IET Information Security,
Journal Year:
2025,
Volume and Issue:
2025(1)
Published: Jan. 1, 2025
The
industrial
Internet
of
Things
(IIoT)
has
become
an
innovative
technology
that
brought
many
benefits
to
industries
and
organizations.
This
review
presents
a
comprehensive
analysis
IIoT’s
applications,
highlighting
its
ability
optimize
operations
through
advanced
connectivity,
real‐time
data
exchange,
automation,
importance
in
the
context
Industry
4.0.
Emphasizing
distinction
between
IIoT
traditional
IoT,
paper
explores
how
focuses
on
enhancing
ecosystems
integrating
cyber‐physical
systems
(CPSs).
article
explains
establish
highly
linked
infrastructure
support
cutting‐edge
services
ensure
greater
flexibility
efficiency.
It
emphasizes
role
CPS
automation
control
(IACSs)
realizing
potential
IIoT.
Security
concerns,
important
part
IIoT,
are
addressed
conversations
protecting
networked
systems,
assuring
operational
reliability,
emphasizing
need
for
strong
security
measures
prevent
threats
vulnerabilities.
Furthermore,
critical
technologies
such
as
machine
learning
(ML),
artificial
intelligence
(AI),
various
communication
protocols,
including
fifth
generation
(5G)
message
queuing
telemetry
transport
(MQTT),
investigated
their
improve
system
performance
decision‐making
processes.
In
addition,
also
discusses
safety
precautions
challenges
using
Finally,
addressing
issues
promoting
successful
adoption
achieving
expected
benefits.
study
offers
valuable
resources
researchers,
academics,
decision‐makers
implement
environments.
EURASIP Journal on Information Security,
Journal Year:
2024,
Volume and Issue:
2024(1)
Published: April 8, 2024
Abstract
The
research
addresses
energy
consumption,
latency,
and
network
reliability
challenges
in
wireless
sensor
communication,
especially
military
security
applications.
A
multi-agent
context-aware
model
employing
the
belief-desire-intention
(BDI)
reasoning
mechanism
is
proposed.
This
utilizes
a
semantic
knowledge-based
intelligent
to
monitor
suspicious
activities
within
prohibited
zone,
generating
alerts.
Additionally,
BDI
multi-level
data
transmission
routing
algorithm
proposed
optimize
consumption
constraints
enhance
energy-awareness
among
nodes.
optimization
analysis
involves
Energy
Percent
Dataset,
showcasing
efficiency
of
four
techniques
(E-FEERP,
GTEB,
HHO-UCRA,
EEIMWSN)
maintaining
high
levels.
E-FEERP
consistently
exhibits
superior
(93
98%),
emphasizing
its
effectiveness.
Consumption
Dataset
provides
insights
into
joule
measurements
for
each
technique,
highlighting
their
diverse
characteristics.
Latency
are
presented
fixed
range
5000
m.
demonstrates
latency
ranging
from
3.0
4.0
s,
while
multi-hop
values
2.7
2.9
s.
These
provide
valuable
performance
characteristics
technique
under
specified
conditions.
Packet
Delivery
Ratio
(PDR)
dataset
reveals
consistent
successful
packet
delivery
range.
achieves
PDR
between
89.5
92.3%,
demonstrating
reliability.
Received
Data
further
illustrates
receiving
transmitted
packets.
Moreover
lifetime
results
show
improving
2550
s
round
925.
GTEB
HHO-UCRA
exhibit
fluctuations
around
3100
3600
indicating
variable
performance.
In
contrast,
EEIMWSN
improves
1250
4500
IET Information Security,
Journal Year:
2025,
Volume and Issue:
2025(1)
Published: Jan. 1, 2025
The
industrial
Internet
of
Things
(IIoT)
has
become
an
innovative
technology
that
brought
many
benefits
to
industries
and
organizations.
This
review
presents
a
comprehensive
analysis
IIoT’s
applications,
highlighting
its
ability
optimize
operations
through
advanced
connectivity,
real‐time
data
exchange,
automation,
importance
in
the
context
Industry
4.0.
Emphasizing
distinction
between
IIoT
traditional
IoT,
paper
explores
how
focuses
on
enhancing
ecosystems
integrating
cyber‐physical
systems
(CPSs).
article
explains
establish
highly
linked
infrastructure
support
cutting‐edge
services
ensure
greater
flexibility
efficiency.
It
emphasizes
role
CPS
automation
control
(IACSs)
realizing
potential
IIoT.
Security
concerns,
important
part
IIoT,
are
addressed
conversations
protecting
networked
systems,
assuring
operational
reliability,
emphasizing
need
for
strong
security
measures
prevent
threats
vulnerabilities.
Furthermore,
critical
technologies
such
as
machine
learning
(ML),
artificial
intelligence
(AI),
various
communication
protocols,
including
fifth
generation
(5G)
message
queuing
telemetry
transport
(MQTT),
investigated
their
improve
system
performance
decision‐making
processes.
In
addition,
also
discusses
safety
precautions
challenges
using
Finally,
addressing
issues
promoting
successful
adoption
achieving
expected
benefits.
study
offers
valuable
resources
researchers,
academics,
decision‐makers
implement
environments.