 5–7 March 2019; pp. 93–94. [Google Scholar]
- Ardito, L.; Petruzzelli, A.M.; Panniello, U.; Garavelli, A.C. Towards industry 4.0: Mapping digital technologies for supply chain management-marketing integration. Bus. Process Manag. J. 2018, 25, 323–346. [Google Scholar] [CrossRef]
- Chaykin, A. New systems, new cyber threats. Pet. Econ. 2019, 86, 32–33. [Google Scholar]
- Culot, G.; Fattori, F.; Podrecca, M.; Sartor, M. Addressing industry 4.0, cybersecurity challenges. IEEE Eng. Manag. Rev. 2019, 47, 79–86. [Google Scholar] [CrossRef]
- Foster, D.; White, L.; Erdil, D.C.; Adams, J.; Argüelles, A.; Hainey, B.; Hyman, H.; Lewis, G.; Nazir, S.; Nguyen, V.; et al. Toward a cloud computing learning community. In ITiCSE-WGR ’19, Proceedings of the Annual Conference on Innovation and Technology in Computer Science Education, Aberdeen, UK, 15–17 July 2019; ACM: New York, NY, USA, 2019; pp. 143–155. [Google Scholar] [CrossRef] [Green Version]
- Mohanty, S.; Vyas, S. How to Compete in the Age of Artificial Intelligence: Implementing a Collaborative Human-Machine Strategy for Your Business; APress: New York, NY, USA, 2018; pp. 1–229. [Google Scholar] [CrossRef]
- Gupta, R. Industry 4.0 adaption in indian banking Sector—A review and agenda for future research. Vis. J. Bus. Perspect. 2021. [Google Scholar] [CrossRef]
- Rymarczyk, J. Technologies, opportunities and challenges of the industrial revolution 4.0: Theoretical considerations. Entrep. Bus. Econ. Rev. 2020, 8, 185–198. [Google Scholar] [CrossRef]
- Dube, D.P.; Mohanty, R.P. Towards development of a cyber security capability maturity model. Int. J. Bus. Inf. Syst. 2020, 34, 104–127. [Google Scholar] [CrossRef]
- Albladi, S.M.; George, R.S. Personality traits and cyber-attack victimisation: Multiple mediation analysis. In Proceedings of the 2017 Internet of Things–Business Models, Users, and Networks, Copenhagen, Denmark, 23–24 November 2017. [Google Scholar] [CrossRef] [Green Version]
- Sivakumar, S.; Siddappa Naidu, K.; Karunanithi, K. Design of energy management system using autonomous hybrid micro-grid under IOT environment. Int. J. Recent Technol. Eng. 2019, 8, 338–343. [Google Scholar] [CrossRef]
- Gary, R.F.; Marinakis, Y.; Majadillas, M.A.; White, R.; Walsh, S.T. Legitimate firms or hackers–who is winning the global cyber war? Int. J. Technol. Intell. Plan. 2019, 12, 297–314. [Google Scholar] [CrossRef]
- Griffy-Brown, C.; Miller, H.; Zhao, V.; Lazarikos, D.; Chun, M. Emerging technologies and risk: How do we optimize enterprise risk when deploying emerging technologies? In Proceedings of the 2019 IEEE Technology and Engineering Management Conference (TEMSCON), Atlanta, GA, USA, 12–14 June 2019. [Google Scholar] [CrossRef]
- Murshida; Faizabadi, A.R.; Basthikodi, M.; Akram, K. Trust management in internet of things applications. Int. J. Recent Technol. Eng. 2019, 8, 1750–1753. [Google Scholar] [CrossRef]
- Hitefield, S.D.; Fowler, M.; Clancy, T.C. Exploiting buffer overflow vulnerabilities in software defined radios. In Proceedings of the 2018 IEEE Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1921–1927. [Google Scholar] [CrossRef]
- Latif, M.N.A.; Sarawak, S.P.M.; Aziz, N.A.A.; Hussin, N.S.N.; Aziz, Z.A.; Kelantan, K.U.M. Cyber security in supply chain management: A systematic review. Logforum 2015, 17, 49–57. [Google Scholar] [CrossRef]
- Soldani, D. 6G fundamentals: Vision and enabling technologies. J. Telecommun. Digit. Econ. 2021, 9, 58–86. [Google Scholar] [CrossRef]
