Skip to main content

Advertisement

Log in

Security and Privacy in 5G-IIoT Smart Factories: Novel Approaches, Trends, and Challenges

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

To implement various artificial intelligence and automation applications in smart factories, edge computing and industrial Internet of Things (IIoT) devices must be widely deployed, so as to increase the demand of coping with huge-scale and high-diversity data. Through deployment of fifth-generation (5G) networks (providing wide broadband, low latency, and massive machine type communications), industrial wireless networks, cloud, and fixed/mobile end devices in smart factories are interoperated in a harmony. However, with the huge-scale deployment of 5G networks and the IIoT in smart factories, threats and attacks against various vulnerabilities increase enormously, and cause considerable security and privacy challenges. Consequently, this article investigates crucial security and privacy issues for 5G-IIoT smart factories in three entities (i.e., physical layer, data layer and application layer), and further surveys recent approaches based on deep learning, reinforcement learning, and blockchain. In addition, this article provides future perspectives and challenges along this line of research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Lien SY, Hung SC, Deng DJ, Wang YJ (2018) Optimum ultra-reliable and low latency communications in 5G new radio. Mob Networks Appl 23(4):1020–1027

    Article  Google Scholar 

  2. Sisinni E, Saifullah A, Han S, Jennehag U, Gidlund M (2018) Industrial internet of things: challenges, opportunities, and directions. IEEE Trans Industr Inf 14(11):4724–4734

    Article  Google Scholar 

  3. Gebremichael T, Ledwaba LP, Eldefrawy MH, Hancke GP, Pereira N, Gidlund M, Akerberg J (2020) Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access 8:152351–152366

    Article  Google Scholar 

  4. Vitturi S, Zunino C, Sauter T (2019) Industrial communication systems and their future challenges: next-generation ethernet, IIoT, and 5G. Proc IEEE 107(6):944–961

    Article  Google Scholar 

  5. Tange K, De Donno M, Fafoutis X, Dragoni N (2020) A systematic survey of industrial internet of things security: requirements and fog computing opportunities. IEEE Commun Surv Tutorials 22(4):2489–2520

    Article  Google Scholar 

  6. Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl 88:10–28

    Article  Google Scholar 

  7. Ogonji MM, Okeyo G, Wafula JM (2020) A survey on privacy and security of internet of things. Comput Sci Rev 38:100312

    Article  MathSciNet  Google Scholar 

  8. Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of things security: a top-down survey. Comput Netw 141:199–221

    Article  Google Scholar 

  9. Xu H, Yu W, Griffith D, Golmie N (2018) A survey on industrial internet of things: a cyber-physical systems perspective. IEEE Access 6:78238–78259

    Article  Google Scholar 

  10. Al-Naji FH, Zagrouba R (2020) A survey on continuous authentication methods in internet of things environment. Comput Commun 163:109–133

    Article  Google Scholar 

  11. Fang H, Qi A, Wang X (2020) Fast authentication and progressive authorization in large-scale IoT: how to leverage AI for security enhancement. IEEE Network 34(3):24–29

    Article  Google Scholar 

  12. Zhang Y, Kasahara S, Shen Y, Jiang X, Wan J (2018) Smart contract-based access control for the internet of things. IEEE Internet Things J 6(2):1594–1605

    Article  Google Scholar 

  13. Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J Netw Comput Appl 149:102481

    Article  Google Scholar 

  14. Amiri-Zarandi M, Dara RA, Fraser E (2020) A survey of machine learning-based solutions to protect privacy in the internet of things. Comput Secur 96:101921

    Article  Google Scholar 

  15. Eugster P, Kumar S, Savvides S, Stephen JJ (2019) Ensuring confidentiality in the cloud of things. IEEE Pervasive Comput 18(1):10–18

    Article  Google Scholar 

  16. Chen YJ, Wang LC, Wang S (2018) Stochastic blockchain for IoT data integrity. IEEE Trans Netw Sci Eng 7(1):373–384

    Article  Google Scholar 

  17. Xiong J, Ren J, Chen L, Yao Z, Lin M, Wu D, Niu B (2018) Enhancing privacy and availability for data clustering in intelligent electrical service of IoT. IEEE Internet Things J 6(2):1530–1540

    Article  Google Scholar 

  18. Li S, Da Xu L, Zhao S (2018) 5G internet of things: a survey. J Industr Inform Integr 10:1–9

    Google Scholar 

  19. Wollschlaeger M, Sauter T, Jasperneite J (2017) The future of industrial communication: automation networks in the era of the internet of things and industry 4.0. IEEE Ind Electron Mag 11(1):17–27

