Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review
Abstract
:1. Introduction
1.1. Motivation
1.2. Contribution
1.3. Paper Organization
2. Related Studies
3. Research Methodology
3.1. Planning Review
3.2. Research Goals
3.3. Selection of Primary Studies
3.4. Selection/Search Criteria
3.5. Inclusion and Exclusion Criteria
3.6. Selection Results
3.7. Data Extraction and Synthesis Process
4. Results
4.1. RQ1: Contributions of WSN in IR 4.0
4.2. RQ2: Contributions of IoT in IR 4.0
4.3. RQ3: Type of WSN Coverage Area for IR 4.0
4.3.1. Area Coverage
4.3.2. Barrier Coverage
4.3.3. Point Coverage
4.4. RQ4: Classification of Network Intruders
4.4.1. Solo Entities
4.4.2. Organized Groups
4.4.3. Intelligence Agencies
4.5. RQ5: Network Security Attack in IoT and WSN Layers
4.5.1. Denial of Service Attacks (DOS)
4.5.2. Replay Attacks
4.5.3. Trojan Worms, Viruses, and Malware
4.5.4. Black Hole Attacks
4.5.5. Sink Hole Attacks
4.5.6. Wormhole Attacks
4.5.7. Selective Forwarding (Gray Hole)
4.6. RQ6: Issues in WSN and IoT Frameworks
4.6.1. Security
4.6.2. Data Confidentiality and Privacy
4.6.3. Data Acquisition and Transmission
4.6.4. Resource Limitations
4.6.5. Quality of Service
4.6.6. Tampering
4.6.7. Authorization and Authentication
4.7. RQ7: Limitations of the Literature Review
5. Challenges and Open Issues
6. Future Directions
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Khorov, E.; Lyakhov, A.; Andrey, A.K.; Guschin, A. A survey on IEEE 802.11ah: An enabling networking technology for smart cities. J. Comput. Commun. 2015, 58, 53–69. [Google Scholar] [CrossRef]
- Ashibani, Y.; Mahmoud, Q.H. Cyber physical systems security: Analysis, challenges and solutions. Comput. Secur. 2017, 68, 81–97. [Google Scholar] [CrossRef]
- Ahmad, W.; Rasool, A.; Javed; Baker, A.R.T.; Jalil, Z. Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey. Electronics 2022, 11, 16. [Google Scholar] [CrossRef]
- Landaluce, H.; Arjona, L.; Perallos, A.; Falcone, F.; Angulo, I.; Muralter, F. A review of iot sensing applications and challenges using RFID and wireless sensor networks. J. Sens. 2020, 20, 2495. [Google Scholar] [CrossRef] [PubMed]
- Dalipi, F.; Yayilgan, S.Y. Security and privacy considerations for IoT application on smart grids: Survey and research challenges. In Proceedings of the Future Internet of Things and Cloud Workshops (FiCloudW), Vienna, Austria, 22–24 August 2016; pp. 63–68. [Google Scholar]
- Tuna, G.; Gungor, V.C. A survey on deployment techniques, localization algorithms, and research challenges for underwater acoustic sensor networks. J. Commun. Syst. 2017, 30, e3350. [Google Scholar] [CrossRef]
- Faheem, M.; Tuna, G.; Gungor, V.C. Lrp: Link quality-aware queue-based spectral clustering routing protocol for underwater acoustic sensor networks. J. Commun. Syst. 2017, 30, e3257. [Google Scholar] [CrossRef]
- Parra, L.; Sendra, S.; Lloret, J.; Rodrigues, J.J. Design and deployment of a smart system for data gathering in aquaculture tanks using wireless sensor networks. J. Commun. Syst. 2017, 30, e3335. [Google Scholar] [CrossRef]
- Sharma, R.; Prakash, S. Enhancement of relay nodes communication approach in WSN-IoT for underground coal mine. J. Inf. Optim. Sci. 2020, 41, 521–531. [Google Scholar] [CrossRef]
- Rashid, B.; Rehmani, M.H. Applications of wireless sensor networks for urban areas: A survey. J. Netw. Comput. Appl. 2016, 60, 192–219. [Google Scholar] [CrossRef]
- Ravi, C.; Tigga, A.; Reddy, G.T.; Hakak, S.; Alazab, M. Driver Identification Using Optimized Deep Learning Model in Smart Transportation. ACM Trans. Internet Technol. 2020. [Google Scholar] [CrossRef]
- Tandale, U.; Momin, B.; Seetharam, D.P. An empirical study of application layer protocols for IoT. In Proceedings of the International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, India, 1–2 August 2017; pp. 2447–2451. [Google Scholar]
- Kumar, R.; Kumar, P.; Srivastava, G.; Gupta, G.P.; Tripathi, R.; Gadekallu, T.R.; Xiong, N.N. PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2326–2341. [Google Scholar] [CrossRef]
- Farsi, M.; Daneshkhah, A.; Hosseinian-Far, A.; Jahankhani, H. (Eds.) Digital Twin Technologies and Smart Cities; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
- Majeed, M.A.A.; Rupasinghe, T.D. Internet of things (IoT) embedded future supply chains for Industry 4.0: An assessment from an ERP-based fashion apparel and footwear industry. Int. J. Supply Chain. Manag. 2017, 6, 25–40. [Google Scholar]
- Oliff, H.; Liu, Y. Towards Industry 4.0 Utilizing Data-Mining Techniques: A Case Study on Quality Improvement. Procedia CIRP 2017, 63, 167–172. [Google Scholar] [CrossRef]
- Ovsthus, A.A.K.S.K.; Kristensen, L.M. An Industrial Perspective on Wireless Sensor Networks—A Survey of Requirements, Protocols, and Challenges. IEEE Commun. Surv. Tutor. 2014, 16, 1391–1412. [Google Scholar]
- Muneeba, N.; Javed, A.R.; Tariq, M.A.; Asim, M.; Baker, T. Feature engineering and deep learning-based intrusion detection framework for securing edge IoT. J. Super Comput. 2022, 1–15. [Google Scholar]
- Osterrieder, P.; Budde, L.; Friedli, T. The smart factory as a key construct of Industry 4.0: A systematic literature review. Int. J. Prod. Econ. 2020, 221, 107476. [Google Scholar] [CrossRef]
- Devesh, M.; Kant, A.K.; Suchit, Y.R.; Tanuja, P.; Kumar, S.N. Fruition of CPS and IoT in Context of Industry 4.0. In Intelligent Communication, Control and Devices; Springer: Singapore, 2020; pp. 367–375. [Google Scholar]
- Saniuk, S.; Grabowska, S.; Gajdzik, B. Social expectations and market changes in the context of developing the Industry 4.0 concept. J. Sustain. 2020, 12, 1362. [Google Scholar] [CrossRef] [Green Version]
- Deepa, N.; Pham, Q.V.; Nguyen, D.C.; Bhattacharya, S.; Prabadevi, B.; Gadekallu, T.R.; Pathirana, P.N. A survey on blockchain for big data: Approaches, opportunities, and future directions. Future Gener. Comput. Syst. 2022, 131, 209–226. [Google Scholar] [CrossRef]
- Number of Internet of Things (IoT) Connected Devices Worldwide from 2019 to 2030. 2021. Available online: https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/ (accessed on 21 January 2022).
- Jovanović, B. Key IoT Statistics. 2021. Available online: Https://dataprot.net/statistics/iot-statistics/ (accessed on 20 December 2021).
- AI Multiple. 30 Internet of Things—IoT Stats from Reputable Sources in 2021. Available online: https://research.aimultiple.com/iot-stats/ (accessed on 21 February 2022).
- O’Dea, S. Wide-Area and Short-Range IoT Devices Installed Base Worldwide 2014–2026. 2021. Available online: Https://www.statista.com/statistics/1016276/wide-area-and-short-range-iot-device-installed-base-worldwide/ (accessed on 14 December 2021).