- Weber, R.H.; Studer, E. Cybersecurity in the internet of things: Legal aspects. Comput. Law Secur. Rev. 2016, 32, 715–728. [Google Scholar] [CrossRef]
- Sayed-Mouchaweh, M. Artificial Intelligence Techniques for a Scalable Energy Transition: Advanced Methods, Digital Technologies, Decision Support Tools, and Applications; Springer: Cham, Switzerland; pp. 1–382. [CrossRef]
- Oconnor, T.J.; Stricklan, C. Teaching a hands-on mobile and wireless cybersecurity course. In ITiCSE ’21, Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education, Virtual Event Germany, 26 June–1 July 2021; ACM: New York, NY, USA, 2021; pp. 296–302. [Google Scholar] [CrossRef]
- Memon, K.R.; Ooi, S.K. The Dark Side of Industrial Revolution 4.0-Implications and Suggestions. Acad. Entrep. J. 2021, 27, 1–18. [Google Scholar]
- Terruggia, R.; Garrone, F. Secure IoT and cloud based infrastructure for the monitoring of power consumption and asset control. In Proceedings of the 12th AEIT International Annual Conference (AEIT), Catania, Italy, 23–25 September 2020. [Google Scholar] [CrossRef]
- Sahu, A.K.; Sahu, A.K.; Sahu, N.K. A review on the research growth of industry 4.0: IIoT business architectures benchmarking. Int. J. Bus. Anal. 2020, 7, 77–97. [Google Scholar] [CrossRef]
- Nash, I. Cybersecurity in a post-data environment: Considerations on the regulation of code and the role of producer and consumer liability in smart devices. Comput. Law Secur. Rev. 2021, 40, 105529. [Google Scholar] [CrossRef]
- Silverajan, B.; Ocak, M.; Nagel, B. Cybersecurity attacks and defences for unmanned smart ships. In Proceedings of the 2018 IEEE Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 15–20. [Google Scholar] [CrossRef]
- Rosário, A.; Raimundo, R. Importance of Value Propositions in Marketing: Research and Challenges. Acad. Strateg. Manag. J. 2021, 20, 1–23. [Google Scholar]
- Raimundo, R.; Rosário, A. Blockchain system in the Higher Education. Eur. J. Investig. Health Psychol. Edu. 2021, 11, 276–293. [Google Scholar] [CrossRef]
- Rosário, A.M.F.T.; Vilaça, F.I.d.A.F.; Raimundo, R.; Cruz, R.M.N. Literature review on Health Knowledge Management in the last 10 years (2009–2019). Electron. J. Knowl. Manag. 2021, 18, 338–355. [Google Scholar] [CrossRef]
- Soldani, D. On australia’s cyber and critical technology international engagement strategy towards 6G how australia may become a leader in cyberspace. J. Telecommun. Digit. Econ. 2020, 8, 127–158. [Google Scholar] [CrossRef]
- Oravec, J.A. Kill switches, remote deletion, and intelligent agents: Framing everyday household cybersecurity in the internet of things. Technol. Soc. 2017, 51, 189–198. [Google Scholar] [CrossRef]
- Griffy-Brown, C.; Lazarikos, D.; Chun, M. Agile business growth and cyber risk. In Proceedings of the 2018 IEEE Technology and Engineering Management Conference (TEMSCO), Evanston, IL, USA, 28 June–1 July 2018. [Google Scholar] [CrossRef]
- Čapek, J. Cybersecurity and internet of things. In Proceedings of the IDIMT 2018 Strategic Modeling in Management, Economy and Society–26th Interdisciplinary Information Management Talks, Kutna Hora, Czech Republic, 5–7 September 2018; pp. 343–349. [Google Scholar]
- Tsaih, R.; Hsu, C.C. Artificial intelligence in smart tourism: A conceptual framework. In Proceedings of the 18th International Conference on Electronic Business (ICEB), Guilin, China, 2–6 December 2018; pp. 124–133. [Google Scholar]