    Article  Google Scholar 

  20. Chettri L, Bera R (2019) A comprehensive survey on internet of things (IoT) toward 5G wireless systems. IEEE Internet Things J 7(1):16–32

    Article  Google Scholar 

  21. Vo NS, Duong TQ, Guizani M, Kortun A (2018) 5G optimized caching and downlink resource sharing for smart cities. IEEE Access 6:31457–31468

    Article  Google Scholar 

  22. Tang Y, Dananjayan S, Hou C, Guo Q, Luo S, He Y (2021) A survey on the 5G network and its impact on agriculture: challenges and opportunities. Comput Electron Agric 180:105895

    Article  Google Scholar 

  23. Selem E, Fatehy M, Abd El-Kader SM (2019) E-Health applications over 5G networks: challenges and state of the art. In: Proc. of 2019 6th International Conference on Advanced Control Circuits and Systems (ACCS) & 2019 5th International Conference on New Paradigms in Electronics & information Technology (PEIT):111–118

  24. Rao SK, Prasad R (2018) Impact of 5G technologies on industry 4.0. Wireless Pers Commun 100(1):145–159

    Article  Google Scholar 

  25. Bera B, Saha S, Das AK, Kumar N, Lorenz P, Alazab M (2020) Blockchain-envisioned secure data delivery and collection scheme for 5G-based IoT-enabled internet of drones environment. IEEE Trans Veh Technol 69(8):9097–9111

    Article  Google Scholar 

  26. Oyekanlu EA, Smith AC, Thomas WP, Mulroy G, Hitesh D, Ramsey M, Sun D (2020) A review of recent advances in automated guided vehicle technologies: integration challenges and research areas for 5G-based smart manufacturing applications. IEEE Access 8:202312–202353

    Article  Google Scholar 

  27. Ordonez-Lucena J, Chavarria JF, Contreras LM, Pastor A (2019) The use of 5G non-public networks to support Industry 4.0 scenarios. In: Proc. of 2019 IEEE Conference on Standards for Communications and Networking (CSCN):1–7

  28. Khan R, Kumar P, Jayakody DNK, Liyanage M (2019) A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions. IEEE Commun Surv Tutorials 22(1):196–248

    Article  Google Scholar 

  29. Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2018) Overview of 5G security challenges and solutions. IEEE Commun Stand Mag 2(1):36–43

    Article  Google Scholar 

  30. Sicari S, Rizzardi A, Coen-Porisini A (2020) 5G in the internet of things era: an overview on security and privacy challenges. Comput Netw 179:107345

    Article  Google Scholar 

  31. Deng DJ, Chen KC, Cheng RS (2014) IEEE 802.11 ax: next generation wireless local area networks. In: Proc. of IEEE 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness:77–82

  32. Deng DJ, Gan M, Guo YC, Yu J, Lin YP, Lien SY, Chen KC (2019) IEEE 802.11ba: low-power wake-up radio for green IoT. IEEE Commun Mag 57(7):106–112

    Article  Google Scholar 

  33. Deng J, Chang RS (1999) A priority scheme for IEEE 802. 11 DCF access method. IEICE Trans Commun 82(1):96–102

    Google Scholar 

  34. Pham TN, Tsai MF, Nguyen DB, Dow CR, Deng DJ (2015) A cloud-based smart-parking system based on internet-of-things technologies. IEEE Access 3:1581–1591

    Article  Google Scholar 

  35. Lien SY, Deng DJ, Lin CC, Tsai HL, Chen T, Guo C, Cheng SM (2020) 3GPP NR sidelink transmissions toward 5G V2X. IEEE Access 8:35368–35382

    Article  Google Scholar 

  36. Deng DJ, Lin YP, Yang X, Zhu J, Li YB, Luo J, Chen KC (2017) IEEE 802.11ax: highly efficient WLANs for intelligent information infrastructure. IEEE Commun Mag 55(12):52–59

    Article  Google Scholar 

  37. Deng DJ, Lien SY, Lee J, Chen KC (2016) On quality-of-service provisioning in IEEE 802.11 ax WLANs. IEEE Access 4:6086–6104

    Article  Google Scholar 

  38. Wang K, Qi X, Shu L, Deng DJ, Rodrigues JJPC (2016) Toward trustworthy crowdsourcing in the social internet of things. IEEE Wirel Commun 23(5):30–36

    Article  Google Scholar 

  39. Gope P, Sikdar B (2018) Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J 6(1):580–589

    Article  Google Scholar 

  40. Gope P, Das AK, Kumar N, Cheng Y (2019) Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans Industr Inf 15(9):4957–4968

