{"id":"https://openalex.org/W3113092866","doi":"https://doi.org/10.1109/tii.2020.3045393","title":"Combinatorial Analysis for Securing IoT-Assisted Industry 4.0 Applications From Vulnerability-Based Attacks","display_name":"Combinatorial Analysis for Securing IoT-Assisted Industry 4.0 Applications From Vulnerability-Based Attacks","publication_year":2020,"publication_date":"2020-12-17","ids":{"openalex":"https://openalex.org/W3113092866","doi":"https://doi.org/10.1109/tii.2020.3045393","mag":"3113092866"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2020.3045393","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2020.3045393","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020528398","display_name":"Gemini George","orcid":"https://orcid.org/0000-0001-5367-9588"},"institutions":[{"id":"https://openalex.org/I20497027","display_name":"Cochin University of Science and Technology","ror":"https://ror.org/00a4kqq17","country_code":"IN","type":"education","lineage":["https://openalex.org/I20497027"]},{"id":"https://openalex.org/I68695296","display_name":"Indian Institute of Information Technology and Management, Kerala","ror":"https://ror.org/02w9cdh50","country_code":"IN","type":"education","lineage":["https://openalex.org/I68695296"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Gemini George","raw_affiliation_strings":["Cochin University of Science and Technology, Kochi, India","Department of Computer Science, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India"],"affiliations":[{"raw_affiliation_string":"Cochin University of Science and Technology, Kochi, India","institution_ids":["https://openalex.org/I20497027"]},{"raw_affiliation_string":"Department of Computer Science, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India","institution_ids":["https://openalex.org/I68695296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016838632","display_name":"Sabu M. Thampi","orcid":"https://orcid.org/0000-0001-6453-5520"},"institutions":[{"id":"https://openalex.org/I68695296","display_name":"Indian Institute of Information Technology and Management, Kerala","ror":"https://ror.org/02w9cdh50","country_code":"IN","type":"education","lineage":["https://openalex.org/I68695296"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sabu M. Thampi","raw_affiliation_strings":["Department of Computer Science, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India","institution_ids":["https://openalex.org/I68695296"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5020528398"],"corresponding_institution_ids":["https://openalex.org/I20497027","https://openalex.org/I68695296"],"apc_list":null,"apc_paid":null,"fwci":3.2028,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.93498253,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"18","issue":"1","first_page":"3","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7955907583236694},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.6689911484718323},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.5905463099479675},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5278546810150146},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.496650755405426},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.47328776121139526},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4533523619174957},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4170157313346863},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37504100799560547},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.36914873123168945},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.15290895104408264}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7955907583236694},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.6689911484718323},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.5905463099479675},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5278546810150146},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.496650755405426},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.47328776121139526},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4533523619174957},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4170157313346863},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37504100799560547},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.36914873123168945},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.15290895104408264},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2020.3045393","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2020.3045393","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2002323397","https://openalex.org/W2011284636","https://openalex.org/W2012446724","https://openalex.org/W2030014066","https://openalex.org/W2039427951","https://openalex.org/W2045540560","https://openalex.org/W2049084163","https://openalex.org/W2053944475","https://openalex.org/W2054127354","https://openalex.org/W2101438812","https://openalex.org/W2117694832","https://openalex.org/W2121805588","https://openalex.org/W2131875370","https://openalex.org/W2132243817","https://openalex.org/W2293605433","https://openalex.org/W2322343903","https://openalex.org/W2323890320","https://openalex.org/W2383813018","https://openalex.org/W2416799949","https://openalex.org/W2508317201","https://openalex.org/W2583713343","https://openalex.org/W2596636257","https://openalex.org/W2767794223","https://openalex.org/W2792715678","https://openalex.org/W2796215551","https://openalex.org/W2875475762","https://openalex.org/W2887949427","https://openalex.org/W2889253201","https://openalex.org/W2912359980","https://openalex.org/W2921018545","https://openalex.org/W2963273426","https://openalex.org/W2963654300","https://openalex.org/W2969468102","https://openalex.org/W2990361863","https://openalex.org/W3004864907","https://openalex.org/W3009857025","https://openalex.org/W6679383015","https://openalex.org/W6758251666"],"related_works":["https://openalex.org/W1657880117","https://openalex.org/W2595172197","https://openalex.org/W2127970246","https://openalex.org/W2084856301","https://openalex.org/W1001352512","https://openalex.org/W4382618745","https://openalex.org/W2885125400","https://openalex.org/W1989889224","https://openalex.org/W2748922771","https://openalex.org/W2141280631"],"abstract_inverted_index":{"Modern":[0],"Internet":[1],"of":[2,14,23,36,84,113,133,146,150,168,182,189],"Things":[3],"(IoT)-assisted":[4],"networks":[5,82],"deploy":[6],"many":[7],"critical":[8,41],"computing":[9,30],"devices":[10,31,78,136],"in":[11,79,89,105,199],"the":[12,15,21,47,72,76,80,85,90,122,138,143,148,153,187,209],"edge":[13,77],"network":[16,24],"so":[17,173],"as":[18,38,174],"to":[19,54,63,75,100,130,163,170,175,197,207],"mitigate":[20],"bottleneck":[22],"latency":[25],"and":[26,58,93],"bandwidth":[27],"outage.":[28],"Such":[29],"have":[32,53],"become":[33],"attractive":[34],"targets":[35,178],"attackers,":[37],"they":[39],"derive":[40],"insights":[42],"that":[43],"can":[44],"often":[45],"regulate":[46],"underlying":[48],"industrial":[49],"processes.":[50],"Security":[51],"administrators":[52],"analyze":[55],"vulnerable":[56],"configurations,":[57],"evaluate":[59],"feasible":[60],"hardening":[61],"options":[62],"secure":[64],"such":[65,106],"systems.":[66],"In":[67],"this":[68],"article,":[69],"we":[70,125,159],"investigate":[71],"security":[73,98,118],"threats":[74],"IoT-assisted":[81],"because":[83],"inherent":[86],"vulnerabilities":[87,169],"present":[88],"IoT":[91],"devices,":[92,124],"formulate":[94],"a":[95,111,127,165,204],"novel":[96],"graphical":[97],"model":[99],"conduct":[101],"vulnerability-based":[102],"risk":[103],"assessment":[104],"networks.":[107],"We":[108],"further":[109],"propose":[110,126,160],"set":[112,167],"combinatorial":[114],"optimization":[115],"techniques":[116],"for":[117],"hardening.":[119],"For":[120,155],"securing":[121],"target":[123,135],"randomized":[128],"algorithm":[129,141,162],"enforce":[131],"isolation":[132],"potential":[134,177],"from":[137],"attackers.":[139],"The":[140,184],"produces":[142],"least":[144],"number":[145],"vulnerabilities,":[147],"removal":[149],"which":[151,194],"protects":[152],"targets.":[154],"densely":[156],"connected":[157],"networks,":[158],"another":[161],"identify":[164],"minimal":[166],"be":[171],"hardened":[172],"keep":[176],"below":[179],"admissible":[180],"levels":[181],"risk.":[183],"approach":[185],"includes":[186],"formulation":[188],"an":[190],"integer":[191],"linear":[192],"program,":[193],"is":[195],"relaxed":[196],"solve":[198],"polynomial":[200],"time,":[201],"followed":[202],"by":[203],"round-off":[205],"technique":[206],"find":[208],"actual":[210],"solution.":[211]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
