University Name: Vulnerability Assessment of IIoT 4.0 Devices

Verified

Added on  2022/08/18

|24
|4720
|16
Report
AI Summary
This report presents a comprehensive vulnerability assessment of IIoT 4.0 devices, examining their evolution, impact, and potential mitigation strategies. The study begins with an introduction outlining the research aim, objectives, questions, and hypotheses, followed by a background on the topic and the rationale for the study. A thorough literature review explores the evolution of IIoT devices, their impact, and associated vulnerabilities, including disruptions caused by these vulnerabilities and techniques to address them. The research methodology outlines the method outline, research philosophy, approach, design, data collection and analysis techniques, ethical considerations, and limitations. Data analysis, findings, and interpretation are presented, followed by conclusions, recommendations, and further scope for study. The report aims to provide valuable insights for strategic planners and industrialists considering the implementation of IIoT 4.0 devices, offering a detailed analysis of vulnerabilities and potential solutions.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
Vulnerability assessment of IIOT 4.0 DEVICES
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
ACKNOWLEDGEMENT
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
Executive Summary
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
Table of Contents
Chapter 1: Introduction....................................................................................................................7
1.1. Introduction........................................................................................................7
1.2. Research Aim.....................................................................................................7
1.3. Research Objectives...........................................................................................7
1.4. Research Questions............................................................................................8
1.5. Hypothesis of the Research................................................................................9
1.6. Background of the Topic....................................................................................9
1.7. Rationale of Study..............................................................................................9
1.8. Purpose of Study..............................................................................................10
1.9. Structure of the Study.......................................................................................10
1.10. Summary...............................................................................................................10
Chapter 2: Literature Review.........................................................................................................11
2.1. Introduction.............................................................................................................11
2.2. Evolution of IIoT devices.......................................................................................11
2.3. Impact of IIoT 4.0 devices......................................................................................12
2.4. Vulnerabilities of IIoT 4.0 devices.........................................................................13
2.5. Disruptions caused due to the vulnerabilities.........................................................13
2.6. Acceptance of the disruptions.................................................................................14
2.7. Techniques to address the disruptions....................................................................15
2.8. Literature Gap.........................................................................................................16
Chapter 3: Research Methodology................................................................................................18
3.1. Introduction.............................................................................................................18
3.2. Method Outline.......................................................................................................18
3.3. Research Philosophy...............................................................................................18
3.4. Research Approach.................................................................................................19
3.5. Research Design.....................................................................................................19
3.6. Data Collection Process..........................................................................................20
3.7. Data Analysis Techniques......................................................................................20
3.8. Ethical Consideration..............................................................................................20
3.9. Research Limitations..............................................................................................20
3.10. Summary...............................................................................................................20
Chapter 4: Data Analysis, Findings and Interpretation.................................................................21
4.1. Introduction.............................................................................................................21
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
4.2. Findings..................................................................................................................21
4.2.1 Findings from demographic questions..................................................................21
4.2.2 Findings from Quantitative Analysis................................................................22
4.3. Summary.................................................................................................................22
Chapter 5: Conclusion and Recommendations..............................................................................22
5.1. Conclusions.............................................................................................................22
5.2. Linking with Objectives.........................................................................................22
5.3. Recommendations...................................................................................................22
5.4. Limitations of Study...............................................................................................22
5.5. Further Scope of Study...........................................................................................22
6. References..................................................................................................................................23
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
Chapter 1: Introduction
It is the introductory chapter of this dissertation paper and this chapter is very much
significant for the readers of this dissertation paper to understand the selected topic of this
research in a detailed modus (Thames and Schaefer 2017). The focus of this dissertation paper
can be identified from this chapter, at the same time, this chapter shall also be very much useful
to understand the purpose of this dissertation.
1.1. Introduction
The IIoT devices are used in the industrial sector only to optimize the operations of the
manufacturing units, supply chain departments and the management system (Leander, Čaušević
and Hansson 2019). However, there are few challenges related to the use of the IIoT devices as
well, as a result the industrial organizations have to suffer business and financial losses.