- Pundir, S.; Wazid, M.; Singh, D.P.; Das, A.K.; Rodrigues, J.J.P.C.; Park, Y. Intrusion Detection Protocols in Wireless Sensor Networks Integrated to the Internet of Things Deployment: Survey and Future Challenges. IEEE Access 2020, 8, 3343–3363. [Google Scholar] [CrossRef]
- Kumar, S.; Tiwari, P.; Zymbler, M. Internet of Things is a revolutionary approach for future technology enhancement: A review. J. Big Data 2019, 6, 1–21. [Google Scholar] [CrossRef] [Green Version]
- Musaab Zaidan, A.; Bahaa, A.; Talal, B.; Kiah, M.M.; Laiha, M. A Review of Smart Home Applications based on Internet of Things. J. Netw. Comput. Appl. 2017, 97, 48–65. [Google Scholar]
- Raza, S.; Faheem, M.; Genes, M. Industrial wireless sensor and actuator networks in Industry 4.0: Exploring requirements, protocols, and challenges—A MAC survey. Int. J. Commun. Syst. 2019, 32, 1–32. [Google Scholar] [CrossRef]
- Misra, G.; Kumar, V.; Agarwal, A.; Agarwal, K. Internet of things (IoT): A technological analysis and survey on vision, concepts, challenges, innovation directions, technologies, and applications. Am. J. Electr. Electron. Eng. 2016, 4, 2332. [Google Scholar]
- Singh, A.; Sharma, T.P. A survey on area coverage in wireless sensor networks. In Proceedings of the International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kanyakumari District, India, 10–11 July 2014. [Google Scholar]
- Gendreau, A.A.; Moorman, M. Survey of intrusion detection system towards an end-to-end secure internet of things. In Proceedings of the IEEE 4th International Conference on Future Internet of Things and Cloud, Rome, Italy, 23–25 August 2016; pp. 84–90. [Google Scholar]
- Kibirige, W.G. A Survey on Detection of Sinkhole Attack in Wireless Sensor Network; Department of Informatics Sokoine University of Agriculture: SUA Morogoro, Tanzania, 2015. [Google Scholar]
- Butun, I.; Österberg, P.; Song, H. Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures. IEEE Commun. Surv. Tutor. 2020, 22, 616–644. [Google Scholar] [CrossRef] [Green Version]
- Pamarthi, S.; Narmadha, R. Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: Network attacks and detection mechanisms. Int. J. Intell. Unmanned Syst. 2021; ahead-of-print. [Google Scholar]
- Parvathy, K. Wormhole Attacks in Wireless Sensor Networks (WSN) & Internet of Things (IoT): A Review. Int. J. Recent Technol. Eng. (IJRTE) 2021, 10. [Google Scholar]
- Ayotunde, A.F. Internet of Things security: A survey. J. Netw. Comput. Appl. 2017, 8, 10–28. [Google Scholar]
- Granjal, J.; Monteiro, E.; Silva, J. Security for the Internet of things: A survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 2015, 17, 1294–1312. [Google Scholar] [CrossRef]
- Sharmaa, V.; Patelb, R.B.; Bhadauriaa, H.S.; Prasadc, D. Deployment schemes in wireless sensor network to achieve blanket coverage in large-scale open area: A review. Egypt. Inform. J. 2016, 17, 45–56. [Google Scholar] [CrossRef] [Green Version]
- Trotta, D.; Garengo, P. Industry 4.0 key research topics: A bibliometric review. In Proceedings of the 2018 7th International Conference on Industrial Technology and Management (ICITM), Oxford, UK, 7–9 May 2018; pp. 113–117. [Google Scholar]
- Iwendi, C.; Jalil, Z.; Javed, A.R.; Reddy, T.; Kaluri, R.; Srivastava, G.; Jo, O. Keysplitwatermark: Zero watermarking algorithm for software protection against cyber-attacks. IEEE Access 2020, 8, 72650–72660. [Google Scholar] [CrossRef]
- Wang, W.; Qiu, C.; Yin, Z.; Srivastava, G.; Gadekallu, T.R.; Alsolami, F.; Su, C. Blockchain and PUF-based Lightweight Authentication Protocol for Wireless Medical Sensor Networks. IEEE Internet Things 2021. [Google Scholar] [CrossRef]
- Hina, M.; Ali, M.; Javed, A.R.; Srivastava, G.; Gadekallu, T.R.; Jalil, Z. Email Classification and Forensics Analysis using Machine Learning. In Proceedings of the IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced & Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, Atlanta, GA, USA, 18–21 October 2021; pp. 630–635. [Google Scholar]
- Javed, A.R.; Beg, M.O.; Asim, M.; Baker, T.; Al-Bayatti, A.H. Alphalogger: Detecting motion-based side-channel attack using smartphone keystrokes. J. Ambient. Intell. Humaniz. Comput. 2020, 1–14. [Google Scholar] [CrossRef] [Green Version]
- Azmoodeh, A.; Dehghantanha; Choo, K.K.R. Robust malware detection for Internet of (battlefield) Things devices using deep eigenspace learning. IEEE Trans. Sustain. Comput. 2019, 4, 88–95. [Google Scholar] [CrossRef]
- Wu, Y.; Dai, H.N.; Wang, H. Convergence of Blockchain and Edge Computing for Secure and Scalable IIoT Critical Infrastructures in Industry 4.0. IEEE Internet Things J. 2020, 8, 2300–2317. [Google Scholar] [CrossRef]
- Ghayvat, H.; Mukhopadhyay, S.; Gui, X.; Suryadevara, N. WSN-and IoT-based smart homes and their extension to intelligent building. Sjpurnal Sens. 2015, 15, 10350–10379. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Faheem, M. Bio-inspired routing protocol for WSN-based smart grid applications in the context of Industry 4.0. Trans. Emerg. Telecommun. Technol. 2019, 30, 1–24. [Google Scholar] [CrossRef]
- Periša, M.; Kuljanić, T.M.; Cvitić, I.; Kolarovszki, P. Conceptual model for informing user with an innovative smart wearable device in Industry 4.0. J. Wireess Netw. 2019, 9, 1615–1626. [Google Scholar] [CrossRef]
- Kumar, R.; Kumar, P.; Tripathi, R.; Gupta, G.P.; Gadekallu, T.R.; Srivastava, G. Sp2f: A secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. J. Comput. Netw. 2020, 187, 10781. [Google Scholar] [CrossRef]
- Khan, A.; Aziz, S.; Bashir, M.; Khan, M.U. IoT and Wireless Sensor Network based Autonomous Farming Robot. In Proceedings of the International Conference on Emerging Trends in Smart Technologies (ICETST), Karachi, Pakistan, 26–27 March 2020; pp. 1–5. [Google Scholar]
- Chen, C.T.; Lee, C.C.; Lin, I.C. Efficient and secure three-party mutual authentication key agreement protocol for WSN in IoT environments. PLoS ONE 2020, 15, e0232277. [Google Scholar]
- Arroyo, P.; Lozano, J.; Suárez, J. Evolution of Wireless Sensor Network for Air Quality Measurements. J. Electron. 2018, 7, 342. [Google Scholar] [CrossRef] [Green Version]
- Wittenberg, C. Cause the Trend Industry 4.0 in the Automated Industry to New Requirements on User Interfaces? Int. Conf.-Hum.-Comput. Interact. 2015, 9171, 238–245. [Google Scholar]
- Henze, M.; Hermerschmidt, L.; Kerpen, D.; Häubling, R.; Rumpe, B.; Wehrle, K. A comprehensive approach to privacy in the cloud-based Internet of Things. J. Future Gener. Comput. Syst. 2016, 56, 701–718. [Google Scholar] [CrossRef] [Green Version]
- Stverkova, H.; Pohludka, M. Business Organisational Structures of Global Companies: Use of the Territorial Model to Ensure Long-Term Growth. Soc. Sci. 2018, 7, 98. [Google Scholar] [CrossRef] [Green Version]
- Rao, G.S.; Prasad, R. Impact of 5G Technologies on Industry 4.0. Wirel. Pers. Commun. 2018, 100, 145–159. [Google Scholar] [CrossRef]
- Lange, S. Digitalization, and energy consumption. Does ICT reduce energy demand? J. Ecol. Econ. 2020, 176, 106760. [Google Scholar] [CrossRef]
- Müller, J.M. Fortune favors the prepared: How SMEs approach business model innovations in Industry 4.0. Technol. Forecast. Soc. Change 2018, 132, 2–17. [Google Scholar] [CrossRef]
- Masood, T.; Sonntag, P. Industry 4.0: Adoption challenges and benefits for SMEs. J. Comput. Ind. 2020, 121, 103261. [Google Scholar] [CrossRef]
- Zhu, J. Measurement and analysis of corporate operating vitality in the age of digital business models. Appl. Econ. Lett. 2020, 27, 511–517. [Google Scholar] [CrossRef]