    Article  Google Scholar 

  41. Gu Z, Chen H, Xu P, Li Y, Vucetic B (2020) Physical layer authentication for non-coherent massive SIMO-enabled industrial IoT communications. IEEE Trans Inf Forensics Secur 15:3722–3733

    Article  Google Scholar 

  42. Jangirala S, Das AK, Vasilakos AV (2019) Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment. IEEE Trans Industr Inf 16(11):7081–7093

    Article  Google Scholar 

  43. Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J Sel Areas Commun 38(5):942–954

    Article  Google Scholar 

  44. Pan F, Pang Z, Wen H, Luvisotto M, Xiao M, Liao RF, Chen J (2019) Threshold-free physical layer authentication based on machine learning for industrial wireless CPS. IEEE Trans Industr Inf 15(12):6481–6491

    Article  Google Scholar 

  45. Chen S, Pang Z, Wen H, Yu K, Zhang T, Lu Y (2020) Automated labeling and learning for physical layer authentication against clone node and sybil attacks in industrial wireless edge networks. IEEE Trans Industr Inf 17(3):2041–2051

    Article  Google Scholar 

  46. Han T, Liu C, Wu L, Sarkar S, Jiang D (2019) An adaptive spatiotemporal feature learning approach for fault diagnosis in complex systems. Mech Syst Signal Process 117:170–187

    Article  Google Scholar 

  47. Ma S, Chu F (2019) Ensemble deep learning-based fault diagnosis of rotor bearing systems. Comput Ind 105:143–152

    Article  Google Scholar 

  48. Wang Y, Pan Z, Yuan X, Yang C, Gui W (2020) A novel deep learning based fault diagnosis approach for chemical process with extended deep belief network. ISA Trans 96:457–467

    Article  Google Scholar 

  49. Xu Y, Sun Y, Liu X, Zheng Y (2019) A digital-twin-assisted fault diagnosis using deep transfer learning. IEEE Access 7:19990–19999

    Article  Google Scholar 

  50. Naik B, Obaidat MS, Nayak J, Pelusi D, Vijayakumar P, Islam SH (2019) Intelligent secure ecosystem based on Metaheuristic and functional link neural network for edge of things. IEEE Trans Industr Inf 16(3):1947–1956

    Article  Google Scholar 

  51. Tian Z, Luo C, Qiu J, Du X, Guizani M (2019) A distributed deep learning system for web attack detection on edge devices. IEEE Trans Industr Inf 16(3):1963–1971

    Article  Google Scholar 

  52. Tian Z, Shi W, Wang Y, Zhu C, Du X, Su S, Guizani N (2019) Real-time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans Industr Inf 15(7):4285–4294

    Article  Google Scholar 

  53. Yang C, Shi Z, Zhang H, Wu J, Shi X (2019) Multiple attacks detection in cyber-physical systems using random finite set theory. IEEE Trans Cybernetics 50(9):4066–4075

    Article  Google Scholar 

  54. Krithivasan K, Pravinraj S, VS SS (2020) Detection of cyberattacks in industrial control systems using enhanced principal component analysis and hypergraph-based convolution neural network (EPCA-HG-CNN). IEEE Trans Ind Appl 56(4):4394–4404

    Article  Google Scholar 

  55. Hu Y, Li H, Luan TH, Yang A, Sun L, Wang Z, Wang R (2020) Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. Future Gener Comput Syst 108:1230–1240

    Article  Google Scholar 

  56. Wang K, Zhou Y, Liu Z, Shao Z, Luo X, Yang Y (2020) Online task scheduling and resource allocation for intelligent NOMA-based industrial internet of things. IEEE J Sel Areas Commun 38(5):803–815

    Article  Google Scholar 

  57. Jie Y, Guo C, Choo KKR, Liu CZ, Li M (2020) Game-theoretic resource allocation for fog-based industrial internet of things environment. IEEE Internet Things J 7(4):3041–3052

    Article  Google Scholar 

  58. Wu H, Tian H, Fan S, Ren J (2020) Data age aware scheduling for wireless powered mobile-edge computing in industrial internet of things. IEEE Trans Industr Inf 17(1):398–408

    Article  Google Scholar 

  59. Li X, Wan J, Dai HN, Imran M, Xia M, Celesti A (2019) A hybrid computing solution and resource scheduling strategy for edge computing in smart manufacturing. IEEE Trans Industr Inf 5(7):4225–4234

    Article  Google Scholar 

  60. Deng S, Xiang Z, Zhao P, Taheri J, Gao H, Yin J, Zomaya AY (2020) Dynamical resource allocation in edge for trustable internet-of-things systems: a reinforcement learning method. IEEE Trans Industr Inf 16(9):6103–6113