1.2. Research Aim
The expectation and the aspiration of the analyst of this dissertation paper can be
successfully understood from this section of the introduction chapter (Zuo et al. 2019). In this
dissertation, the analyst is trying to identify the vulnerabilities of IIoT 4.0 devices. This
dissertation paper shall be very much useful for the industrialists who are considering enacting
IIoT 4.0 devices shortly, as this paper shall be discussing the vulnerabilities of the IIoT devices
from diverse perspectives.
1.3. Research Objectives
Research objectives are very much significant to understand the overall expectation of
this dissertation paper (Radanliev et al. 2018). The following chapter of this dissertation paper is
the literature review and it will be conducted on the basis of the research objectives which will
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
be created in this section of the introductory chapter. Most of the previous researchers have
focused primarily on the security issues of the IIoT devices, however, this research paper shall be
focussing mainly on the vulnerabilities of IIoT 4.0 devices only. The notable objectives of this
dissertation paper are as followings:
To identify the evolution of IIoT devices over the years.
To evaluate the vulnerabilities of the IIoT 4.0 devices.
To discuss the potential impact regarding the identified vulnerabilities of the IIoT 4.0
devices.
To recommend a few techniques which can address the vulnerabilities of the IIoT 4.0
devices.
1.4. Research Questions
The concerns of this research paper can be understood from the research questions which
will be formed in this section of the introduction chapter. The research questions shall be very
much significant for the readers of this document to understand the vulnerabilities related to the
use of IIoT 4.0 devices across the different industrial sectors. The variables of this research paper
can be identified by the analyst of this research paper using the research questions. The research
questions of this dissertation research are as followings:
How the evolution of IIoT devices had impacted the overall production in the industrial
sector?
What are the vulnerabilities related to the use of IIoT 4.0 devices?
What are the disruptions which are caused due to the vulnerabilities of the IIoT 4.0
devices?
To what extent these disruptions can be accepted in the industrial sector?
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
1.5. Hypothesis of the Research
The testable proposition of a research paper can be identified using the hypothesis which are
usually created in the first chapter of the dissertation (Ali and Awad 2018). The hypothesis of a
research paper are created on the basis of the topic and the focus of this research paper. In most
of the research paper, there are two categories of hypothesis, null hypothesis (H0) which
specifies that there is no significance between a specified population and any observed
differences and experimental errors and alternate hypothesis (H1) which signifies the statistical
importance of the relationship between the two variables of research.
H1: Vulnerabilities of IIoT 4.0 devices can have a huge impact on the overall production in the
industrial sector.
H0: Vulnerabilities of IIoT 4.0 devices does not have a huge impact on the overall performance
in the industrial sector.
1.6. Background of the Topic
Industrial Internet of Things (IIoT) is defined as the interconnected instruments, sensors and
the diverse categories of instruments which are connected to the industrial applications
(Langone, Setola and Lopez 2017).
1.7. Rationale of Study
IIoT 4.0 devices are deployed across numerous industrial sectors all over the world, and
there are few vulnerabilities related to some of these devices (Mourtzis, Angelopoulos and
Zogopoulos 2019). Thus, this research paper shall be very much beneficial for strategic planners
to understand the vulnerabilities of the IIoT devices.
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
1.8. Purpose of Study
The vulnerabilities of IIoT 4.0 devices can be understood from this dissertation research
paper. The two variables of this research are vulnerability assessment and IIoT 4.0 devices.
1.9. Structure of the Study
Chapter 1: Research questions, objectives, hypothesis and the variables of the research
shall be identified in this chapter.
Chapter 2: Relevant data shall be collected from peer-reviewed articles in this chapter of
the dissertation followed by the literature gap.
Chapter 3: Methods used in the dissertation such as the research design, data collection
and analysis methods, and sampling techniques shall be discussed in this chapter.
Chapter 4: Analysis of the data collected from primary sources shall be analyzed using
graphical representations.
Chapter 5: Analyzed data shall be linked to the research objectives and a list of
recommendations shall be proposed in this chapter.
1.10. Summary
The structure of this dissertation paper can be understood from this chapter of the
dissertation. This chapter also identifies the objects of this research and why this research is
different from the previous other dissertation papers.
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
Chapter 2: Literature Review
The perspectives of renowned scholars who have stated their opinion about the
vulnerabilities of IIoT devices can be understood from this chapter of the dissertation paper.
