{"id":"https://openalex.org/W2980701762","doi":"https://doi.org/10.1109/etfa.2019.8869162","title":"Cybersecurity Challenges in Large Industrial IoT Systems","display_name":"Cybersecurity Challenges in Large Industrial IoT Systems","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2980701762","doi":"https://doi.org/10.1109/etfa.2019.8869162","mag":"2980701762"},"language":"en","primary_location":{"id":"doi:10.1109/etfa.2019.8869162","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2019.8869162","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006870800","display_name":"Bj\u00f6rn Leander","orcid":"https://orcid.org/0000-0003-2488-5774"},"institutions":[{"id":"https://openalex.org/I82509713","display_name":"M\u00e4lardalen University","ror":"https://ror.org/033vfbz75","country_code":"SE","type":"education","lineage":["https://openalex.org/I82509713"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Bjorn Leander","raw_affiliation_strings":["M\u00e4lardalen University, V\u00e4ster\u00e5s, Sweden"],"affiliations":[{"raw_affiliation_string":"M\u00e4lardalen University, V\u00e4ster\u00e5s, Sweden","institution_ids":["https://openalex.org/I82509713"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036639382","display_name":"Aida \u010cau\u0161evi\u0107","orcid":"https://orcid.org/0000-0001-5293-3804"},"institutions":[{"id":"https://openalex.org/I82509713","display_name":"M\u00e4lardalen University","ror":"https://ror.org/033vfbz75","country_code":"SE","type":"education","lineage":["https://openalex.org/I82509713"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Aida Causevic","raw_affiliation_strings":["M\u00e4lardalen University, V\u00e4ster\u00e5s, Sweden"],"affiliations":[{"raw_affiliation_string":"M\u00e4lardalen University, V\u00e4ster\u00e5s, Sweden","institution_ids":["https://openalex.org/I82509713"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010093986","display_name":"Hans Hansson","orcid":"https://orcid.org/0000-0002-7235-6888"},"institutions":[{"id":"https://openalex.org/I82509713","display_name":"M\u00e4lardalen University","ror":"https://ror.org/033vfbz75","country_code":"SE","type":"education","lineage":["https://openalex.org/I82509713"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Hans Hansson","raw_affiliation_strings":["M\u00e4lardalen University, V\u00e4ster\u00e5s, Sweden"],"affiliations":[{"raw_affiliation_string":"M\u00e4lardalen University, V\u00e4ster\u00e5s, Sweden","institution_ids":["https://openalex.org/I82509713"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006870800"],"corresponding_institution_ids":["https://openalex.org/I82509713"],"apc_list":null,"apc_paid":null,"fwci":0.8316,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.74235952,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1035","last_page":"1042"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.7708277106285095},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7287637591362},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.669967532157898},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.6536791324615479},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.645698070526123},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5504003763198853},{"id":"https://openalex.org/keywords/stride","display_name":"STRIDE","score":0.5353973507881165},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.525611400604248},{"id":"https://openalex.org/keywords/digital-transformation","display_name":"Digital transformation","score":0.5153100490570068},{"id":"https://openalex.org/keywords/industry-4.0","display_name":"Industry 4.0","score":0.4875580668449402},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.45325028896331787},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.42196744680404663},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.4152734875679016},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.39250099658966064},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.36033210158348083},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.2168169617652893},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17667549848556519},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11450314521789551},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08689820766448975},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.0797906219959259}],"concepts":[{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.7708277106285095},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7287637591362},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.669967532157898},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.6536791324615479},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.645698070526123},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5504003763198853},{"id":"https://openalex.org/C18007350","wikidata":"https://www.wikidata.org/wiki/Q7394815","display_name":"STRIDE","level":2,"score":0.5353973507881165},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.525611400604248},{"id":"https://openalex.org/C126082660","wikidata":"https://www.wikidata.org/wiki/Q4252370","display_name":"Digital