    Article  Google Scholar 

  61. Zhang G, Chen Y, Shen Z, Wang L (2018) Distributed energy management for multiuser mobile-edge computing systems with energy harvesting devices and QoS constraints. IEEE Internet Things J 6(3):4035–4048

    Article  Google Scholar 

  62. Wang J, Jiang C, Zhang K, Hou X, Ren Y, Qian Y (2019) Distributed Q-learning aided heterogeneous network association for energy-efficient IIoT. IEEE Trans Industr Inf 16(4):2756–2764

    Article  Google Scholar 

  63. Wan J, Yang J, Wang S, Li D, Li P, Xia M (2019) Cross-network fusion and scheduling for heterogeneous networks in smart factory. IEEE Trans Industr Inf 16(9):6059–6068

    Article  Google Scholar 

  64. Wang X, Chai L, Zhou Y, Dan F (2021) Dual-network task scheduling in cyber-physical systems: a co-optimization approach. IEEE Trans Industr Inf 17(5):3143–3152

    Article  Google Scholar 

  65. Huang V, Chen G, Zhang P, Li H, Hu C, Pan T, Fu Q (2020) A scalable approach to SDN control plane management: high utilization comes with low latency. IEEE Trans Netw Serv Manage 17(2):682–695

    Article  Google Scholar 

  66. Li J, Shi W, Zhang N, Shen X (2021) Delay-aware VNF scheduling: a reinforcement learning approach with variable action set. IEEE Trans Cogn Commun Netw 7(1):304–318

    Article  Google Scholar 

  67. Messaoud S, Bradai A, Moulay E (2019) Online GMM clustering and mini-batch gradient descent based optimization for industrial IoT 4.0. IEEE Trans Industr Inf 16(2):1427–1435

    Article  Google Scholar 

  68. Xiang H, Yan S, Peng M (2020) A realization of fog-RAN slicing via deep reinforcement learning. IEEE Trans Wireless Commun 19(4):2515–2527

    Article  Google Scholar 

  69. Qu K, Zhuang W, Ye Q, Shen X, Li X, Rao J (2020) Dynamic flow migration for embedded services in SDN/NFV-enabled 5G core networks. IEEE Trans Commun 68(4):2394–2408

    Article  Google Scholar 

  70. Estrada-Solano F, Caicedo OM, Da Fonseca NL (2019) Nelly: flow detection using incremental learning at the server side of SDN-based data centers. IEEE Trans Industr Inf 16(2):1362–1372

    Article  Google Scholar 

  71. Ravi N, Shalinie SM (2020) Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J 7(4):3559–3570

    Article  Google Scholar 

  72. Fang L, Zhao B, Li Y, Liu Z, Ge C, Meng W (2020) Countermeasure based on smart contracts and AI against DoS/DDoS attack in 5G circumstances. IEEE Network 34(6):54–61

    Article  Google Scholar 

  73. Hassan MM, Gumaei A, Huda S, Almogren A (2020) Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model. IEEE Trans Industr Inf 16(9):6154–6162

    Article  Google Scholar 

  74. Saharkhizan M, Azmoodeh A, Dehghantanha A, Choo KKR, Parizi RM (2020) An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet Things J 7(9):8852–8859

    Article  Google Scholar 

  75. Maimó LF, Celdrán AH, Pérez MG, Clemente FJG, Pérez GM (2019) Dynamic management of a deep learning-based anomaly detection system for 5G networks. J Ambient Intell Humaniz Comput 10(8):3083–3097

    Article  Google Scholar 

  76. Wang N, Li W, Alipour-Fanid A, Jiao L, Dabaghchian M, Zeng K (2020) Pilot contamination attack detection for 5G MmWave grant-free IoT networks. IEEE Trans Inf Forensics Secur 16:658–670

    Article  Google Scholar 

  77. Chattopadhyay A, Mitra U (2019) Security against false data-injection attack in cyber-physical systems. IEEE Trans Control Netw Syst 7(2):1015–1027

    Article  MathSciNet  Google Scholar 

  78. Hussain B, Du Q, Sun B, Han Z (2021) Deep learning-based DDoS-attack detection for cyber-physical system over 5G network. IEEE Trans Industr Inf 17(2):860–870

    Article  Google Scholar 

  79. Diro AA, Chilamkurti N (2017) Distributed attack detection scheme using deep learning approach for internet of things. Future Gener Comput Syst 82:761–768

    Article  Google Scholar 

  80. Dai Y, Xu D, Maharjan S, Chen Z, He Q, Zhang Y (2019) Blockchain and deep reinforcement learning empowered intelligent 5G beyond. IEEE Network 33(3):10–17