Critical analysis shall be conducted in this chapter of the dissertation and the gaps of the research
shall also be identified from this chapter of the dissertation as well.
2.1. Introduction
According to Radanliev et al. (2018), unique production networks is one of the prime
vulnerabilities of most of the IIoT 4.0 devices which are used across the industrial sector such as
the cyber-physical systems. The researchers of this paper stated that every industrial sector have
their unique software and hardware configurations due to their operational demands, and it can
cause compatibility with the IIoT 4.0 devices.
On the other hand, as elaborated by Bligh-Wall (2017), communication protocols are the
most significant vulnerabilities of most of the IIoT devices. The researchers stated that
communication protocols such as the Modbus and Profinet which are used in the industrial
sector, detects faults in the IIoT 4.0 devices and it malfunctions the devices as well.
However, as discussed by Akram et al. (2020), social engineering attacks is the most
significant vulnerability related to the use of IIoT 4.0 devices in the industrial sector. The
researchers of the paper stated that the use of outdated hardware can increase thus vulnerability
and can have a devastating effect on the overall production of the industrial sectors.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
2.2. Evolution of IIoT devices
Based on the discussion of Manogaran et al. (2017), the evolution of IIoT devices can be
understood. The scholars of this journal highlighted that the concept of IIoT was incorporated in
the year 1784 with the invention of steam engines (Umar et al. 2018)). In the year 1870, labours
of numerous industries were very much happy due to the incorporation of the IIoT 2.0 devices,
the researchers accepted that the introduction of the IIoT 2.0 devices was very much useful for
the workers of Ford Motors to improve their overall productivity. In the year 1969, IIoT 3.0
devices were introduced across the industrial sectors all around the world, these devices were
very much useful to simplify different business operations. Numerous services were automated
due to the introduction of the IIoT 3.0 devices as per the discussions of this journal. The scholars
stated that IIoT was integrated with an entire business enterprise after the incorporation of the
IIoT 4.0 services in the year 2010.
2.3. Impact of IIoT 4.0 devices
As particularised by Varga et al. (2017), there are numerous subcomponents associated
with most of the IIoT 4.0 devices such as big data, cloud computing, artificial intelligence,
augmented reality, digital scanning, inventory optimization, robotics technology, and sensory
devices. The researchers stated that the introduction of cloud computing has helped the users of
these devices to improve the reliability of the industrial data. Data viewing capability enhance
due to the use of augmented reality as per the discussions of this paper. Decision making
capability in the industrial sector has improved after the introduction of artificial intelligence in
the IIoT 4.0 devices. Categorization of raw data and structure data can be conducted using IIoT
4.0, having abilities similar to big data. 3D printing technology is being used in some of the
industrial organization with the support coming from the IIoT devices (ur Rehman et al. 2018).
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
The researchers also stated that the production of the industrial sector has improved after the
introduction of inventory optimization in the IIoT 4.0 devices. Business challenges faced by the
industries have become much easier due to the use of the robotics and the sensory technologies
in the IIoT 4.0 devices as well.
2.4. Vulnerabilities of IIoT 4.0 devices
As conversed by Cheruvu et al. (2019), there are numerous vulnerabilities associated to
the use of IIoT devices such as the insecure website interface, insecure network services, security
issues coming from the social engineers, insecure cloud interface and the deployment of outdated
hardware and software.
On the other hand, as revealed by Barreto, Amaral and Pereira (2017), missing patches of
the connected software, and management of numerous devices at a time are responsible for most
of the vulnerabilities of the IIoT 4.0 devices. The lack of secure communication challenges can
also lead to the security vulnerabilities as per the discussions of this scholar.
However, as particularised by Kadam and Joshi (2019), insecure network services,
insecure ecosystem interfaces, use of insecure and outdated components, insecure transfer of data
and lack of device management are the most significant vulnerabilities related to the use of the
IIoT 4.0 devices. The selection of the on-device capabilities is also one of the prime reasons
behind the vulnerabilities of the IIoT 4.0 devices. Apart from these concerns, there are numerous
synchronization issues associated to the use of the IIoT 4.0 devices which can also be
categorized as one of the major vulnerabilities of IIoT 4.0.
