Electronics 12 03800
Electronics 12 03800
Electronics 12 03800
Review
AI in IIoT Management of Cybersecurity for Industry 4.0 and
Industry 5.0 Purposes
Grzegorz Czeczot , Izabela Rojek * , Dariusz Mikołajewski and Belco Sangho
Keywords: artificial intelligence; Internet of Things; cybersecurity; Industry 4.0; Industry 5.0; deep
learning (DL); Industrial Internet of Things (IIoT); machine learning (ML); edge computing
and processing of data from all Industry 4.0 subsystems, as well as the collection of data
from individual sensors is an extremely important process that requires careful planning
and protection. The success of a well-managed company lies in the accuracy of this data,
which helps in the current control of production processes, but also in the necessary future
analysis of the development of these processes. In most cases, on-premise models from
one of several leading vendors are still used to manage the entire business, with numerous
modifications to adapt the software to the needs of the company. Today’s transformation
aims to standardize data exchange primarily through an application programming interface
(API) that, built into applications, greatly facilitates data exchange, but does not provide a
path to full integration [1–4].
The digitization of more and more aspects of industrial processes and the increasing
use of automated big data collection from sensors and actuators, inference, trend analysis
and AI-based future event prediction is now providing a step change in the quality of
industrial production in many industries, but at the same time increasing the requirements
for their reliability, including resilience to unintentional (failures) and intentional (cyber
attacks). So far, the largest use of AI in Industry 4.0 is directly in manufacturing and
logistics—a trend that is likely to strengthen due to the demands of global freight transport
or global supply shortages in recent years [3–5].
AI systems in cybersecurity are able to replace specialists in less responsible tasks that
can be automated and require speed, or serve as advisory (second opinion) systems in tasks
that require a final human decision. This will not only relieve the burden on specialists, but
also accelerate the defense response or increase its precision. In the case of an AI-supported
attack, using AI in defense may be the only way to successfully repel it, avoiding data loss
or system downtime. Self-learning AI systems can more easily and quickly isolate new
types of attacks and creatively produce countermeasures mechanisms in near real-time,
only to be analyzed later by specialists. In some cases, such analysis after time will be
the only solution, as the time for an effective response may be too short, especially in
complex systems with many distributed structures. For this reason, the areas of activity
can be divided into endpoint security, network security, application security, and cloud
security [6,7].
This article sheds light on the potential role of artificial intelligence (AI) techniques,
including machine learning (ML) and deep learning (DL), to significantly impact IIoT cyber
threat prediction in Industry 5.0.
2. Industry 5.0
In organizations such as supply networks, Industry 5.0 refers to a new level of seamless
and harmonious integration between people, automation, and machines. Automation refers
to the management, optimization and execution of processes and technologies. Therefore,
it is necessary to define, select, and implement automation. Automation can be defined in
several ways:
• Replacing or augmenting human tasks with automated tasks;
• Execution of a physical or virtual (in whole or in part) function previously performed
(in whole or in part) by a human;
• A system or method in which processes are carried out automatically or are controlled
by automatic automation or something similar;
• A person or animal that behaves monotonously, routinely, and without active intelligence;
• Replacing human activities with robots or intelligent machines that perform tasks or
functions that are monotonous, routine, and standardized.
Increased productivity, agility, profitability, better adaptability, readiness for change,
responsive work environment, and overall cost reduction are the main advantages of
Industry 5.0. If the current Industry 4.0 or future Industry 5.0 wants to incorporate machine
learning or artificial intelligence in the future, it will need to consider the need to process
huge amounts of data from multiple sources. Managing or updating such a data structure
will become an increasingly complex process [1,2,8,9].
Electronics 2023, 12, 3800 3 of 15
IoT and IIoT networks are particularly vulnerable to cyber attacks. The complexity of
the above solutions and their partial independence creates at the same time a greater num-
ber of attack vectors, i.e., channels that allow hackers to potentially access data or otherwise
use them to attack the efficiency of the system. The vulnerability may concern the IIoT de-
vices themselves (sensors, actuators, power supply, or monitoring/concentrating devices),
as well as the networks in which they communicate, as well as mobile applications, Internet
platforms and cloud databases, as well as analytical and control software coordinating the
activities of lower layers. IoT systems process a lot of data that can be useful to criminals,
ranging from raw data to financial or personal data, audio recordings, still and moving
images, or multimodal data (technical files, operation algorithms, or ready-made analyzes
using digital twins). They can be used to carry out precise phishing attacks, the target of
which may be a specific person in the enterprise, for some reason considered vulnerable
(also in a hidden way, e.g., has a sick family member). There are no universally recognized
legal regulations or security standardization. Many of the individual devices that make
up IoT networks have poor security or are not designed to connect to public networks.
