... it is essential to understand which threats exist and how attackers could proceed. In the following section, various attack vectors will be presented based on the life cycle of an IIoT device, as shown in Figure 1. The life cycle of an IIoT device starts with its design. ...