    Article  Google Scholar 

  81. Rezvy S, Luo Y, Petridis M, Lasebae A, Zebin T (2019) An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. In: Proc. of 2019 53rd Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, pp 1–6

  82. Qi S, Lu Y, Wei W, Chen X (2020) Efficient data access control with fine-grained data protection in cloud-assisted IIoT. IEEE Internet Things J 8(4):2886–2899

    Article  Google Scholar 

  83. Xiong S, Ni Q, Wang L, Wang Q (2020) SEM-ACSIT: secure and efficient multiauthority access control for IoT cloud storage. IEEE Internet Things J 7(4):2914–2927

    Article  Google Scholar 

  84. Huang J, Kong L, Chen G, Wu MY, Liu X, Zeng P (2019) Towards secure industrial IoT: blockchain system with credit-based consensus mechanism. IEEE Trans Industr Inf 15(6):3680–3689

    Article  Google Scholar 

  85. Wu D, Ansari N (2020) A trust evaluation enhanced blockchain-secured industrial IoT system. IEEE Internet Things J 8(7):5510–5517

    Article  Google Scholar 

  86. Castiglione A, Nappi M, Ricciardi S (2020) Trustworthy method for person identification in IIoT environments by means of facial dynamics. IEEE Trans Industr Inf 17(2):766–774

    Article  Google Scholar 

  87. Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJ (2018) Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment. IEEE Internet Things J 5(6):4900–4913

    Article  Google Scholar 

  88. Wan J, Li J, Imran M, Li D (2019) A blockchain-based solution for enhancing security and privacy in smart factory. IEEE Trans Industr Inf 15(6):3652–3660

    Article  Google Scholar 

  89. Usman M, Jan MA, Jolfaei A, Xu M, He X, Chen J (2019) A distributed and anonymous data collection framework based on multilevel edge computing architecture. IEEE Trans Industr Inf 16(9):6114–6123

    Article  Google Scholar 

  90. Lu Y, Huang X, Dai Y, Maharjan S, Zhang Y (2019) Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans Industr Inf 16(6):4177–4186

    Article  Google Scholar 

  91. Zaghloul E, Zhou K, Ren J (2019) P-mod: secure privilege-based multilevel organizational data-sharing in cloud computing. IEEE Trans Big Data 6(4):804–815

    Article  Google Scholar 

  92. Qi S, Lu Y, Zheng Y, Li Y, Chen X (2020) Cpds: enabling compressed and private data sharing for industrial internet of things over blockchain. IEEE Trans Industr Inf 17(4):2376–2387

    Article  Google Scholar 

  93. Zhou R, Zhang X, Du X, Wang X, Yang G, Guizani M (2018) File-centric multi-key aggregate keyword searchable encryption for industrial internet of things. IEEE Trans Industr Inf 14(8):3648–3658

    Article  Google Scholar 

  94. Xu G, Li H, Dai Y, Yang K, Lin X (2018) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inf Forensics Secur 14(4):870–885

    Article  Google Scholar 

  95. Lu Y, Li J, Wang F (2020) Pairing-free certificate-based searchable encryption supporting privacy-preserving keyword search function for IIoTs. IEEE Trans Industr Inf 17(4):2696–2706

    Article  Google Scholar 

  96. Liu S, Yu J, Xiao Y, Wan Z, Wang S, Yan B (2020) BC-SABE: blockchain-aided searchable attribute-based encryption for cloud-IoT. IEEE Internet Things J 7(9):7851–7867

    Article  Google Scholar 

  97. Hao J, Liu J, Wu W, Tang F, Xian M (2019) Secure and fine-grained self-controlled outsourced data deletion in cloud-based IoT. IEEE Internet Things J 7(2):1140–1153

    Article  Google Scholar 

  98. Xue L, Yu Y, Li Y, Au MH, Du X, Yang B (2019) Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf Sci 479:640–650

    Article  Google Scholar 

Download references

Acknowledgements

This work has been supported in part by National Science and Technology Council, Taiwan, under Grants NSTC 112-2221-E-A49-116-MY3, NSTC 111-2221-E-A49-081, MOST 109-2221-E-009-068-MY3, MOST 108-2628-E-009-008-MY3, MOST 110-2622-E-A49-004, and MOST 108-2221-E-156-003.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Liang Liu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, CC., Tsai, CT., Liu, YL. et al. Security and Privacy in 5G-IIoT Smart Factories: Novel Approaches, Trends, and Challenges. Mobile Netw Appl 28, 1043–1058 (2023). https://doi.org/10.1007/s11036-023-02143-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-023-02143-5

Keywords

Navigation