Industrial Internet of Things Security for the Transportation Infrastructure


The transportation sector is evolving with the introduction of the Internet of Things (IoT) and Industrial Internet of Things (IIoT). IIoT devices are used in the monitoring and control of industrial and related processes and have many useful applications in the transportation sector. This article provides a comparison between IoT and IIoT, and an overview of the threats, vulnerabilities, risks, and incidents related to their use in the transport infrastructure. A guideline for security standards, frameworks, and controls to govern and secure IoT and IIoT specific to transport infrastructure is proposed, with a focus on the rail and maritime sectors.


Photo of Barend Pretorius

School of Management, Information Technology and Governance University of KwaZulu-Natal Durban,
South Africa

Barend Pretorius joined Transnet in 2014 as a Senior Information Security Analyst and in 2017 was appointed as the Information Security Officer at Transnet Port Terminals. He holds a master’s degree in Information Systems and Technology and Bachelor of Science Honours degree in Statistics. He is also a Certified Information Security Manager.

Photo of Dr. Brett van Niekerk

University of KwaZulu-Natal Durban,
South Africa

Dr. Brett van Niekerk is currently a senior lecturer in computer science at the University of KwaZulu-Natal, and previously was a senior information security analyst at Transnet. He has 10 years’ experience in information security, cybersecurity and information operations spanning academia, industry, and civil society. He serves as secretary for the International Federation of Information Processing, Working Group 9.10 on ICT in Peace and War, is Co-Editor-in-Chief of the International Journal of Cyber Warfare and Terrorism, Associate Editor for the International Journal of Information Security and Privacy, on the international advisory board for the Journal of Information Warfare, and serves as a reviewer for multiple other international and local journal and conferences such as the International Conference on Cyber Warfare and Security and the European Conference on Cyber Warfare and Security. He previously served as ISACA South Africa’s Academic Relations Coordinator (2016-2018) and a contributor to the SABS Working Group for ISO/IEC 27000-series standards. In 2012, he graduated with his PhD and has subsequently completed two years of postdoctoral research into information warfare and critical infrastructure protection. He is an NRF-rated researcher, has made over 30 presentations at local and international conferences, and has published ten book chapters and over 20 journal articles. He is a Certified Information Security Manager, achieving the third highest score in South Africa in the December 2014 exam period. In 2018, he was awarded ISACA South Africa’s Contribution Award for his work in information security and cybersecurity.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.
















Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.


Get in touch

Principal Office

  • Journal of Information Warfare
  • ArmisteadTEC
  • 525 Landfall Arch,
  • Virginia Beach, VA 23462

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455