Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions

SH Mekala, Z Baig, A Anwar, S Zeadally - Computer Communications, 2023 - Elsevier
IIoT is evolving as the future of system and process integration across Operations
Technology (OT) and Information Technology (IT). The dynamic nature of OT and IT across …

An overview of the security of programmable logic controllers in industrial control systems

H Cui, J Hong, R Louden - Encyclopedia, 2024 - mdpi.com
One key role in industrial control systems (ICSs) is known as Programmable Logic Controller
(PLC). However, with the development of the Internet of Things (IoT), PLCs have become …

Implementing man-in-the-middle attack to investigate network vulnerabilities in smart grid test-bed

S Banik, T Banik, SMM Hossain… - 2023 IEEE World AI IoT …, 2023 - ieeexplore.ieee.org
The smart-grid introduces several new data-gathering, communication, and information-
sharing capabilities into the electrical system, as well as additional privacy threats …

Infrared signal-based implementation of model-based predictive control (MPC) for cost saving in a campus building

K Choi, D Lee, S Park, J Joe - Energy, 2024 - Elsevier
Abstract Model-based predictive control (MPC) is an advanced control method that is used
to achieve energy and cost savings in building energy management. However, there are …

Simulation and analysis of cyber-attack on modbus protocol for smart grids in virtual environment

S Banik, R Manicavasagam, T Banik… - Science and Information …, 2024 - Springer
Smart grid capabilities have grown significantly in recent years. The smart grid provides
advanced real-time handling of faults, advanced automatic control for efficient electricity …

Communication protocols used for industrial automation

R Bansal, AK Dubey - Computational Intelligence in the Industry …, 2024 - taylorfrancis.com
Various communication protocols are necessary for industrial automation in order for
devices and systems to exchange data and control signals [20, 21, 24]. These procedures …

A survey of transmission control protocol variants

LM Machora - World Journal of Advanced Research and Reviews, 2024 - wjarr.co.in
TCP (Transmission Control Protocol), is a reliable connection oriented end-to-end protocol.
It contains within itself, mechanisms for ensuring reliability by requiring the receiver to …

Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks

A Hirsi, MA Alhartomi, L Audah, A Salh… - IEEE …, 2025 - ieeexplore.ieee.org
Software-Defined Networking (SDN) offers significant advantages for modern networks,
including flexibility, centralized control, and reduced dependency on vendor-specific …

[HTML][HTML] Overview of IoT Security Challenges and Sensors Specifications in PMSM for Elevator Applications

EI Vlachou, VI Vlachou, DE Efstathiou, TS Karakatsanis - Machines, 2024 - mdpi.com
The applications of the permanent magnet synchronous motor (PMSM) are the most seen in
the elevator industry due to their high efficiency, low losses and the potential for high energy …

Detection of Vulnerabilities in the Perimeter of the ICS Network Infrastructure Using TCP/IP Protocols

AM Boger, AN Sokolov - 2023 International Russian …, 2023 - ieeexplore.ieee.org
The use of vulnerability scanners, as a rule, is aimed at finding vulnerabilities in the network
infrastructure of industrial networks for their subsequent elimination. In automated mode …