2018
DOI: 10.1016/j.clsr.2017.12.004
|View full text |Cite
|
Sign up to set email alerts
|

Avoiding the internet of insecure industrial things

Abstract: Abstract:Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives. Legal changes are being ushered by the European Union (EU) Network and Information Security (NIS) Directive 2016 and the General Data Protection Regulation 2016 (GDPR) (both to be enforc… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
57
0
2

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 73 publications
(59 citation statements)
references
References 26 publications
0
57
0
2
Order By: Relevance
“…Also, ICPS are vulnerable to external attacks due to the tight integration of cyber and physical parts. In fact, security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory NCS are on the increase [359]. Data management in such systems is crucial, as the increased scalability of the deployments can frustrate effective management of security risks, partly due to the complexity of managing the large volumes of data and risks manifesting across interdependent systems.…”
Section: Computation and Data Analytics Articlesmentioning
confidence: 99%
“…Also, ICPS are vulnerable to external attacks due to the tight integration of cyber and physical parts. In fact, security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory NCS are on the increase [359]. Data management in such systems is crucial, as the increased scalability of the deployments can frustrate effective management of security risks, partly due to the complexity of managing the large volumes of data and risks manifesting across interdependent systems.…”
Section: Computation and Data Analytics Articlesmentioning
confidence: 99%
“…In the evolving IIoT ecosystem, security incidents and vulnerabilities are on the increase [46]. The sheer scale and inextricable interconnectedness of IIoT significantly expanded the security attack surfaces and there is much to be done from device authentication to the formal verification of new generation of smart contracts.…”
Section: Security and Privacy In Blockchain Enabled Iiotmentioning
confidence: 99%
“…In the past, the SCADA systems in ICS are ‗air-gapped' to safeguard the systems. However, with the progress of Industrial IoT (IIOT) and networked integration across SCADA systems [23], the systems are often controlled by operating systems such as Windows and Linux, thus exposing the systems to mainstream malware.…”
Section: A Geopolitical Risk and Threatsmentioning
confidence: 99%
“…Currently, there are at least two main regulatory frameworks that apply to the geopolitical risk of IoT, including data protection regulations and security of essential service [23]. Due to geopolitical uncertainty, many countries have imposed laws and regulations that tighten cross-border data flow and technology equipment.…”
Section: B Laws and Regulationsmentioning
confidence: 99%