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
2.5. Disruptions caused due to the vulnerabilities
The entire IIoT market can get affected due to the security vulnerabilities of the IIoT 4.0
devices as per the explanations provided by the researchers of this journal (Akesson, Braganza,
and Root 2018). The factories and the supply chains of the industrial sectors is heavily affected
due to the vulnerabilities of the IIoT devices. As discussed by Zuo et al. (2019), the vision and
the mission of the industrial organizations can also get affected due to the vulnerabilities of the
IIoT 4.0 devices.
As elaborated by Gresham and Sampson (2019), identify authentication of the industrial
sector can get affected due to the security vulnerabilities of the IIoT devices. The researchers
stated that the transport encryption and physical security of the other emerging technologies
which are used in the industrial sector can get affected due to the security vulnerabilities as well.
The researchers of this journal stated that the business operations and manufacturing units of the
industries can be heavily affected due to the vulnerabilities of the IIoT 4.0 devices.
2.6. Acceptance of the disruptions
According to Harwood and Petrić (2019), IIoT 4.0 is helping to improve and optimize the
business operations across numerous industries and some of the industries such as the
manufacturing industries are huge dependent on the use of the IIoT 4.0 devices. The researchers
stated that the acceptance of the disruptions has to be determined very clinically as the
disruptions should not be allowed to minimize the production of the resources working in the
industrial sectors.
Bloomberg and Volpe (2018), highlighted that; based on the disruptions which are caused
due to the vulnerabilities of IIoT 4.0 devices, it can be said that the acceptance of these
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
disruptions can also be examined with the help of emerging technologies such as Artificial
Intelligence and Business Intelligence. The proof of evidence and its documentation must be
show to the strategic planners, network engineers, IT experts and other essential stakeholders of
the industrial sector. The following pictorial illustration shall be very much useful to understand
the process by which acceptance strategies are created in the industrial sectors to deal with the
vulnerabilities of the IIoT 4.0 devices.
Figure 1: Security Forensic Process
(Source: Bloomberg and Volpe 2018)
2.7. Techniques to address the disruptions
As cited by Dougherty et al. (2019), each asset in the Industrial Control System (ICS)
network has to be monitored by the network engineers in order to identify the vulnerability
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
loopholes of the IIoT 4.0 devices. The researchers stated that the changes in the ICS networks
has to be monitored to minimize the security vulnerabilities of the IIoT 4.0 devices.
On the other hand, as discussed by Kennedy (2017), the cybersecurity framework can be
very much useful to secure the network where the IIoT 4.0 devices are connected. The
researchers stated that most of the real-time detection of the vulnerabilities can be carried out
using the visibility and the analysis network. The researchers stated that the security updates has
to be followed by the users of the IIoT 4.0 devices in order to respond to the security
vulnerabilities. The researchers also stated that the visibility of the network must be on the higher
side to combat the vulnerabilities. The paper also helped in understanding that the role of the
IIoT device makers is also very much significant to address the vulnerability of the IIoT devices.
However, as explained by Strauss (2018), advanced sandboxing analysis, virtual
patching, behavioral analysis, and the device integrity monitoring tools are very much useful to
address the disruptions caused due to the vulnerabilities of IIoT 4.0 devices as well. The
researchers of this journal also highlighted that the role of the IT risk strategist to address the
vulnerabilities of the IIoT 4.0 devices.
2.8. Literature Gap
The gaps of the research shall be identified in this section in this section of this chapter.
At the same time, the literature gap can also be very much useful to identify the broader and
specific areas of the research. The literature gap can also be very much useful to identify the
critical thinking ability of the scholars whose journals were selected for the literature review
chapter of this dissertation. Thus, it can be said most of the unexplored data can be identified
from this section of the dissertation.
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
Connectivity issues can have a deep impact on the use of the IIoT 4.0 devices in our
society as well. None of the researchers highlighted that this cause also be one of the prime
reasons behind the vulnerabilities of the IIoT 4.0 devices. Production cycles of the industrial
applications can get delayed due to the vulnerabilities of the IIOT 4.0 devices. Expectation of the
consumers of the industrial sector can get affected due to the vulnerabilities of the IIoT devices
as well. Security of the data points must be improved as the social engineers makes the most of
these data points to compromise the entire network. Maintaining data transparency is very much
significant to address the vulnerabilities of the IIoT 4.0 devices as well.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
Chapter 3: Research Methodology
The procedures which shall be followed in this dissertation paper is explained in this
chapter of the dissertation. The reliability of the dissertation paper depends upon this chapter of
the dissertation, where the analyst has used different tools and methods to collect and analyze
data.