- Pascale, F.; Adinolfi, E.A.; Coppola, S.; Santonicola, E. Cybersecurity in Automotive: AnIntrusion Detection System in Connected Vehicles. Electronics 2021, 10, 1765. [Google Scholar] [CrossRef]
- Lombardi, M.; Pascale, F.; Santaniello, D. Two-Step Algorithm to Detect Cyber-Attack Over the Can-Bus: A Preliminary Case Study in Connected Vehicles. ASME J. Risk Uncertain. Eng. Syst. Part B Mech. Eng. 2022, 8, 031105. [Google Scholar] [CrossRef]
- Lu, Y.; Xu, L.D. Internet of Things (IoT) cybersecurity research: A review of current research topics. IEEE Internet Things J. 2018, 6, 2103–2115. [Google Scholar] [CrossRef]
- Akyildiz, I.F.; Lee, W.-Y.; Vuran, M.C.; Mohanty, S. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey. Comput. Netw. 2006, 50, 2127–2159. [Google Scholar] [CrossRef]
- Akyildiz, I.F.; Wang, X.; Wang, W. Wireless mesh networks: A survey. Comput. Netw. 2005, 47, 445–487. [Google Scholar] [CrossRef]
- Lee, I. Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management. Future Internet 2020, 12, 157. [Google Scholar] [CrossRef]
- Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: A survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef] [Green Version]
Phase | Step | Description |
---|---|---|
Exploration | Step 1 | problem of research |
Step 2 | search of appropriate literature | |
Step 3 | the critical precision of the chosen studies | |
Step 4 | synthesis of data from individual sources | |
Interpretation | Step 5 | reports and recommendations |
Communication | Step 6 | presentation of the LRSB report |
Database Scopus | Screening | Publications |
---|---|---|
Meta-search | keyword: Cyber Security | 15,748 |
First Inclusion Criterion | keyword: Cyber Security, Internet of Things | 1316 |
Second Inclusion Criterion | keyword: Cyber Security, Internet of Things subject area: Business, Management, and Accounting | 60 |
Tracking | keyword: Cyber Security, Internet of Things subject area: Business, Management Published Until September 2021 |
Title | SJR | Best Quartile | H Index |
---|---|---|---|
International Journal of Information Management | 2.770 | Q1 | 114 |
Journal of Cleaner Production | 1.940 | Q1 | 200 |
Computer Law and Security Review | 0.820 | Q1 | 38 |
Technology in Society | 0.820 | Q1 | 51 |
Business Process Management Journal | 0.670 | Q1 | 81 |
Advances in Production Engineering and Management | 0.620 | Q1 | 18 |
ACM Transactions on Management Information Systems | 0.600 | Q1 | 29 |
Journal of Network and Systems Management | 0.490 | Q2 | 35 |
International Journal of Automotive Technology and Management | 0.380 | Q2 | 22 |
Foresight | 0.370 | Q2 | 30 |
Entrepreneurial Business and Economics Review | 0.330 | Q2 | 11 |
Vision | 0.310 | Q3 | 9 |
IEEE Engineering Management Review | 0.300 | Q3 | 20 |
Managerial Finance | 0.270 | Q3 | 39 |
International Journal of Business Information Systems | 0.260 | Q3 | 26 |
Academy of Entrepreneurship Journal | 0.210 | Q3 | 12 |
Journal of Telecommunications and the Digital Economy | 0.200 | Q2 | 6 |
Logforum | 0.200 | Q3 | 4 |
International Journal of Business Analytics | 0.160 | Q4 | 9 |
International Journal of Computing and Digital Systems | 0.150 | Q4 | 6 |
International Journal of Technology Intelligence and Planning | 0.130 | Q4 | 15 |
Economist United Kingdom | 0.100 | Q4 | 9 |
Petroleum Economist | 0.100 | Q4 | 4 |
Annual Conference on Innovation and Technology in Computer Science Education ITiCSE | 0.260 | -* | 23 |
Proceedings 16th IEEE Acis International Conference on Computer and Information Science Icis 2017 | 0.210 | -* | 17 |
