Proceedings of the 5th on Cyber-Physical System Security Workshop 2019
DOI: 10.1145/3327961.3329528
|View full text |Cite
|
Sign up to set email alerts
|

Deriving Impact-driven Security Requirements and Monitoring Measures for Industrial IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…Some researchers have proposed new SRA models but focused on IoT and not on industrial environments [Guth et al, 2017, Zibuschka et al, 2019, Dimitrakos, 2018, Syed and Fernandez, 2018, Sabrina, 2019a, Sabrina, 2019b, Addo et al, 2014. Other researchers have preferred to propose the development of new models based on existing architectures for CPS, in particular RAMI 4.0, IIRA and 5C [Hansch et al, 2019a, Hansch et al, 2019b, Sharpe et al, 2019, Ma et al, 2017, Moghaddam et al, 2018, Baloyi and Kotzé, 2018, Ahmadi et al, 2018. Finally, another group of researchers has attempted to develop partial proposals for SRA without taking existing architectures into account [Craggs et al, 2019, Romero and Fernandez, 2017, Koziolek et al, 2018, Koziolek et al, 2020, ur Rehman et al, 2018.…”
Section: Related Workmentioning
confidence: 99%
“…Some researchers have proposed new SRA models but focused on IoT and not on industrial environments [Guth et al, 2017, Zibuschka et al, 2019, Dimitrakos, 2018, Syed and Fernandez, 2018, Sabrina, 2019a, Sabrina, 2019b, Addo et al, 2014. Other researchers have preferred to propose the development of new models based on existing architectures for CPS, in particular RAMI 4.0, IIRA and 5C [Hansch et al, 2019a, Hansch et al, 2019b, Sharpe et al, 2019, Ma et al, 2017, Moghaddam et al, 2018, Baloyi and Kotzé, 2018, Ahmadi et al, 2018. Finally, another group of researchers has attempted to develop partial proposals for SRA without taking existing architectures into account [Craggs et al, 2019, Romero and Fernandez, 2017, Koziolek et al, 2018, Koziolek et al, 2020, ur Rehman et al, 2018.…”
Section: Related Workmentioning
confidence: 99%
“…Often there are significant differences between the domains. While entire business use cases in the Smart Grid [29] and IIoT [17] domains could be successfully assessed all at once, analyses in the automotive sector greatly benefit from scoping to individual functions or components due to the required level of detail.…”
Section: Security Risk Assessmentmentioning
confidence: 99%
“…Identification, assessment, reuse, and propagation of security requirements are subject to recent research [17,29,101,102,104]. Requirements are typically expressed in natural language or requirements specification documents, which represent hardly machinereadable and interchangeable notations.…”
Section: Modeling Of Security Requirementsmentioning
confidence: 99%
See 2 more Smart Citations