- Serror, M.; Hack, S.; Henze, M.; Schuba, M.; Wehrle, K. Challenges and Opportunities in Securing the Industrial Internet of Things. IEEE Trans. Ind. Inform. 2021, 17, 2985–2996. [Google Scholar] [CrossRef]
- Li, X.; Xu, M.; Vijayakumar, P.; Kumar, N.; Liu, X. Detection of low-frequency and multi-stage attacks in industrial internet of things. IEEE Trans. Veh. Technol. 2020, 69, 8820–8831. [Google Scholar] [CrossRef]
- Akram, Z.; Majid, M.; Habib, S. A Systematic Literature Review: Usage of Logistic Regression for Malware Detection. In Proceedings of the International Conference on Innovative Computing (ICIC), Seoul, Korea, 9–10 November 2021; pp. 1–8. [Google Scholar]
- Khalil, R.A.; Saeed, N.; Masood, M.; Fard, Y.M.; Alouini, M.-S.; Al-Naffouri, T.Y. Deep learning in the industrial internet of things: Potentials, challenges, and emerging applications. IEEE Internet Things J. 2021, 8, 11016–11040. [Google Scholar] [CrossRef]
- Jiang, B.; Li, J.; Yue, G.; Song, H. Differential privacy for Industrial Internet of Things: Opportunities, applications and challenges. IEEE Internet Things J. 2021, 8, 10430–10451. [Google Scholar] [CrossRef]
- Ahmed, A.; Javed, A.R.; Jalil, Z.; Srivastava, G.; Gadekallu, T.R. Privacy of Web Browsers: A Challenge in Digital Forensics. In Proceedings of the International Conference on Genetic and Evolutionary Computing, Jilin, China, 21–21 October 2021; Springer: Singapore, 2021; pp. 493–504. [Google Scholar]
- Vangala, A.; Das, A.K.; Kumar, N.; Alazab, M. Smart secure sensing for IoT-based agriculture: Blockchain perspective. IEEE Sensors J. 2021, 21, 17591–17607. [Google Scholar] [CrossRef]
- Maddikunta, P.K.R.; Pham, Q.V.; Prabadevi, B.; Deepa, N.; Dev, K.; Gadekallu, T.R.; Liyanage, M. Industry 5.0: A survey on enabling technologies and potential applications. J. Ind. Inf. Integr. 2021, 100257. [Google Scholar] [CrossRef]
- Liu, B.; Dousse; Wang, J.; Saipulla, A. Strong barrier coverage of wireless sensor networks. In Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hong Kong, China, 26–30 May 2008. [Google Scholar]
- Abomhara, M.; Køien, G.M. Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mobil. 2015, 4, 65–88. [Google Scholar] [CrossRef]
- Benazzouz, Y.; Munilla, C.; Gunalp, O.; Gallissot, M.; Gurgen, L. Sharing user iot devices in the cloud. In Proceedings of the IEEE World Forum Internet Things (WF-IoT), Seoul, Korea, 6–8 March 2014; pp. 373–374. [Google Scholar]
- Kumar, S.A.; Vealey, T.; Srivastava, H. Security in internet of things: Challenges, solutions and future directions. In Proceedings of the 49th Hawaii International Conference on System Sciences (HICSS), Koloa, HI, USA, 5–8 January 2016; pp. 5772–5781. [Google Scholar]
- Rehman, S.U.; Khaliq, M.; Imtiaz, S.I.; Rasool, A.; Shafiq, M.; Javed, A.R.; Jalil, Z.; Bashir, A.K. Diddos: An approach for detection and identification of distributed denial of service (ddos) cyberattacks using gated recurrent units (gru). Future Gener. Comput. Syst. 2021, 118, 453–466. [Google Scholar] [CrossRef]
- Iwendi, C.; Rehman, S.U.; Javed, A.R.; Khan, S.; Srivastava, G. Sustainable security for the internet of things using artificial intelligence architectures. Acm Trans. Internet Technol. (TOIT) 2021, 21, 1–22. [Google Scholar] [CrossRef]
- Anwar, R.W.; Bakhtiari, M.; Zainal, A.; Abdullah, A.H.; Qureshi, K.N. Security issues and attacks in wireless sensor network. World Appl. Sci. J. 2014, 30, 1224–1227. [Google Scholar]
- Chandan, R.; Mishra, P.K. A Review of Security Challenges in Ad-Hoc Network. Int. J. Appl. Eng. Res. 2018, 13, 16117–16126. [Google Scholar]
- Lee, J. Recent advances and trends in predictive manufacturing systems in a big data environment. J. Manuf. Lett. 2015, 1, 38–41. [Google Scholar] [CrossRef]
- Wollschlaeger, M.; Sauter, T.; Jasperneite, J. The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0. IEEE Ind. Electron. Mag. 2017, 11, 17–27. [Google Scholar] [CrossRef]
- Elsadig, M.A.; Altigani, A.; Baraka, M.A.A. Security issues and challenges on wireless sensor networks. Int. J. Adv. Trends Comput. Sci. Eng. 2019, 8, 1551–1559. [Google Scholar] [CrossRef]
- Hossain, A.J.; Fotouhi, M.; Hasan, R. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. In Proceedings of the IEEE World Congress on Services, New York, NY, USA, 27 June–2 July 2015; pp. 21–28. [Google Scholar]
- Ling, Z.; Liu, K.; Xu, Y.; XinwenFu, Y. An End-toEnd View of IoT Security and Privacy. In Proceedings of the IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–7. [Google Scholar]
- Wazid, M. Design and Analysis of Intrusion Detection Protocols for Hierarchical Wireless Sensor Networks. Ph.D. Dissertation, Center Secure, Theory Algorithmic Res, International Institute of Information Technology, Hyderabad, India, 2017. [Google Scholar]
- Haseeb, K.; Islam, N.; Saba, T.; Rehman, A.; Mehmood, Z. LSDAR: A light-weight structure-based data aggregation routing protocol with secure Internet of things integrated next-generation sensor networks. J. Sustain. Cities Soc. 2020, 54, 101995. [Google Scholar] [CrossRef]
- Capriglione, D.; Casinelli, D.; Ferrigno, L. Analysis of quantities influencing the performance of time synchronization based on linear regression in low-cost WSN. J. Meas. 2016, 77, 105–116. [Google Scholar] [CrossRef]
- Ng, K.P.; Tsimenidis, C.; Woo, W.L. C–Sync: Counter-based synchronization for duty-cycled wireless sensor networks. J. Hoc. Netw. 2017, 61, 51–64. [Google Scholar] [CrossRef] [Green Version]
- Tian, Y.P. Time synchronization in WSN with random bounded communication delays. Trans. Autom. Control 2017, 62, 5445–5450. [Google Scholar] [CrossRef]
- Drushti, D.; Upadhyay, H. Security and Privacy Consideration for Internet of Things in Smart Home Environments. Int. J. Eng. Res. Dev. 2015, 10, 73–83. [Google Scholar]
- Fink, G.A.; Zarzhitsky, D.V.; Carroll, T.E.; Farquhar, E.D. Security and privacy grand challenges for the Internet of Things. In Proceedings of the International Conference on Collaboration Technologies and Systems (CTS), Atlanta, GA, USA, 1–5 June 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 27–34. [Google Scholar]
- Faheem, M.; Abbas, M.Z.; Tuna, G.; Gungor, C. EDHRP: Energy efficient event driven hybrid routing protocol for densely deployed wireless sensor network. J. Netw. Comput. Appl. 2015, 58, 309–326. [Google Scholar] [CrossRef]
- Jamshidi, M.; Zangeneh, E.; Esnaashari, M.; Darwesh, A.M.; Meybodi, A.J. A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It. J. Wirel. Pers. Commun. 2019, 105, 145–173. [Google Scholar] [CrossRef]
- Yang, G.; Dai, L.; Wei, Z. Challenges, threats, security issues, and new trends of underwater wireless sensor networks. J. Sens. 2018, 18, 3907. [Google Scholar] [CrossRef] [Green Version]
- Ziegeldorf, J.H.; Morchon, O.G.; Wehrle, K. Privacy in the Internet of Things: Threats and challenges. Secur. Commun. Netw. 2015, 12, 2728–2742. [Google Scholar] [CrossRef]
- Vasilomanolakis, E.; Daubert, J.; Luthra, M.; Gazis, V.; Wiesmaier, A.; Kikiras, P. On the Security and Privacy of Internet of Things Architectures and Systems. In Proceedings of the International Workshop onSecure Internet of Things (SIoT), Vienna, Austria, 21–25 September 2015. [Google Scholar]
- Mehta, R.; Sahnib, J.; Khannac, K. Internet of Things: Vision, Applications and Challenges. In Proceedings of the International Conference on Computational Intelligence and Data Science (ICCIDS 2018), Procedia Computer Science, Gurugram, India, 7–8 April 2018; Volume 132, pp. 1263–1269. [Google Scholar]
- Sfar, A.R.; Natalizio, E.; Challal, Y.; Chtourou, Z. A roadmap for security challenges in the Internet of Things. J. Digit. Commun. Netw. 2018, 4, 118–137. [Google Scholar] [CrossRef]
