2019
DOI: 10.3390/s19112518
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Assessment of Sensor Systems

Abstract: There are more and more applications of sensors in today’s world. Moreover, sensor systems are getting more complex and they are used for many high-risk security-critical purposes. Security assurance is a key issue for sensors and for other information technology (IT) products. Still, sensor security facilities and methodologies are relatively poor compared to other IT products. That is why a methodical approach to the sensor IT security is needed, i.e., risk management, implementation of countermeasures, vuln… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…This predictive capability ensures that new infrastructures are 'climateproofed' from the onset (Azevedo de Almeida and Mostafavi, 2016). Furthermore, assessment tools, often sensor-driven, can evaluate the current state of infrastructure, detecting vulnerabilities (Bialas, 2019;Soga and Schooling, 2016). Drones equipped with high-resolution cameras can inspect structures like bridges or dams, identifying areas of wear and tear that might be exacerbated by climate impacts (Ridolfi et al, 2017).…”
Section: Ict Tools For Infrastructure Design and Assessmentmentioning
confidence: 99%
“…This predictive capability ensures that new infrastructures are 'climateproofed' from the onset (Azevedo de Almeida and Mostafavi, 2016). Furthermore, assessment tools, often sensor-driven, can evaluate the current state of infrastructure, detecting vulnerabilities (Bialas, 2019;Soga and Schooling, 2016). Drones equipped with high-resolution cameras can inspect structures like bridges or dams, identifying areas of wear and tear that might be exacerbated by climate impacts (Ridolfi et al, 2017).…”
Section: Ict Tools For Infrastructure Design and Assessmentmentioning
confidence: 99%
“…The risk value will then be used as a graph for easy viewing, which types of exploitation and vulnerability occur frequently. The assurance of an IT product means that the product meets its security objectives, that the security measures implemented by the product will be able to counter the threat as it occurs [26]- [28]. The frequency of penetration testing responds to many factors, from industry type to network technology and regulatory compliance.…”
Section: Walkthrough Analysis With Vulnixmentioning
confidence: 99%
“…Reference [7] presents a vulnerability assessment of sensor systems. The authors develop a new Common Criteria-compliant method to specify the vulnerability assessment process and related data in a structured way for WSNs.…”
Section: Summary Of the Special Issuementioning
confidence: 99%