12th Aeit International Annual Conference Aeit 2020 | 0.190 | -* | 9 |
Proceedings of the Summer School Francesco Turco | 0.150 | -* | 9 |
Proceedings of the International Conference on Industrial Engineering and Operations Management | 0.130 | -* | 9 |
Proceedings of the International Conference on Electronic Business Iceb | 0.120 | -* | 7 |
2017 IEEE Technology and Engineering Management Society Conference Temscon 2017 | 0.210 | -* | 6 |
2019 IEEE Technology and Engineering Management Conference Temscon 2019 | 0.150 | -* | 4 |
Ictc 2019 10th International Conference on ICT Convergence ICT Convergence Leading the Autonomous Future | 0.120 | -* | 3 |
2018 IEEE Technology and Engineering Management Conference Temscon 2018 | 0.120 | -* | 3 |
Idimt 2018 Strategic Modeling in Management Economy and Society 26th Interdisciplinary Information Management Talks | 0.100 | -* | 3 |
International Journal of Recent Technology and Engineering | 0 | -* | 20 |
Contributions to Management Science | 0 | -* | 14 |
Proceedings IEEE 2018 International Congress on Cybermatics 2018 IEEE Conferences on Internet of Things Green Computing and Communications Cyber Physical and Social Computing Smart Data Blockchain Computer and Information Technology Ithings GreenCom CPSCom Smartdata Blockchain CIT 2018 | -* | -* | -* |
2020 IEEE Technology and Engineering Management Conference Temscon 2020 | -* | -* | -* |
2020 International Conference on Technology and Entrepreneurship Virtual Icte V 2020 | -* | -* | -* |
Artificial Intelligence Techniques for a Scalable Energy Transition Advanced Methods Digital Technologies Decision Support Tools and Applications | -* | -* | -* |
How to Compete in the Age of Artificial Intelligence Implementing a Collaborative Human Machine Strategy for Your Business | -* | -* | -* |
Innovation Technology in Smart Cities | -* | -* | -* |
Joint 13th Ctte and 10th Cmi Conference on Internet of Things Business Models Users and Networks | -* | -* | -* |
Proceedings 18th IEEE International Conference on Machine Learning and Applications Icmla 2019 | -* | -* | -* |
Proceedings 2019 IEEE 5th International Conference on Collaboration and Internet Computing Cic 2019 | -* | -* | -* |
Proceedings 2020 IEEE International Conference on Blockchain 2020 | -* | -* | -* |
Proceedings 2021 21st Acis International Semi Virtual Winter Conference on Software Engineering Artificial Intelligence Networking and Parallel Distributed Computing Snpd Winter 2021 | -* | .* | -* |
Proceedings of the International Conference on Research Innovation Knowledge Management and Technology Application for Business Sustainability Inbush 2020 | -* | -* | -* |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Raimundo, R.J.; Rosário, A.T. Cybersecurity in the Internet of Things in Industrial Management. Appl. Sci. 2022, 12, 1598. https://doi.org/10.3390/app12031598
Raimundo RJ, Rosário AT. Cybersecurity in the Internet of Things in Industrial Management. Applied Sciences. 2022; 12(3):1598. https://doi.org/10.3390/app12031598
Chicago/Turabian StyleRaimundo, Ricardo Jorge, and Albérico Travassos Rosário. 2022. "Cybersecurity in the Internet of Things in Industrial Management" Applied Sciences 12, no. 3: 1598. https://doi.org/10.3390/app12031598
APA StyleRaimundo, R. J., & Rosário, A. T. (2022). Cybersecurity in the Internet of Things in Industrial Management. Applied Sciences, 12(3), 1598. https://doi.org/10.3390/app12031598