- Challa, S.; Das, A.K.; Odelu, V.; Kumar, N.; Khan, S.; Kumari, M.K. An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. J. Comput. Electr. Eng. 2018, 69, 534–554. [Google Scholar] [CrossRef]
- Ranjan, A.K.; Somani, G. Access Control and Authentication in the Internet of Things Environment; Springer International Publishing: Cham, Germany, 2016; pp. 283–305. [Google Scholar]
- Sicari, S.; Rizzardi, A.; Grieco, L.A.; Coen-Porisini, A. Security, privacy and trust in Internet of things: The road ahead. J. Comput. Netw. 2015, 76, 146–164. [Google Scholar] [CrossRef]
- Garg, S.; Kaur, K.; Kaddoum, G.; Choo, K.K.R. Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0. J. IEEE Internet Things 2020, 7, 4598–4606. [Google Scholar] [CrossRef]
- Rathee, G.; Balasaraswathi, M.; Chandran, K.P. A secure IoT sensors communication in Industry 4.0 using blockchain technology. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 533–545. [Google Scholar] [CrossRef]
- Mellado, S.H.; Clemente, R.M.; Lecuyer, V.B. Prediction of satellite shadowing in smart cities with application to IoT. J. Sens. 2020, 20, 1–19. [Google Scholar]
- Behera, T.M.; Mohapatra, G.S.; Samal, U.C.; Han, M.G.S.; Daneshmand, M.; Gandomi, A.H. Residual energy-based cluster-head selection in WSN for IoT application. J. IEEE Internet Things 2019, 6, 5132–5139. [Google Scholar] [CrossRef] [Green Version]
- Wan, J.; Tang, S.; Shu, Z.; Li, D.; Wang, S.; Imran, M.; Vasilakos, A.V. Software-Defined Industrial Internet of Things in the Context of Industry 4.0. J. Sens. 2016, 16, 7373–7380. [Google Scholar] [CrossRef]
- Tan, Y.; Yang, W.; Yoshida, K.; Takakuwa, S. Application of IoT-aided simulation to manufacturing systems in the cyber-physical system. J. Mach. 2019, 7, 2. [Google Scholar] [CrossRef] [Green Version]
- Rahman, A.; Sara, U. DistB-SDoIndustry: Enhancing security in Industry 4.0 services based on distributed blockchain through software defined networking-IoT enabled architecture. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2020, 11, 674–682. [Google Scholar] [CrossRef]
- Haque, M.E.; Asikuzzaman, M.; Khan, I.U.; Ra, I.H.; Hossain, M.S.; Shah, S.B.H. Comparative study of IoT-based topology maintenance protocol in a wireless sensor network for structural health monitoring. J. Remote Sens. 2020, 12, 2538. [Google Scholar] [CrossRef]
- Wan, J.; Chen, B.; Imran, M.; Tao, F.; Li, D.; Liu, C.; Ahmad, S. Toward Dynamic Resources Management for IoT-Based Manufacturing. IEEE Commun. Mag. 2018, 56, 52–59. [Google Scholar] [CrossRef]
- Bulaghi, Z.A.; Navin, A.H.Z.; Hosseinzadeh, M.; Rezaee, A. SENET: A novel architecture for IoT-based body sensor networks. Inform. Med. Unlocked 2020, 20, 100365. [Google Scholar] [CrossRef]
- Jesus, T.C.; Portugal, P.; Costa, D.G.; Vasques, F. A comprehensive dependability model for QOM-aware industrial wsn when performing visual area coverage in occluded scenarios. J. Sens. 2020, 20, 6542. [Google Scholar] [CrossRef]
- Arroyo, P.; Herrero, J.L.; Suárez, J.I.; Lozano, J. Wireless sensor network combined with cloud computing for air quality monitoring. J. Sens. 2019, 19, 691. [Google Scholar] [CrossRef] [Green Version]
- Li, X.; Zhu, L.; Chu, X.; Fu, H. Edge Computing-Enabled Wireless Sensor Networks for Multiple Data Collection Tasks in Smart Agriculture. J. Sens. 2020, 2020. [Google Scholar] [CrossRef]
- Prophess, N.; Kumar, R.; Gnanadhas, J.B. Cluster Centroid-Based Energy Efficient Routing Protocol for WSN-Assisted IoT, in journal of Advances in Science. Technol. Eng. Syst. 2020, 5, 296–313. [Google Scholar]
- Haseeb, K.; Din, I.U.; Almogren, A.; Islam, N. An energy-efficient and secure IoT-based WSN framework: An application to smart agriculture. J. Sens. 2020, 20, 2081. [Google Scholar] [CrossRef]
- Forcina, A.; Falcone, D. The role of Industry 4.0 enabling technologies for safety management: A systematic literature review. Int. Conf. Ind. 4.0 Smart Manuf. 2021, 180, 436–445. [Google Scholar] [CrossRef]
- Birkela, H.; Müllerb, J.M. Potentials of Industry 4.0 for supply chain management within the triple bottom line of sustainability—A systematic literature review. J. Clean. Prod. 2021, 289, 125612. [Google Scholar] [CrossRef]
- Mrugalska, B.; Ahmed, J. Organizational Agility in Industry 4.0: A Systematic Literature Review. J. Sustain. 2021, 13, 8272. [Google Scholar] [CrossRef]
- Atif, S.; Ahmed, S.; Wasim, M.; Zeb, B.; Pervez, Z.; Quinn, L. Towards a Conceptual Development of Industry 4.0, Servitisation, and Circular Economy: A Systematic Literature Review-2021. J. Sustain. 2021, 13, 6501. [Google Scholar] [CrossRef]
- Jesús, H.O.; William, G.M.; Leonardo, Z.C. Industry 4.0: Current Status and Future Trends. In Industry 4.0; InTechOpen: London, UK, 2020. [Google Scholar]
- Wei, Q.; Siqi, C.; Mugen, P. Recent advances in Industrial Internet: Insights and challenges. J. Digit. Commun. Netw. 2020, 6, 1–13. [Google Scholar]
- Taigang, K.V.L.; Lifeng, Z. Industry 4.0: Towards future industrial opportunities and challenges. In Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Zhangjiajie, China, 15–17 August 2015; pp. 2147–2152. [Google Scholar]
- Zhang, W.; Zhang, Y.; Gu, X.; Wu, C.; Han, L. Soft Computing. In Application of Soft Computing, Machine Learning, Deep Learning and Optimizations in Geoengineering and Geoscience; Springer: Singapore, 2022; pp. 7–19. [Google Scholar]
- Wang, S.; Qureshi, M.A.; Miralles-Pechuaán, L.; Huynh-The, T.; Gadekallu, T.R.; Liyanage, M. Explainable AI for B5G/6G: Technical Aspects, Use Cases, and Research Challenges. arXiv 2021, arXiv:2112.04698. [Google Scholar]
- Ramu, S.P.; Boopalan, P.; Pham, Q.V.; Maddikunta, P.K.R.; The, T.H.; Alazab, M.; Gadekallu, T.R. Federated Learning enabled Digital Twins for smart cities: Concepts, recent advances, and future directions. Sustain. Cities Soc. 2022, 103663. [Google Scholar] [CrossRef]
- Połap, D.; Srivastava, G.; Lin, J.C.W.; Woźniak, M. Federated Learning Model with Augmentation and Samples Exchange Mechanism. In Proceedings of the International Conference on Artificial Intelligence and Soft Computing, Zakopane, Poland, 12–14 October 2021; Springer: Cham, Germany, 2021; pp. 214–223. [Google Scholar]
- Saibabu, G.; Jain, A.; Sharma, V.K. Security Issues and Challenges in IoT Routing over Wireless Communication. Int. J. Innov. Technol. Explor. Eng. (IJITEE) 2020, 9, 1572–1580. [Google Scholar]
Abbreviation | Description |
---|---|
5G | fifth generation |
6G | sixth generation |
AR | augmented reality |
CPS | cyber physical system |
DDoS | distributed denial of service |
DNS | domain name system |
DoS | denial of service |
DT | digital twin |
FoI | field of interest |
GUI | graphical user interface |
ID 4.0 | Industry 4.0 |
IIoT | industrial internet of things |
IoT | internet of things |
IR 4.0 | industry revolution 4.0 |
IWSN | industrial wireless sensor network |
IWSAN | industrial wireless sensor and actuator network |
PREQ | request packet |
QoS | quality of service |
RFID | radio frequency identification |
SEPTIC | self protecting databases from attacks |
SG | smart grid |
SIRP | self-optimized smart routing protocol |
SLR | systematic literature review |
UASN | underwater acoustic sensor networks |
WSN | wireless sensor network |
WSAN | wireless sensor area network |
Reference | Year | Review Type | DC | Application Types | IoT and WSN Architecture Used | Challenges and Issues | R. Q. |
---|---|---|---|---|---|---|---|
[1] | 2015 | LR | Industry | 802.11 (WiFi) technology in smart cities | WSN | × | × |
