IoT Security in Industry: A Threat Model of Existing and Future Network Infrastructure

被引:0
|
作者
McNett, Jackie [1 ]
McNett, Josh [2 ]
Su, Xiaoli [3 ]
机构
[1] Auburn Univ, Dept Criminal Justice, Montgomery, AL 36117 USA
[2] Univ Denver, Univ Coll, Denver, CO 80208 USA
[3] Jackson State Univ, Dept Criminal Justice & Sociol, Jackson, MS USA
关键词
Security; internet of things; network infrastructure;
D O I
10.1080/19361610.2022.2116921
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
While recent developments in The Internet of Things (IoT) present an infinite number of new possibilities for smart factories, the rapid expansion of this technology in industry presents an unprecedented security concern. Implementing IoT solutions in industrial environments must be accomplished smartly by creating a comprehensive threat model of existing and future network infrastructure, and then by utilizing standard information security controls followed by the application of an industry-appropriate risk management framework. Approaching the problem of IoT security methodically will allow smart factories to benefit from IoT solutions while mitigating all associated risks.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 50 条
  • [21] Actually existing security: The political economy of the Saharan threat
    Lacher, Wolfram
    SECURITY DIALOGUE, 2008, 39 (04) : 383 - 405
  • [22] Performance Evaluation of IoT Network Infrastructure
    Rafique, Waleed
    Shah, Munam Ali
    2016 22ND INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2016, : 349 - 354
  • [23] Network and IT Infrastructure Services for the IoT Store
    Fromentoux, Gael
    Omnes, Nathalie
    INTERNET OF THINGS: USER-CENTRIC IOT, PT I, 2015, 150 : 289 - 296
  • [24] Building an IoT Public Network Infrastructure
    Jesi, Gian Paolo
    Benetti, Elisa
    Mazzini, Gianluca
    2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2019, : 324 - 328
  • [25] Security Interoperability in Heterogeneous IoT Platforms: Threat Model of the Interoperable OAuth 2.0 Framework
    Oh, Se-Ra
    Koo, Jahoon
    Kim, Young-Gab
    37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 22 - 31
  • [26] Network Security Infrastructure Management
    Rojanakul, Kittichote
    Liang, Hu
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 412 - 415
  • [27] Resilient infrastructure for network security
    Williamson, MM
    COMPLEXITY, 2003, 9 (02) : 34 - 40
  • [28] Data Security and Threat Modeling for Smart City Infrastructure
    Wang, Paul
    Ali, Amjad
    Kelly, William
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [29] VisIoT: A Threat Visualisation Tool for IoT Systems Security
    Sarigiannidis, Panagiotis
    Karapistoli, Eirini
    Economides, Anastasios A.
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2633 - 2638
  • [30] Future Spaces: Reinventing the Home Network for Better Security and Automation in the IoT Era
    Boussard, Mathieu
    Bui, Dinh Thai
    Douville, Richard
    Justen, Pascal
    Le Sauze, Nicolas
    Peloso, Pierre
    Vandeputte, Frederik
    Verdot, Vincent
    SENSORS, 2018, 18 (09)