Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Sensors,
Journal Year:
2025,
Volume and Issue:
25(1), P. 213 - 213
Published: Jan. 2, 2025
This
paper
provides
the
complete
details
of
current
challenges
and
solutions
in
cybersecurity
cyber-physical
systems
(CPS)
within
context
IIoT
its
integration
with
edge
computing
(IIoT–edge
computing).
We
systematically
collected
analyzed
relevant
literature
from
past
five
years,
applying
a
rigorous
methodology
to
identify
key
sources.
Our
study
highlights
prevalent
layer
attacks,
common
intrusion
methods,
critical
threats
facing
IIoT–edge
environments.
Additionally,
we
examine
various
types
cyberattacks
targeting
CPS,
outlining
their
significant
impact
on
industrial
operations.
A
detailed
taxonomy
primary
security
mechanisms
for
CPS
is
developed,
followed
by
comparative
analysis
our
approach
against
existing
research.
The
findings
underscore
widespread
vulnerabilities
across
architecture,
particularly
relation
DoS,
ransomware,
malware,
MITM
attacks.
review
emphasizes
advanced
technologies,
including
machine
learning
(ML),
federated
(FL),
blockchain,
blockchain–ML,
deep
(DL),
encryption,
cryptography,
IT/OT
convergence,
digital
twins,
as
essential
enhancing
real-time
data
protection
computing.
Finally,
outlines
potential
future
research
directions
aimed
at
advancing
this
rapidly
evolving
domain.
Language: Английский
Enhancing Cybersecurity in Energy IT Infrastructure Through a Layered Defense Approach to Major Malware Threats
Dojin Yoo,
No information about this author
Seunghuk Lee,
No information about this author
Sherry X. Yang
No information about this author
et al.
Applied Sciences,
Journal Year:
2024,
Volume and Issue:
14(22), P. 10342 - 10342
Published: Nov. 11, 2024
This
study
examines
the
cybersecurity
vulnerabilities
of
energy
IT
infrastructure
in
context
rapid
digital
transformation
and
network
expansion.
While
these
advancements
have
improved
efficiency,
they
also
increased
susceptibility
to
cyber
threats,
particularly
from
malware
such
as
Industroyer,
Triton,
NotPetya,
BlackEnergy3.
By
analyzing
this
research
identifies
key
weaknesses
systems
highlights
need
for
enhanced
anomaly
detection,
segmentation,
system
integrity
checks.
To
address
vulnerabilities,
proposes
a
layered
security
architecture
which
each
layer—physical,
control,
network,
application,
security—provides
independent
protection
while
integrating
into
unified
defense
strategy.
emphasizes
necessity
combining
technical-,
organizational-,
policy-based
responses
bolster
across
all
levels
infrastructure.
Key
recommendations
include
immediate
vulnerability
patching,
international
cooperation,
stronger
legal
frameworks,
education,
establishment
command
structure.
provides
practical
insights
strategies
strengthening
through
comprehensive,
integrated
approach.
Language: Английский