The consequences of attacks on IIoT systems are potentially the most costly, because every
minute of production downtime translates into smooth operation and financial liquidity of
the company. Sometimes, such a threat in a difficult situation of a company may be enough
to extort a ransom from companies that do not want to risk losing access to electricity,
transport networks, etc. Therefore, knowledge of the rules and appropriate protection in
unobvious ways are the basic protection against real or imagined (bluff) threats in the area
of cybersecurity, and continuous monitoring of threats and counteracting their occurrence
should be the basis of every company’s cybersecurity strategy. In the case of the attack
itself, it may be too late to react effectively (Table 1) [10–12].
Cybersecurity Domain
Client level security
Monitoring SaaS
Transmission medium security
Data and storage security
PaaS
Identity and access management
Virtual image security
Network and perimeter security IaaS
Physical security
SaaS is an application delivery model where applications are hosted in the cloud and
delivered over the Internet to the end user. In this model, an independent software vendor
(ISV) can contract with a third-party cloud provider to host applications. Alternatively, the
cloud provider may be a software provider for larger companies such as Microsoft.
AaaS is a type of service where applications are delivered over the Internet on demand
and billed to the consumer on a per-use or monthly or yearly basis. AaaS applications are
hosted on the server, managed by the host, and delivered remotely to the user’s device,
unlike traditional applications installed on devices. Since it is hosted on a server, all updates,
configurations and security for this application are applied on the server and not on every
endpoint. From a user and business perspective, all these attributes have huge implications.
The bolder concept of real-time data processing anywhere with access to the cloud
is called data as a service (DaaS). This concept assumes that data will not only be col-
lected from the currently hermetic enterprise, but also compared with data from outside
the enterprise. Another aspect that significantly increases the probability of success is
the simultaneous analysis of suppliers’ inventory and even the current needs of end cus-
tomers. On the other hand, when talking about the use of DaaS, the concept of master data
management (MDM) should also be mentioned.
Master data management is a system acting as a central data repository. It contains
all the data that the company has and supports its management. This includes technical,
transactional/commercial, logistics, marketing, and multimedia data (digital assets and
their metadata). All data are combined so that it is consistent and always up to date. When
different systems use the same data, the data are often redundant and it is difficult to
determine which data are up-to-date. Different types of data are in different formats on
different systems, making it difficult to access. Sometimes it is difficult to extract data from
the system and it is completed manually [13–15].
The aspect of ensuring cybersecurity of the transmitted and processed data is extremely
important. The lack of susceptibility to hostile outside interference in production processes,
as well as the protection of data archives from the past and those remaining in R&D
departments, should be a key area of development of conscious management. Although
on-premises solutions are still popular, the future lies in the use of secure cloud solutions.
Large organizations with offices in many countries can secure all their data processing
needs with cloud solutions. Using cloud facilities such as freely scalable storage:
• Storage of data resources;
• Computing power;
• Cyber threat prevention and response.
Not so long ago, they enabled full integration with machine learning (ML), deep
learning (DL), or artificial intelligence (AI) for the analysis of historical and current data.
Artificial intelligence can play a vital role in this digital transformation of business. The
aforementioned multitude of data and the need to select the right data by Industry 4.0 data
• Cyber threat prevention and response.
Not so long ago, they enabled full integration with machine learning (ML), deep
learning (DL), or artificial intelligence (AI) for the analysis of historical and current data.
Artificial intelligence can play a vital role in this digital transformation of business. The
Electronics 2023, 12, 3800
aforementioned multitude of data and the need to select the right data by Industry5 of4.0 15
data experts would be too time-consuming, and the conclusions would be outdated. AI
will help sift through vast amounts of data to obtain to the most important ones right now
experts
[15,16]. would be too time-consuming, and the conclusions would be outdated. AI will help
sift through vast amounts of data to obtain to the most important ones right now [15,16].