[4] | 2020 | LR | Science | IoT sensing applications discussed using sensing technology | WSN using RFID | Energy harvesting, communication interference, fault tolerance, higher capacities to handling data processing, cost feasibility. | × |
[5] | 2016 | SO | Industry | IoT application in smart grids | IoT | Challenges discussed along with solutions to cope with | × |
[6] | 2017 | SO | Industry | Deployment techniques discussed using sensor network | WSN | Communication cost, coverage time, accuracy, etc. | × |
[10] | 2016 | LR | WSN applications in urban areas | Urban areas | WSN | Problems and solution of each WSN application | × |
[17] | 2014 | SO | Industry | Network security protocols discussed in industrial applications | WSN | Challenges of stack protocol and their solutions | × |
[19] | 2020 | SLR | Smart factories | Scope and conceptualization of IoT in Industry 4.0 | IoT | × | ✔ |
[27] | 2020 | LR | Smart IoT devices | Detailed survey on security threat models applicable for IoT and WSN. They also discussed communication attacks and taxonomy of IoT and WSN | Both | ✔ | × |
[28] | 2019 | LR | – | Discussed technical and social perspective of IoT for future technology enhancement | IoT | ✔ | × |
[29] | 2017 | SLR | Smart cities | Applications, security, and taxonomy in IoT | IoT | × | × |
[30] | 2019 | LR | Industrial | Applications and usage of actuators and sensor networks using MAC protocol. | IWSN | Security challenges on different layers of the stack, also discussed their solutions | × |
[31] | 2016 | LR | – | Technologies, innovations, and applications of IoT discussed. | IoT | ✔ | × |
[32] | 2014 | LR | Industrial | Coverage areas of WSN are discussed | WSN | Challenges they face were: Node type, depth type, communication range, etc. | × |
[33] | 2016 | SUR | Industrial | Applications of intrusion detection system in IoT | IoT | × | × |
[34] | 2015 | SUR | Industrial | Only explore and analyze existing solution to detect sinkhole attack | WSN | × | × |
[35] | 2020 | LR | – | × | Both | Discuss attacks in IoT ans WSN with their solutions, advantages, and limitation | × |
[36] | 2021 | SLR | Smart mobiles | Routing attacks and security measures in mobile network are discussed | WSN | × | × |
[37] | 2021 | LR | Industrial | Detection of wormhole in both domains | Both | × | ✔ |
[38] | 2017 | SUR | IoT systems | Software board and chips, crypto algorithms, security of IoT systems, and network protocols are discussed | IoT | – | × |
[39] | 2015 | SUR | – | Existing security approaches of IoT system are described | IoT | ✔ | × |
[40] | 2016 | SUR | – | Deployment models for sensor network to achieve coverage, their classification and working was discussed | WSN | × | × |
[41] | 2018 | BLR | Smart factory & Industry | Discuss 12 approaches of Industry 4.0. in business and account management fields | IoT | × | × |
This Paper | 2021 | SLR | Smart industry and Factory | Applications and contribution of both IoT and WSN are discussed in detail | IoT and WSN (both) | Key challenges and open issues of both IoT and WSN in Industry 4.0 are discussed | ✔ |
Research Questions (RQ) | |
---|---|
RQ1 | What are the contributions of WSN in IR 4.0? |
RQ2 | What are the contributions of IoT in IR 4.0? |
RQ3 | What are the types of WSN coverage areas for IR 4.0? |
RQ4 | What are the major types of network intruders in WSN and IoT systems? |
RQ5 | What are the prominent network security attacks in WSN and IoT? |
RQ6 | What are the major issues in IoT and WSN frameworks? |
RQ7 | What are the limitations and research gaps in the existing work? |
Sr. No. | Groups | Group Search Query |
---|---|---|
1 | Group 1 | Application of WSN in IR 4.0. |
2 | Group 2 | Implementation of IoT infrastructure in IR 4.0. |
3 | Group 3 | Industrial Revolution 4.0. for smart manufacturing |
4 | Group 4 | Security attacks, issues, and challenges of IoT and WSN in IR 4.0. |
5 | Group 5 | Role of WSN and IoT systems in IR 4.0. |
Inclusion Criteria | |
---|---|
1 | Include only those papers written in the English language. |
2 | Include papers that were published in 2014–2021. |
3 | Include papers that reflected enough knowledge about the search strings and search objectives. |
4 | Include papers whose titles, keywords, abstracts, and conclusions provided enough information related to WSN, IoT, and IR 4.0. |
5 | Include papers whose content focused on WSN, IoT, and IR 4.0 content and provided in depth insights. |
Exclusion Criteria | |
1 | Exclude papers written in a language other than the English language. |
2 | Exclude gray papers. |
3 | Exclude papers that were not published within 2014–2021. |
4 | Exclude research papers containing less than three pages. |
5 | Exclude papers that failed to meet the inclusion criteria. |
Criteria | Selection Criteria | Graded Response |
---|---|---|
C1 | Is the aim of research and context clearly defined? | 1, 0.5, 0 (yes, nominally, no) |
C2 | Is the context of research well addressed? | 1, 0.5, 0 (yes, nominally, no) |
C3 | Are the findings clearly stated? | 1, 0.5, 0 (yes, nominally, no) |
C4 | Based on the findings, how valuable is the research? | >80% = 1, <20% = 0, in between = 0.5 |
Sr. No. | Title of Research | Authors | Year |
---|---|---|---|
1. | Cyber-Physical Systems Security: Analysis, Challenges, and Solutions | Y. Ashibani and Q. H. Mahmoud | 2017 |
2. | A Review of IoT sensing applications and challenges using RFID and wireless sensor networks | H. Landaluce, L. Arjona, A. Perallos, F. Falcone, I. Angulo, and F. Muralter | 2020 |
3. | Enhancement of relay nodes communication approach in WSN-IoT for underground coal mine | R. Sharma and S. Prakash | 2020 |
4. | Applications of wireless sensor networks for urban areas: A survey | B. Rashid and M. H. Rehmani | 2016 |
5. | An empirical study of application layer protocols for IoT | U. Tandale, B. Momin, and D. P. Seetharam | 2017 |
6. | Digital twin technologies and smart cities. | M. Farsi, A. Daneshkhah, A. Hosseinian-Far, and H. Jahankhani | 2020 |
7. | Internet of things (IoT) embedded future supply chains for Industry 4.0: An assessment from ERP-based fashion apparel and footwear industry | M. A. A. Majeed and T. D. Rupasinghe | 2017 |
8. | Towards Industry 4.0 utilizing data-mining techniques: a case study on quality improvement | H. Oliff and Y. Liu | 2017 |
9. | An industrial perspective on wireless sensor networks-a survey of requirements, protocols, and challenges | A. A. Kumar S., K. Ovsthus, and L. M. Kristensen. | 2014 |
10. | The smart factory as a key construct of Industry 4.0: A systematic literature review | P. Osterrieder, L. Budde, and T. Friedli | 2020 |
11. | Social expectations and market changes in the context of developing the Industry 4.0 concept | S. Saniuk, S. Grabowska, and B. Gajdzik | 2020 |
12. | Key IoT Statistics | B. Jovanović | 2021 |
13. | 30 Internet of Things – IoT stats from reputable sources in 2021 | A. Multiple | 2021 |
14. | Wide-area and short-range IoT devices | S. O’Dea | 2021 |
15. | The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0 | M. Wollschlaeger and T. Sauter and J. Jasperneite | 2017 |
16. | Internet of things (IoT): a technological analysis and survey on vision, concepts, challenges, innovation directions, technologies, and applications | G. Misra, V. Kumar, A. Agarwal, and K. Agarwal | 2016 |
17. | EDHRP: Energy-efficient event-driven hybrid routing protocol for densely deployed wireless sensor networks | Faheem M, Abbas MZ, Tuna G, Gungor VC. | 2015 |
18. | A survey on deployment techniques, localization algorithms, and research challenges for underwater acoustic sensor networks. | Tuna G, Gungor VC | 2017 |
19. | Lrp: Link quality-aware queue-based spectral clustering routing protocol for underwater acoustic sensor networks | Faheem M, Tuna G, Gungor VC | 2017 |