3.1. Introduction
The techniques which were used in the data collection and analysis procedure by the
analyst of this dissertation shall be introduced in this chapter of the dissertation. The selection of
the tools is entirely based on the two constraints associated with this dissertation paper which
will be stated in the concluding sections of this chapter.
3.2. Method Outline
Positivism research philosophy shall be considered as the design of this research paper,
at the same time, it can be said that this dissertation shall only be considering secondary and
primary data collection procedures (Siponen and Tsohou 2018). Probabilistic sampling method
has be considered while selecting the samples for the data collection procedure. Quantitative data
analysis have been considered as the data analysis procedure in this dissertation. Positivism
philosophy have been be considered in this dissertation as the research philosophy.
3.3. Research Philosophy
The phenomenon of gather and analyzing data in a research paper is termed as the
research philosophy (Strauss 2018). There are numerous categories of philosophies which are
considered in the dissertation papers such as realism, positivism and interpretivism. Along with
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
these philosophies, theories and models are also considered while collecting and analysing data.
The philosophy which was chosen in this dissertation paper is positivism.
Justification: Maintaining a well-defined structure throughout the dissertation paper is
one of the main reason behind the selection of this research philosophy. The flexibility of this
dissertation can also be maintained from this research philosophy.
3.4. Research Approach
The approach adopted by the analysts to collect, interpret and analyse collected data is
known as research (Ali and Awad 2018). There are numerous research approaches that are
considered in the dissertation paper such as the abductive approach, the inductive approach and
the deductive approach. The selection of the data collection has to align with the selection of the
research approach. Inductive research approach was selected as the research approach in this
dissertation.
Justification: The ideas and the concepts from the secondary sources can be interpreted
in an organized modus using this research approach. All the concepts from the secondary sources
can be measured quantitatively using this approach. The theories and the patterns of both the
primary and secondary data can be analyzed using this approach as well. The relationship
between the concepts of the secondary sources and the two variables of this dissertation paper
can also be identified using this approach.
3.5. Research Design
The framework which helps the analyst of research to conduct all the activities required
for a dissertation paper is known as the research design (Thames and Schaefer 2017). The
selection of the research design depends upon the selection of the research variables. There are
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
numerous research designs that are considered in dissertation papers such as explanatory design,
exploratory design, experimental design and systematic review. The research design, which was
selected in this dissertation paper is exploratory design.
Justification:
3.6. Data Collection Process
Justification:
3.7. Data Analysis Techniques
Justification:
3.8. Ethical Consideration
3.9. Research Limitations
3.10. Summary
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
Chapter 4: Data Analysis, Findings and Interpretation
4.1. Introduction
4.2. Findings
4.2.1 Findings from demographic questions
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
4.2.2 Findings from Quantitative Analysis
4.3. Summary
Chapter 5: Conclusion and Recommendations
5.1. Conclusions
5.2. Linking with Objectives
Objective 1:
Objective 2:
Objective 3:
Objective 4:
5.3. Recommendations
5.4. Limitations of Study
5.5. Further Scope of Study
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
6. References
Akesson, B., Braganza, M. and Root, J., 2018. Is theory development essential for the social
work dissertation?. Social Work Education, 37(2), pp.209-222.
Akram, M.A., Mahmood, K., Kumari, S. and Xiong, H., 2020. Comment on “Towards Secure
and Provable Authentication for Internet of Things: Realizing Industry 4.0”. IEEE Internet of
Things Journal.
Ali, B. and Awad, A.I., 2018. Cyber and physical security vulnerability assessment for IoT-based
smart homes. Sensors, 18(3), p.817.
Barreto, L., Amaral, A. and Pereira, T., 2017. Industry 4.0 implications in logistics: an overview.
Procedia Manufacturing, 13, pp.1245-1252.
Bligh-Wall, S., 2017. Industry 4.0: Security imperatives for IoT—converging networks,
increasing risks. Cyber security: a peer-reviewed journal, 1(1), pp.61-68.