3. AI-Based Approaches
3. AI-Based Approaches
Traditional AI differs from the machine learning (ML) and deep learning (DL)
Traditional
discussed below,AIwhich
differs
arefrom
partthe machine
of AI, learning (ML)
as it replicates andthe
the way deep learning
human brain(DL) dis-
thinks,
cussed below, which are part of AI, as it replicates the way the human
acts, and functions, often based on patterns derived from nature (Figure 1). brain thinks, acts,
and functions, often based on patterns derived from nature (Figure 1).
Table 3. Strengths, weaknesses, opportunities, and threats (SWOT) analysis for AI applications
inIIoT cybersecurity.
Strengths Weaknesses
The need to ensure a sufficiently large
amount of data and their appropriately
Internal Automated patterns analysis; high quality;
Possibility of an individual approach. Poor understanding of today’s market,
business and marketing trends on a
global level.
Opportunities Threats
Lack of standardization;
Comprehensive intelligent security Higher price;
External management; Few specialists;
The first-mover effect in a newly The risk of market domination by
emerging market; global corporations;
Large market size. In some markets: algorithms and
software cannot be patented.
AI Technology Application
Analyzing individual data fragments according to sets of
Decision trees rules, classifying them as “no change” or “suspected attack”.
The ability to automatically develop new sets of rules.
Data classification based on anomalous activities within
Naïve Bayes
them based on target activity classes.
Electronics 2023, 12, 3800 7 of 15
Table 4. Cont.
AI Technology Application
Discovering patterns in large data sets. Create classes based
K-nearest neighbor (k-NN) on the Euclidean distance between data that arealready
classified and new pieces of data.
Early anomaly detection.
Traditional artificial neural Automatic security check.
networks Identification, classification, and estimation of damage
caused by security breaches.
Data-driven approach: processes data, tests hypotheses, and
Machine learning automatically extracts rules when ensuring sufficient data
quantity and quality.
Solving problems of much greater complexity than other
Deep learning techniques, e.g., in the analysis of images or
multimodal data.
Linguistic data analysis.
Fuzzy logic Capturing incomplete and uncertain data.
Trend analysis.
Estimating “smoothness” in patterns and imaged data.
Fractal analysis
Analysis of the trend and the possibility of its changes.
Processing and analyzing large amounts of natural language
Natural language processing data, including human–human and human–computer
interactions and sometimes emotions (affective computing).
4.1.2. Connectivity
Edge computing can overcome typical network limitations, but even the most tolerant
edge deployment will require a minimum level of connectivity. It is critical to design an
edge deployment that can handle poor or unreliable connectivity, and to consider what
happens at the edge when connectivity is lost. Self-sufficiency, AI, and graceful failure
planning in the wake of connectivity issues are essential to successful edge computing.
4.1.3. Security
IoT devices are well-known to be insecure, so it is important to design an edge
computing deployment that prioritizes proper device management, such as policy-driven
configuration enforcement, and security of compute and storage resources, including
elements such as software patching and updates, with particular attention to the encryption
of data at rest and in transit. IoT services from major cloud providers include secure
communications, but this is not automatic when building an edge site from scratch.
4.2. Blockchain
To conduct transactions in the digital currency market, a system called blockchain was
developed. Blockchain is often referred to as a fully distributed cryptographic system for
the recording and storage of a linear event log of interactions between networked actors
that is consistent and immutable. Blockchain applications are already well established in
the financial industry. More recently, they expanded into areas such as operations and SC
management. It is seen as a paradigm. It presents both a critical problem and an opportunity.
Blockchain technology can help to prevent conflicts that can arise when multiple changes
are made to a distributed database at the same time from different computers.
The data are tamper-proof because the ledger is protected by cryptographic functions
such as asymmetric keys, hashing, and digital signatures. In addition, the ledger is de-
centralized, so any small change in the data transaction is known to every member of the
blockchain, increasing the transparency of the whole system.
Although there are no detailed descriptions of this fusion of solutions, the attempt
to combine artificial intelligence, blockchains, and the Internet of Things was made many
times by scientists, tentatively called Block IoT Intelligence [21].
Considering the security and centralization issues of IoT applications in various
domains, it aims to achieve decentralized big data analytics.
It addresses existing challenges to achieve high accuracy, appropriate latencies, and security.
Blockchain is effective at decentralising and securing data, but at the same time, limits
the throughput of the system and its scalability (low blockchain read performance). Efficient
sharing techniques need to be introduced here, including for new applications, such as
autonomous vehicle networks (Table 5).
