The extensive deployment of Internet of Things (IoT) devices enables data exchange of modern objects across our everyday lives, as a result, it introduces new use cases in smart cities, smart homes, smart grids, health, cyber-physical systems (CPS), and industrial IoT (IIoT). Thanks to the rise of Industry 4.0, which facilitates IoT developments by employing intelligent, interconnected cyber-physical systems to automate industrial operations. It is worth mentioning that IIoT improves efficiency, reliability, and economical benefits through IoT-enabled CPS however, it also introduces new challenges regarding security aspects by increasing the attack landscape. The complexity of an IIoT system also makes the efforts to secure the system harder. This is mainly because in IIOT significant amount of (heterogeneous) information is gathered from different sources, and each of them requires specific techniques and solutions.
IIoT can also be considered as a critical building block for the agri-food supply chain due to its pervasiveness, interoperability, and scalability. The key building blocks of a smart agri-food supply chain are as IoT and blockchain. Attacks in the IIoT may result in abnormal behaviour in the system, which may compromise physical security, damage equipment as well as can cause financial losses. Due to the distributed nature and size of IIoT networks, conventional cryptographic / security solutions may not be beneficial. Therefore, self-aware approaches are required to protect the distributed infrastructure from malicious network attacks and unauthorized access. Contemporary Artificial Intelligence (AI) techniques, such as deep learning, machine learning, and reinforcement learning, have already been found to be useful in detecting anomalous patterns from a large amount of data and, thus, capable of employing self-awareness to identify cyber-attacks from the captured data.
To enhance the knowledge of current IoT engineers and future IoT users, there is a need to summarize the state-of-the-art techniques and possible challenges in IIoT security. This handbook will focus on cutting-edge research from both academia and industry with an emphasis on the scientific and engineering techniques which employ modern AI techniques for securing IIOT. Specifically, this book welcomes two categories of papers: (1) invited articles from qualified experts, and (2) contributed papers from an open call with a list of addressed topics. Topics of interest include but are not limited to:
Each paper submitted will be reviewed by editors and independent experts based on the relevance to the topics of the book and its usefulness for a wider range of audience Research novelty (e.g. new techniques) and potential impact Readability. All chapters should follow the Springer manuscript format as follows:
https://www.springer.com/gp/authors-editors/book-authors-editors/resources-guidelines/book-manuscript-guidelines/manuscript-preparation/5636
Important Dates:
For more information, please contact Dr. Hadis Karimipour ([email protected])