Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

IoT Supply Chain Security Risk Analysis and MitigationRisk Modeling and Analysis

IoT Supply Chain Security Risk Analysis and Mitigation: Risk Modeling and Analysis [Securing the supply chain of information and communications technology (ICT) has recently emerged as a critical concern for national security and integrity. With the proliferation of Internet of ThingsInternet of Things (IoT) devices and their increasing role in controlling real world infrastructure, there is a need to analyze risks in networked systems beyond established security analyses. Existing methods in literature typically leverage attack and fault trees to analyze malicious activity and its impact. In this chapter, we develop a security risk assessment framework borrowing from system reliability theory to incorporate the supply chain. We also analyze the impact of grouping within suppliers that may pose hidden risks to the systems from malicious Supply chain actorssupply chain actors. The results show that the proposed analysis is able to reveal hidden threats posed to the IoT ecosystem from potential supplier collusion.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

IoT Supply Chain Security Risk Analysis and MitigationRisk Modeling and Analysis

Loading next page...
 
/lp/springer-journals/iot-supply-chain-security-risk-analysis-and-mitigation-risk-modeling-KrDDlDZBw9
Publisher
Springer International Publishing
Copyright
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
ISBN
978-3-031-08479-9
Pages
15 –38
DOI
10.1007/978-3-031-08480-5_2
Publisher site
See Chapter on Publisher Site

Abstract

[Securing the supply chain of information and communications technology (ICT) has recently emerged as a critical concern for national security and integrity. With the proliferation of Internet of ThingsInternet of Things (IoT) devices and their increasing role in controlling real world infrastructure, there is a need to analyze risks in networked systems beyond established security analyses. Existing methods in literature typically leverage attack and fault trees to analyze malicious activity and its impact. In this chapter, we develop a security risk assessment framework borrowing from system reliability theory to incorporate the supply chain. We also analyze the impact of grouping within suppliers that may pose hidden risks to the systems from malicious Supply chain actorssupply chain actors. The results show that the proposed analysis is able to reveal hidden threats posed to the IoT ecosystem from potential supplier collusion.]

Published: Jun 11, 2022

There are no references for this article.