Electronics 2023, 12, 3800 9 of 15
5. Discussion
Key features of the IoT as a service (IoTaaS) paradigm include recognition of patterns
in machine-to-machine (M2M) data traffic, use of lightweight communication protocols,
vendor-specific proprietary physical and data link layer protocols, storage and processing
of data from IIoT devices by additional devices, as well as data processing in the com-
putational fog and storing them in a cloud database (often as an external service) [22,23].
Simultaneously optimizing performance and improving security and reducing costs when
communicating between machines and the Internet via IoT and collecting and analyzing
information in the cloud and at the edge requires data processing and system management
with algorithms and AI systems. Millions of terminal and intermediary devices based on
IoT operating in the open information space of Industry 5.0 bring many new threats in the
area of cybersecurity. The most common attacks on IoT infrastructure take advantage of
DDoS, scanning attacks, and false data injection. This is to cause, above all, disruption of the
operation of IoT devices (ultimately, destruction), less often to cause unauthorized access.
AI-based intrusion detection systems (IDS) and blockchain-based access control mecha-
nisms are currently being used to protect Industry 5.0 infrastructure. IDS monitors network
traffic, identifying unusual or suspicious activities and preventing the risk of hacking. The
aforementioned blockchain technology is already effectively used in almost all IoT domains
to build a decentralized, extremely difficult to make unauthorized, change in the security
structure, including the detection of fraudulent transactions [22,23]. The distributed ledger
service secures M2M transactions in the intelligent Industry 4.0 and Industry 5.0 ecosystem.
For this purpose, publishing and subscribe protocols, minimum latency and sufficient net-
work bandwidths, interoperability, scalability and mobility support, and analysis of service
availability and security constraints are used [23]. Camera sensor networks (CSNs), visual
sensors and actuators face problems with limited sensing range, allow optimal placement
of camera sensors and power consumption. Performance, tracking quality, and ranges of
motion need improvement, and it is all about reducing power consumption. This is made
possible by a pattern-based motion prediction algorithm for a moving object by applying
Electronics 2023, 12, 3800 10 of 15
data mining from the target’s past motion. The effectiveness of the proposed algorithms
is 4.6–15.2% compared to solutions without prediction [24]. The challenge is to securely
communicate vehicles, verify, and store their data. This also applies to data disclosed in
other systems in order to correctly locate or diagnose the vehicle and keep it in motion
(refuel/recharge batteries and update software). This requires increasing the memory or
reducing the upload frequency to avoid implementation and maintenance limitations [25].
The inputs to the ML models in IDS are extracted from the IoT using feature extraction
models. These models affect detection speed and accuracy. These include image filters,
transfer learning models (VGG-16, DenseNet), random forests, K-NN, SVM, and various
stacked models from other models. To date, VGG-16 combined with stacking gave the
highest accuracy (98.3%) [26]. Challenges also relate to the heterogeneity, scalability, and
complexity of IoT networks. Hence the more and more frequent implementations of a
biometric-based blockchain, e.g., an electronic health record (EHR, BBEHR) system that
uniquely identifies patients/users. This is now considered superior to the private/public
key used by most blockchain technologies [27]. Dynamic host configuration protocol
(DHCP) servers can be supplemented with Diffie–Hellman key exchange, elliptic curve
discrete logarithm problem (ECDLP), one-way hash function, blockchain technology, and
smart contract for registration and validation processes to combat internal and external
DHCP threats. This results in an average of 21.1% greater resistance to the growing number
of attacks, including for the purpose of securing IoT address management servers [28].