20. | Design and deployment of a smart system for data gathering in aquaculture tanks using wireless sensor networks | Parra L, Sendra S, Lloret J, Rodrigues JJ. | 2017 |
21. | WSN-and IoT-based smart homes and their extension to intelligent buildings. Sensors | Ghayvat H, Mukhopadhyay S, Gui X, Suryadevara N | 2015 |
22. | Conceptual model for informing user with an innovative smart wearable device in Industry 4.0 | M. Periša, T. M. Kuljanić, I. Cvitić, and P. Kolarovszki | 2019 |
23. | Evolution of wireless sensor network for air quality measurements | Arroyo, P.; Lozano, J.; Suárez, J. | 2018 |
24. | Industrial wireless sensor and actuator networks in Industry 4.0: Exploring requirements, protocols, and challenges—A MAC survey | S. Raza, M. Faheem, and M. Genes | 2019 |
25. | Cause the Industry 4.0 in the automated industry to new requirements on the user interface | C. Wittenberg | 2015 |
26. | Impact of 5G technologies on Industry 4.0 | G. S. Rao and R. Prasad | 2018 |
27. | Material efficiency in manufacturing: Swedish evidence on potential, barriers, and strategies | S. Shahbazi et al. | 2016 |
28. | Organizational change, and industry 4.0 (id4). A perspective on possible future challenges for human resources management | J. Radel | 2017 |
29. | Organizational culture as an indication of readiness to implement Industry 4.0 | Z. Nafchi and M.Mohelská | 2020 |
30. | Smart production planning and control: concept, use-cases, and sustainability implications | O.E, Oluyisola | 2020 |
31. | Fortune favors the prepared: How SMEs approach business model innovations in Industry 4.0. | J. M. Müller et al. | 2018 |
32. | Visual computing as a critical enabling technology for industries 4.0 and industrial Internet | J. Posada et al. | 2015 |
33. | Digitalization and energy consumption. Does ICT reduce energy demand | S. Lange | 2020 |
34. | Industry 4.0: adoption challenges and benefits for SMEs | T. Masood and P. Sonntag | 2020 |
35. | Measurement and analysis of corporate operating vitality in the age of digital business models | J. Zhu et al. | 2020 |
36. | Cyber security and the Internet of Things: vulnerabilities, threats, intruders and attacks | M. Abomhara and G. M. Køien | 2015 |
37. | Sharing user IoT devices in the cloud | Y. Benazzouz, C. Munilla O. Gunalp, M. Gallissot, and L. Gurgen | 2014 |
38. | Security in Internet of things: Challenges, solutions, and future directions | S. A. Kumar, T. Vealey, and H. Srivastava | 2016 |
39. | Survey of intrusion detection system towards an end-to-end secure internet of things | A. A. Gendreau, M. Moorman | 2016 |
40. | Recent advances and trends in predictive manufacturing systems in a big data environment | J. Lee et al. | 2015 |
41. | A comprehensive dependability model for QOM-aware industrial WSN when performing visual area coverage in occluded scenarios | T. C. Jesus, P. Portugal, D. G. Costa, and F. Vasques | 2020 |
42. | Security issues and challenges on wireless sensor networks | M. A. Elsadig, A. Altigani, and M. A. A. Baraka | 2019 |
43. | Challenges of Wireless Sensor Networks and Issues associated with Time Synchronization | G. S. Karthik and A. A. Kumar | 2015 |
44. | Design and analysis of intrusion detection protocols for hierarchical wireless sensor networks | M. Wazid | 2017 |
45. | Intrusion detection protocols in wireless sensor networks integrated to the Internet of Things deployment: survey and future challenges | S. Pundir, M. Wazid, D. P. Singh, A. K. Das, J. J. P. C. Rodrigues, and Y. Park | 2020 |
46. | Robust malware detection for Internet of (battlefield) Things devices using deep Eigenspace learning [46] | Azmoodeh, A. Dehghantanha, and K.-K.-R. Choo | 2019 |
47. | LSDAR: A lightweight structure-based data aggregation routing protocol with secure IoT integrated next-generation sensor networks. | Haseeb K, Islam N, Saba T, Rehman A, Mehmood Z. | 2020 |
48. | SEPTIC: Detecting injection attacks and vulnerabilities inside the DBMS. | Medeiros, M. Beatriz, N. Neves, and M. Correia | 2019 |
49. | An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Computers and Electrical Engineering | Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, et al. | 2018 |
50. | Internet of Things: vision, applications and challenges | Rishika Mehta, Jyoti Sahnib, Kavita Khannac | 2018 |
51. | A roadmap for security challenges in the Internet of Things | Arabia Riahi Sfar, Enrico Natalizio, Yacine Challal, Zied Chtourou | 2018 |
52. | A novel low-rate denial of service attack detection approach in ZigBee wireless sensor network by combining Hilbert-Huang transformation and trust evaluation | H. Chen, C. Meng, Z. Shan, Z. Fu, and B. K. Bhargava | 2019 |
53. | Analysis of quantities influencing the performance of time synchronization based on linear regression in low-cost WSN | D. Capriglione, D. Casinelli, and L. Ferrigno | 2016 |
54. | C–Sync: Counter-based synchronization for duty-cycled wireless sensor networks | K.-P. Ng, C. Tsimenidis, and W. L. Woo | 2017 |
55. | Time synchronization in WSN with random bounded communication delays. | Y.-P. Tian | 2017 |
56. | A novel model of Sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend It | M. Jamshidi, E. Zangeneh, M. Esnaashari, A. M. Darwesh, and A. J. Meybodi | 2019 |
57. | Challenges, threats, security issues, and new trends of underwater wireless sensor networks | G. Yang, L. Dai, and Z. Wei | 2018 |
58. | Industry 4.0 key research topics: A bibliometric review | D. Trotta and P. Garengo | 2018 |
59. | Privacy in the Internet of Things: threats and challenges | J. H. Ziegeldorf, O. G. Morchon, and K. Wehrl | 2015 |
60. | On the security and privacy of the Internet of Things architectures and systems. | E. Vasilomanolakis, J. Daubert, M. Luthra, V. Gazis, A. Wiesmaier and P. Kikiras | 2015 |
61. | Cybersecurity issues in wireless sensor networks: current challenges and solutions | D. E. Boubiche, S. Athmani, S. Boubiche, and H. Toral-Cruz | 2020 |
62. | A security model for IoT-based systems | Z. Safdar, S. Farid, M. Pasha, and K. Safdar | 2017 |
63. | Security issues and challenges in IoT routing over wireless communication | G. Saibabu, A. Jain, and V. K. Sharma | 2020 |
64. | Security and privacy consideration for Internet of Things in smart home environments | Desai, Drushti, and Hardik Upadhyay | 2015 |
65. | E.D. Security and grand privacy challenges for the Internet of Things | Fink, G.A., Zarzhitsky, D. V., Carroll, T.E., and Farquhar | 2015 |
66. | A comprehensive approach to privacy in the cloud-based Internet of Things. | Henze, M., Hermerschmidt, L., Kerpen, D., Häußling, R., Rumpe, B., and Wehrle, K. | 2016 |
67. | Towards an analysis of security issues, challenges, and open problems on the internet of Things. | Hossain, A. J., Fotouhi, M., and Hasan, R. | 2015 |
68. | An End-to-end view of IoT security and privacy | Zhen Ling, Kaizheng Liu, Yiling Xu, YierJin, XinwenFu | 2017 |
69. | Security and privacy considerations for IoT application on smart grids: Survey and research challenges | Dalipi, F.; Yayilgan, S.Y. | 2016 |
70. | Internet of Things security: A survey | Alaba, Fadele Ayotunde, et al. | 2017 |
71. | Security for the Internet of things: a survey of existing protocols and open research issues | J. Granjal, E. Monteiro, J. Silva | 2015 |
72. | Security, privacy and trust in Internet of things: the road ahead | S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini | 2015 |
73. | Access control and authentication in the Internet of Things environment | A.K. Ranjan, G. Somani | 2016 |