Bloomberg, L.D. and Volpe, M., 2018. Completing your qualitative dissertation: A road map
from beginning to end. Sage Publications.
Cheruvu, S., Kumar, A., Smith, N. and Wheeler, D.M., 2019. Demystifying Internet of Things
Security: Successful IoT Device/Edge and Platform Security Deployment. Apress.
Dougherty, M.R., Slevc, L.R. and Grand, J.A., 2019. Making research evaluation more
transparent: Aligning research philosophy, institutional values, and reporting. Perspectives on
Psychological Science, 14(3), pp.361-375.
Gresham, G. and Sampson, P., 2019. Women Superintendent Research: 2014-2016 Dissertation
Literature Review Content Analysis. Athens Journal of Education, 6(4), pp.257-270.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
Harwood, N. and Petrić, B., 2019. Helping international master’s students navigate dissertation
supervision: Research-informed discussion and awareness-raising activities. Journal of
International Students, 9(1), pp.150-171.
Kadam, A. and Joshi, S., 2019. Introduction to design dissertation & research methodology.
Kennedy, A.M., 2017. Macro-social marketing research: philosophy, methodology and methods.
Journal of Macromarketing, 37(4), pp.347-355.
Langone, M., Setola, R. and Lopez, J., 2017, July. Cybersecurity of wearable devices: an
experimental analysis and a vulnerability assessment method. In 2017 IEEE 41st annual
computer software and applications conference (COMPSAC) (Vol. 2, pp. 304-309). IEEE.
Leander, B., Čaušević, A. and Hansson, H., 2019, August. Applicability of the IEC 62443
standard in Industry 4.0/IIoT. In Proceedings of the 14th International Conference on
Availability, Reliability and Security (pp. 1-8).
Manogaran, G., Thota, C., Lopez, D. and Sundarasekar, R., 2017. Big data security intelligence
for healthcare industry 4.0. In Cybersecurity for Industry 4.0 (pp. 103-126). Springer, Cham.
Mourtzis, D., Angelopoulos, K. and Zogopoulos, V., 2019. Mapping Vulnerabilities in the
Industrial Internet of Things Landscape. Procedia CIRP, 84, pp.265-270.
Radanliev, P., De Roure, D., Cannady, S., Montalvo, R.M., Nicolescu, R. and Huth, M., 2018.
Economic impact of IoT cyber risk-analysing past and present to predict the future developments
in IoT risk analysis and IoT cyber insurance.
Document Page
VULNERABILITY ASSESSMENT OF IIOT 4.0 DEVICES
Radanliev, P., De Roure, D., Nurse, J.R., Nicolescu, R., Huth, M., Cannady, S. and Montalvo,
R.M., 2018. Integration of cyber security frameworks, models and approaches for building
design principles for the internet-of-things in industry 4.0.
Siponen, M. and Tsohou, A., 2018. Demystifying the influential IS legends of positivism.
Journal of the Association for Information Systems, 19(7).
Strauss, L., 2018. Leo Strauss on Political Philosophy: Responding to the Challenge of
Positivism and Historicism. University of Chicago Press.
Thames, L. and Schaefer, D., 2017. Cybersecurity for industry 4.0. New York: Springer.
Umar, B., Hejazi, H., Lengyel, L. and Farkas, K., 2018. Evaluation of IoT Device Management
Tools. In The Third International Conference on Advances in Computation, Communications
and Services.
ur Rehman, M.H., Ahmed, E., Yaqoob, I., Hashem, I.A.T., Imran, M. and Ahmad, S., 2018. Big
data analytics in industrial IoT using a concentric computing model. IEEE Communications
Magazine, 56(2), pp.37-43.
Varga, P., Plosz, S., Soos, G. and Hegedus, C., 2017, May. Security threats and issues in
automation IoT. In 2017 IEEE 13th International Workshop on Factory Communication Systems
(WFCS) (pp. 1-6). IEEE.
Zuo, C., Wen, H., Lin, Z. and Zhang, Y., 2019, November. Automatic Fingerprinting of
Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps. In Proceedings of the 2019
ACM SIGSAC Conference on Computer and Communications Security (pp. 1469-1483).
chevron_up_icon
1 out of 24
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]