Automatic calculations and recognition of data in IIoT can cause security and privacy risks
when sharing the above-mentioned data information. An IDS based on the Viterbi algo-
rithm, indirect trust (measuring the probability of generating malicious activities during
recording and sending), and the blockchain mechanism for IIoT can provide the required
level of security here [29]. Heterogeneous applications make it difficult to design a globally
accepted and resilient long-range wide area network (LoRaWAN)security model, even rely-
ing on a trusted key management server (TKMS) to securely manage and distribute keys
based on lightweight algorithms [30]. The compromise of accessibility and reliability of
services with the security of mobile users, including in various vehicles (driving, flying, sur-
face, and underwater), requires reconciliation. This requires, for example, supplementing
the blockchain with solutions protecting users’ privacy [31]. The next-generation Internet
of Things (NGIOT) will include not only 5G/6G or AI for cybersecurity and data analysis,
but also the implementation of flexible solutions combining heterogeneous software and
hardware, independent of individual existing vertical markets (industries and application
groups) based on a layered and modular edge cloud design (independent functions and
cross-cutting capabilities). The cloud-native concepts in the IoT systems of the edge cloud
continuum primarily include microservices, microapplications/enablers, containerization,
and orchestration. Thus, independent software packages can be simultaneously or se-
quentially deployed and run at selected points in the hardware environment [32]. Lack
of encryption, malware, ransomware, and IoT botnets are considered the main risks of
IIoT cybersecurity. It is necessary to proactively track network traffic data; currently, it is
possible with an average increase in network bandwidth below 30 kb/s, a 2% increase in
CPU consumption, an increase in physical memory consumption by 0.2–0.42 GB, and a
13.5% increase in consumption energy [33]. Research reviews so far mainly pointed to the
uses of ML and DL for IoT security and their effectiveness in detecting attacks. SVM and
RF are most commonly used due to their high detection accuracy and memory efficiency.
Additionally, extreme gradient boosting (XGBoost), neural networks (NN), and recursive neu-
ral networks (RNN) provide high performance [34]. Industry’s rapid shift to cloud computing
raised concerns about IIoT data security as traditional security solutions fail [35]. It should also
be remembered that along with IIoT, supporting technologies (e.g., augmented reality—AR)
and cyber–physical systems are also developing, which may add their requirements to the
harmonization of functionality. Such assistive technology could be used for smart work
clothes (convergence of textiles and electronics, i-wear) with the mass integration of sensors
into textiles and the development of conductive yarn [36–40].
Electronics 2023, 12, 3800 11 of 15
Table 6. Summary of future research on AI in IIoT management of cybersecurity for Industry 4.0 and
Industry 5.0.
6. Conclusions
AI tools are critical to ensuring the cybersecurity of IIoT, Industry 4.0, and Industry 5.0
systems and giving them time to reach their full potential. The current accuracy of detecting
cybersecurity threats in IoT is as high as 97–99% (mainly in the case of DDoS attacks) [44,45].
This accuracy will further increase as the aforementioned group of AI systems develops,
specializes and modularizes, and in some cases, develops an infrastructure of global AI
systems overseeing entire groups of AI-based tools.
AI can adapt current and future decision-making models, analytics frameworks, and
practices based on new data. In this way, they learn about changes in IIoT behavior,
adapt to them, and are able to more easily detect any anomalies, classify them, react,
and sometimes even predict threats. This makes AI-based solutions more dynamic and
easier to use effectively compared to other means of cybersecurity, especially in the face
of dynamic changes in the goals and strategies used by attackers. In this way, AI-based
cybersecurity systems will adapt faster and better to changing industrial infrastructures,
including beyond the current paradigms of Industry 4.0 and Industry 5.0. Creative threat
prediction, i.e., the creative search for and testing of security gaps and vulnerabilities,
will become the foundation for responding to threats that may come from cyberspace in
the future.
Therefore, AI is not only a present tool, but also a tool for the future, ready for
challenges and threats that we do not know yet, but for which we already have to prepare.
Organizations can develop AI models that will play a key role in proactively identifying
and addressing emerging threats and vulnerabilities in evolving Industry 5.0 technologies,
ultimately enhancing the security and resilience of industrial systems. This is the only valid
direction for the development of cyber defense AI systems in a situation where AI systems
of a potential aggressor, often unknown or difficult to clearly identify in hybrid warfare,
may be behind the attack.
Author Contributions: Conceptualization, G.C., I.R., D.M. and B.S.; methodology, G.C., I.R., D.M.
and B.S.; software, G.C., I.R. and D.M.; validation, G.C., I.R., D.M. and B.S.; formal analysis, G.C.,
I.R., D.M. and B.S.; investigation, G.C., I.R., D.M. and B.S.; resources, G.C., I.R., D.M. and B.S.; data
curation, G.C., I.R., D.M. and B.S.; writing—original draft preparation, G.C., I.R., D.M. and B.S.;
writing—review and editing, G.C., I.R., D.M. and B.S.; visualization, D.M.; supervision, I.R. and
D.M.; project administration, I.R.; funding acquisition, I.R. All authors have read and agreed to the
published version of the manuscript.
Funding: The work presented in the paper has been financed under a grant to maintain the research
potential of Kazimierz Wielki University.