transformation","level":2,"score":0.5153100490570068},{"id":"https://openalex.org/C2777986313","wikidata":"https://www.wikidata.org/wiki/Q1661989","display_name":"Industry 4.0","level":2,"score":0.4875580668449402},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.45325028896331787},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.42196744680404663},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.4152734875679016},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.39250099658966064},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.36033210158348083},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2168169617652893},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17667549848556519},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11450314521789551},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08689820766448975},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0797906219959259},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/etfa.2019.8869162","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2019.8869162","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6700000166893005,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W619809756","https://openalex.org/W1505337087","https://openalex.org/W2065955975","https://openalex.org/W2077121139","https://openalex.org/W2103475226","https://openalex.org/W2112995928","https://openalex.org/W2117307746","https://openalex.org/W2126848481","https://openalex.org/W2138001464","https://openalex.org/W2146749986","https://openalex.org/W2152605584","https://openalex.org/W2181407521","https://openalex.org/W2295939521","https://openalex.org/W2392113277","https://openalex.org/W2418285495","https://openalex.org/W2472333518","https://openalex.org/W2603425044","https://openalex.org/W2619779390","https://openalex.org/W2765739766","https://openalex.org/W2790284307","https://openalex.org/W2803355698","https://openalex.org/W2805611890","https://openalex.org/W4234706188","https://openalex.org/W4244983850","https://openalex.org/W4246035675","https://openalex.org/W4246754147","https://openalex.org/W6681922910"],"related_works":["https://openalex.org/W4283524929","https://openalex.org/W4380633315","https://openalex.org/W2932552503","https://openalex.org/W2971541747","https://openalex.org/W2899216022","https://openalex.org/W4234158395","https://openalex.org/W3136920987","https://openalex.org/W2899432044","https://openalex.org/W3113125424","https://openalex.org/W4283792068"],"abstract_inverted_index":{"To":[0],"achieve":[1],"efficient":[2],"and":[3,120],"flexible":[4],"production":[5],"at":[6],"affordable":[7],"prices,":[8],"industrial":[9],"automation":[10],"is":[11,44],"pushed":[12],"towards":[13,51],"a":[14,18,30,47,81,87,121,130],"digital":[15],"transformation.":[16],"Such":[17],"transformation":[19],"assumes":[20],"an":[21,36,78,101],"enhancement":[22],"of":[23,33,39,61,80,113,116,123],"current":[24,114],"Industrial":[25,37],"Automated":[26],"Control":[27],"Systems":[28],"with":[29,69,127,135],"large":[31],"amount":[32],"IoT-devices,":[34],"forming":[35],"Internet":[38],"Things":[40],"(IIoT).":[41],"The":[42],"aim":[43],"to":[45,71,96,129],"enable":[46],"shift":[48],"from":[49],"automatic":[50],"autonomous":[52],"control":[53],"in":[54,77,100,110],"such":[55],"systems.":[56],"This":[57],"paper":[58],"discusses":[59],"some":[60,136],"the":[62,93,105,111,117],"main":[63],"challenges":[64,124],"IIoT":[65,102,132],"systems":[66],"are":[67,108,125],"facing":[68],"respect":[70,128],"cybersecurity.":[72],"We":[73],"discuss":[74],"our":[75],"findings":[76],"example":[79],"flow-control":[82],"loop,":[83],"where":[84],"we":[85],"apply":[86],"simple":[88],"threat":[89],"model":[90],"based":[91],"on":[92],"STRIDE":[94],"method":[95],"deduce":[97],"cybersecurity":[98],"requirements":[99,107],"context.":[103],"Moreover,":[104],"identified":[106],"assessed":[109],"light":[112],"state":[115],"art":[118],"solutions,":[119],"number":[122],"discussed":[126],"large-scale":[131],"system,":[133],"together":[134],"suggestions":[137],"for":[138],"future":[139],"work.":[140]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