74. | Toward secure and provable authentication for the Internet of Things: realizing Industry 4.0 | S. Garg, K. Kaur, G. Kaddoum, and K. K. R. Choo | 2020 |
75. | Prediction of satellite shadowing in smart cities with application to IoT | S. Hornillo-Mellado, R. Martín-Clemente, and V. Baena-Lecuyer | 2020 |
76. | Software-defined industrial Internet of Things in the context of Industry 4.0 | J. Wan et al. | 2016 |
77. | Residual energy-based cluster-head selection in WSN for IoT application. | T. M. Behera, G. S. Mohapatra, U. C. Samal, M. G. S. Han, M. Daneshmand, and A. H. Gandomi | 2019 |
78. | DistB-SDoIndustry: enhancing security in Industry 4.0 services based on the distributed blockchain through software-defined networking-IoT enabled architecture, | A. Rahman et al. | 2020 |
79. | Application of IoT-aided simulation to manufacturing systems in the cyber-physical system | Y. Tan, W. Yang, K. Yoshida, and S. Takakuwa | 2019 |
80. | Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in Industry 4.0 [47] | Y. Wu, H.-N. Dai, and H. Wang | 2020 |
81. | Comparative study of IoT-based topology maintenance protocol in a wireless sensor network for structural health monitoring | M. E. Haque, M. Asikuzzaman, I. U. Khan, I. H. Ra, M. S. Hossain, and S. B. Hussain Shah | 2020 |
82. | Toward dynamic resources management for IoT-based manufacturing | J. Wan et al. | 2018 |
83. | SENET: A novel architecture for IoT-based body sensor networks | Z. Arabi Bulaghi, A. Habibi Zad Navin, M. Hosseinzadeh, and A. Rezaee | 2020 |
84. | Bio-inspired routing protocol for WSN-based smart grid applications in the context of Industry 4.0 | M. Faheem et al. | 2019 |
85. | IoT and wireless sensor network-based autonomous farming robot | A. Khan, S. Aziz, M. Bashir, and M. U. Khan | 2020 |
86. | Efficient and secure three-party mutual authentication key agreement protocol for WSN in IoT environments | C. T. Chen, C. C. Lee, and I. C. Lin | 2020 |
87. | Wireless sensor network combined with cloud computing for air quality monitoring | P. Arroyo, J. L. Herrero, J. I. Suárez, and J. Lozano | 2019 |
88. | Edge computing-enabled wireless sensor networks for multiple data collection tasks in Smart Agriculture | X. Li, L. Zhu, X. Chu, and H. Fu | 2020 |
89. | Cluster centroid-based energy-efficient routing protocol for WSN-Assisted IoT | N. Prophess, R. Kumar, and J. B. Gnanadhas | 2020 |
90. | An energy-efficient and secure IoT-based WSN framework: an application to smart agriculture | K. Haseeb, I. U. Din, A. Almogren, and N. Islam | 2020 |
91. | Deployment schemes in a wireless sensor network to achieve blanket coverage in large-scale open area | Vikrant Sharmaa, R.B. Patelb, H.S. Bhadauriaa, D. Prasadc | 2016 |
Sr. No. | Layer Name | Attacks |
---|---|---|
1 | Physical layer | Interception, radio interference, jamming, tempering, Sybil attack. |
2 | Data link layer | Replay attack, Spoofing, altering routing attack, Sybil Attack, collision, traffic analysis, and monitoring, exhaustion. |
3 | Network layer | Black hole attack, wormhole attack, sinkhole attack, grey hole attack, selective forwarding attack, hello flood attack, misdirection attack, internet smurf attack, spoofing attack. |
4 | Transport layer | De-synchronization, transport layer flooding attack. |
5 | Application layer | Spoofing, alter routing attack, false data ejection, path-based DoS. |
Reference | Title of Article | Proposed Solution | Limitations and Future Work |
---|---|---|---|
Sharma et al. [9] | Enhancement of relay nodes communication approach in WSN-IoT for underground coal mine | They designed relay node structures for a wireless sensor network and load balancing to improve network lifetime parameters. They designed an IoT-based WSN to provide advance warning of any natural disaster in coal mines. | There were several analysis parameters to analyze the networks, such as network lifetime, communication and transmission cost, energy consumption, and coverage of the whole area. |
Faheem et al. [49] | Bio-inspired routing protocol for WSN-based smart grid applications in the context of Industry 4.0 | They designed a comprehensive, optimized, and QoS monitoring multi-hop network system for real-time data transmission in Industry 4.0. This self-optimized smart routing protocol (SIRP) was efficiently used for WSN-based SG applications. | In the future, they will attempt to enhance their developed SIRP routing scheme and communications architecture to collect QoS-aware data for different WSN-based smart grid applications with little data redundancy. |
Arslan et al. [52] | IoT and wireless sensor network-based autonomous farming robot | They developed a computer vision-based algorithm used for the classification of weed and a non-image. Wireless sensor nodes detect weed images through image processing methods and gather light, temperature, humidity, and moisture data. | The limitation of this work is that they did not provide any GUI or mobile application control to work robot autonomously. |
Chen et al. [53] | Efficient and secure three-party mutual authentication key agreement protocol for WSN in IoT environments | They proposed a practical and secure approach to merge IoT and WSN. Their scheme had high performance, low communication, and computational costs, low energy consumption, and provided effective authentication of the user in IoT. | The limitation of this study is that they did not provide a solution to the security threats in a heterogeneous IoT environment. In the future, they will evaluate the reliability and scalability of their systems of heterogeneous environments. |
Rathee et al. [102] | A secure IoT sensors communication in Industry 4.0 using blockchain technology | Wireless sensor network security improved using blockchain and compared security metrics. &It ensured confidentiality and responsibility and tracked each sensor’s operation. The blockchain was used to store IoT artifacts and sensors. | The developed IoT sensor takes time to test a single block before it is put to the blockchain. |
Mellado et al. [103] | Prediction of satellite shadowing in smart cities with application to IoT | The technology had a minimal processing load. It was highly desirable to create a coverage map that can optimize network resources in satellites. | There is a lack of evaluation of requirements for satellite-based IoT and output connectivity protocols through simulations in actual situations. |
Garg et al. [101] | Towards secure and provable authentication for the internet of things: realizing Industry 4.0 | The effectiveness of the developed protocol was evaluated with frequently utilized AVISPA, PUFs, and ECC encryption algorithms. A proposed technique was developed to create a durable, stable, and efficient user architecture that promotes shared authentication for IoT and server nodes and is resistant to cyber threats. | This protocol is for academic and research purposes only, and its implementation has not yet been tested in the real world. |
Behera et al. [104] | Residual energy-based cluster-head selection in WSN for IoT application | The method takes into account the intended value of initial energy, residual energy, and cluster heads to choose the specific set of cluster heads in the network that adapts IoT applications to maximize flow, durability, and residual energy. | They did not review existing path selection factors in a node mobility network that altered its role constantly. |