Data Availability Statement: Data is unavailable due to privacy and cyber security.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Czeczot, G.; Rojek, I.; Mikołajewski, D. Analysis of Cyber Security Aspects of Data Transmission in Large-Scale Networks Based
on the LoRaWAN Protocol Intended for Monitoring Critical Infrastructure Sensors. Electronics 2023, 12, 2503. [CrossRef]
2. Lombardi, M.; Pascale, F.; Santaniello, D. Internet of Things: A General Overview between Architectures, Protocols and
Applications. Information 2021, 12, 87. [CrossRef]
3. Alabdulatif, A.; Khalil, I.; Saidur Rahman, M. Security of Blockchain and AI-Empowered Smart Healthcare: Application-Based
Analysis. Appl. Sci. 2022, 12, 11039. [CrossRef]
4. Pooyandeh, M.; Han, K.-J.; Sohn, I. Cybersecurity in the AI-Based Metaverse: A Survey. Appl. Sci. 2022, 12, 12993. [CrossRef]
5. Fernando, D.W.; Komninos, N.; Chen, T. A Study on the Evolution of Ransomware Detection Using Machine Learning and Deep
Learning Techniques. IoT 2020, 1, 551–604. [CrossRef]
6. Michailidis, E.T.; Potirakis, S.M.; Kanatas, A.G. AI-Inspired Non-Terrestrial Networks for IIoT: Review on Enabling Technologies
and Applications. IoT 2020, 1, 21–48. [CrossRef]
7. Dhillon, H.S.; Huang, H.; Viswanathan, H. Wide-area Wireless Communication Challenges for the Internet of Things. IEEE
Commun. Mag. 2017, 55, 168–174. [CrossRef]
8. Challita, U.; Ferdowsi, A.; Chen, M.; Saad, W. Machine Learning for Wireless Connectivity and Security of Cellular-Connected
UAVs. IEEE Wirel. Commun. 2019, 26, 28–35. [CrossRef]
Electronics 2023, 12, 3800 14 of 15
37. Rojek, I.; Macko, M.; Mikołajewski, D.; Saga, M.; Burczynski, T. Modern methods in the field of machine modeling and simulation
as a research and practical issue related to Industry 4.0. Bull. Pol. Acad. Sci. Tech. Sci. 2021, 69, e136719. [CrossRef]
38. Rojek, I.; Mikołajewski, D.; Macko, M.; Szczepański, Z.; Dostatni, E. Optimization of Extrusion-Based 3D Printing Process Using
Neural Networks for Sustainable Development. Materials 2021, 14, 2737. [CrossRef] [PubMed]
39. Rojek, I.; Mikołajewski, D.; Kotlarz, P.; Macko, M.; Kopowski, J. Intelligent system supporting technological process planning for
machining and 3D printing. Bull. Pol. Acad. Sci. Tech. Sci. 2021, 69, e136722.
40. Rojek, I. Neural networks as performance improvement models in intelligent CAPP systems. Control Cybern. 2010, 39, 55–68.
41. Rojek, I. Classifier models in intelligent CAPP systems. In Man-Machine Interactions, Advances in Intelligent and Soft Computing;
Cyran, K.A., Kozielski, S., Peters, J.F., Stanczyk, U., Wakulicz-Deja, A., Eds.; Springer: Berlin/Heidelberg, Germany, 2009;
pp. 311–319.
42. Prokopowicz, P.; Mikołajewski, D.; Mikołajewska, E.; Kotlarz, P. Fuzzy system as an assessment tool for analysis of the health-
related quality of life for the people after stroke. In Proceedings of the International Conference on Artificial Intelligence and Soft
Computing, Zakopane, Poland, 11–15 June 2017; LNAI. Volume 10245, pp. 710–721.
43. Mikołajewska, E.; Mikołajewski, D. Integrated IT environment for people with disabilities: A new concept. Cent. Eur. J. Med.
2014, 9, 177–182. [CrossRef]
44. Kuzlu, M.; Fair, C.; Guler, O. Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity. Discov. Internet Things
2021, 1, 7. [CrossRef]
45. Selvarajan, S.; Srivastava, G.; Khadidos, A.O.; Khadidos, A.O.; Baza, M.; Alshehli, A.; Lin, J.C.-W. An artificial intelligence
lightweight blockchain security model for security and privacy in IIoT systems. J. Cloud Comp. 2023, 12, 38. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.