Conclusion
In conclusion, having laid out the background including an overview of related terms in section two, we provided a survey of existing definitions of IIoT in section three and developed our own definition which we hope improves on those. In section four we then provided an analysis framework for IIoT devices which provides a practical classification schema for those with an interest in security-related issues surrounding IIoT. The use of the schema has been illustrated by examples at the end of each of the sections describing the six categories. Finally, in section five, some gaps in the IIoT related literature were identified, which we propose should be addressed as part of our continuing research.