Wan et al. [105] | Software-defined industrial Internet of Things in the context of industry 4.0 | They proposed a new idea of information interaction in Industry 4.0 using software-defined IIoT. They enhanced the network size using IIoT. The IIoT architecture manages physical devices and information exchange methods via a customized networking protocol. | The limitation of the study is the effective coordination between IIoT where the network is heterogeneous for transmission of information. |
Tan et al. [106] | Application of IoT-aided simulation to manufacturing systems in cyber-physical systems | They discussed the construction and implementation methods of digital twin (DT). In this study also explained the issues involved in developing DT with the help of IoT manufacturing devices. DT is the simulation tool that can gather and synchronize data for the real world to a real-time environment. | The absence of experimentation and optimization in predicting future locations or results are other essential aspects of DT. |
Rahman et al. [107] | DistB-SDoIndustry: enhancing security in Industry 4.0 services based on the distributed blockchain through software-defined networking-IoT enabled architecture | In this work, the authors develop a distributed blockchain-based security system integrated with the help of IoT and SDN. Blockchain is used for data security and confidentiality, while SDN-IoT incorporates sensor networks and IoT devices to improve the security services in Industry 4.0. | Limitations of this study are that the developed model SDN-IoT was still in the initial stage, so it was not able to detect different types of risks, such as service denial (DoS) and flood attack and packet filtering. The developed system had no proper GUI, so the throughput, packet arrival time, and response time were rarely challenging to analyze. |
Haque et al. [108] | Comparative study of IoT-based topology maintenance protocol in a wireless sensor network for structural health monitoring | They developed a computer-based monitoring system to analyze the vibration or earthquake measurement. WSN are used to sense structural damages and identify their pinpoint location. They also proposed a topology-based maintenance system to analyze network architecture. Their system was an energy-efficient system that automatically turned off nodes where no traffic was detected. | The limitation of this study is that WSN nodes are not capable enough to provide scalability for large coverage areas. |
Wan et al. [109] | Toward dynamic resources management for IoT-based manufacturing | To build a fully interactive environment and dynamic management of resources, an ontology-based technology, SDN, communication technology device to device combined with ontology modeling and multi-agency technology were used to accomplish sophisticated administration of resources. They solved load secluding problems using Jena logic reasoning and contract-net protocol-based technology in Industry 4.0. | The limitation of this work was the high time complexity of the load balancing algorithm to complete the task efficiently. It was challenging to refine the process due to the complex nature of multi-agent technology, and referencing rules were much more complex. |
Bulaghi et al. [110] | SENET: a novel architecture for IoT-based body sensor networks | Multiple algorithms, such as particle swarm optimization (PSO), ant colony optimization (ACO), and genetic algorithms (GA) were used to save energy of WSN. They evaluated WSN energy consumption using optimization algorithms and calculated the total number of uncovered points, their stability, and dependability. | The design meets some disadvantages and does not work in real-time data. |
Thiago et al. [111] | A comprehensive dependability model for QoM-aware Industrial WSN | When performing visual area coverage in occluded scenarios. They proposed a mathematical model named quality of monitoring parameter (QoM) to assess the dependability of WSN, their availability, and reliability considering hardware, networking, and visual coverage failures. | Their developed method was inefficient at analyzing the system’s dependability in real-time applications due to failures or repairs happening as soon. |
Patricia et al. [112] | Wireless sensor network combined with cloud computing for air quality monitoring | They designed a small size, low cost, and efficient system to monitor the air quality using wireless sensor nodes. They performed multiple algorithms such as multi-layer perceptron, SVM, and PCA to discriminate and quantify the volatile organic compounds. | The limitation of this study is that sensor nodes are less efficient at covering a large area to monitor and cannot do real-time testing and the field measurements of sensors. |
Li et al. [113] | Edge computing-enabled wireless sensor networks for multiple data collection tasks in smart agriculture | They designed a data collection algorithm considering data quality factors in smart agriculture. Then modeled the data collection process by merging WSN and IoT. | The developed edge computing driven framework [47] and data collection algorithm were not capable of collecting data in a real agriculture environment. |
Kumar et al. [114] | Cluster centroid-based energy-efficient routing protocol for WSN-assisted IoT | They developed a system that was capable of self-organization of local nodes to save energy. Their system adopted new algorithms to rotate head clusters based on centroid locations in IoT using WSN. The technique exceeds conventional protocols for efficiency criteria, such as the consumption of energy by the network, intermediate sensor node, packet distribution ratio, packet failure percentage, and network output. Their work was best for the base station located in the network. | The routing protocol was not optimal, routing strategies were lacking, and packet loss was caused if the base stations were even in the network. In the future, they will enhance this work by using a multi-hop path strategy to the base station. In this technique, the cluster head will transmit data to the base station, even outside the network. |
Haseeb et al. [115] | An energy-efficient and secure IoT-based WSN framework: an application to smart agriculture | They proposed an IoT-based WSN framework that collected data from agriculture and transmitted it to the nearest base station. They enhanced network throughput, low latency rate, energy consumption, and packet drop ratio. They also provided security to the data transmission channel using the recurrence of the linear generator. | The limitation of this work is that they did not assess the device consistency in a mobile IoT. Therefore, they will analyze the performance and reliability of developed frameworks in the transportation system and mobile-based IoT network. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Majid, M.; Habib, S.; Javed, A.R.; Rizwan, M.; Srivastava, G.; Gadekallu, T.R.; Lin, J.C.-W. Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review. Sensors 2022, 22, 2087. https://doi.org/10.3390/s22062087
Majid M, Habib S, Javed AR, Rizwan M, Srivastava G, Gadekallu TR, Lin JC-W. Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review. Sensors. 2022; 22(6):2087. https://doi.org/10.3390/s22062087
Chicago/Turabian StyleMajid, Mamoona, Shaista Habib, Abdul Rehman Javed, Muhammad Rizwan, Gautam Srivastava, Thippa Reddy Gadekallu, and Jerry Chun-Wei Lin. 2022. "Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review" Sensors 22, no. 6: 2087. https://doi.org/10.3390/s22062087
APA StyleMajid, M., Habib, S., Javed, A. R., Rizwan, M., Srivastava, G., Gadekallu, T. R., & Lin, J. C. -W. (2022). Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review. Sensors, 22(6), 2087. https://doi.org/10.3390/s22062087