RIoTS: Risk Analysis of IoT Supply Chain Threats

11/28/2019
by   Timothy Kieras, et al.
0

Securing the supply chain of information and communications technology (ICT) has recently emerged as a critical concern for national security and integrity. With the proliferation of Internet of Things (IoT) devices and their increasing role in controlling real world infrastructure, there is a need to analyze risks in networked systems beyond established security analyses. Existing methods in literature typically leverage attack and fault trees to analyze malicious activity and its impact. In this paper, we develop RIoTS, a security risk assessment framework borrowing from system reliability theory to incorporate the supply chain. We also analyze the impact of grouping within suppliers that may pose hidden risks to the systems from malicious supply chain actors. The results show that the proposed analysis is able to reveal hidden threats posed to the IoT ecosystem from potential supplier collusion.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/27/2022

Accountability and Insurance in IoT Supply Chain

Supply chain security has become a growing concern in security risk anal...
research
07/21/2019

IoT Supply Chain Security: Overview, Challenges, and the Road Ahead

Supply chain is emerging as the next frontier of threats in the rapidly ...
research
03/20/2020

Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties

Supply chain security threats pose new challenges to security risk model...
research
07/29/2020

Security Architecture for Trustworthy Systems in 5G Era

Systems using 5G are expected to be used in various cases of Society 5.0...
research
08/06/2022

Preventing or Mitigating Adversarial Supply Chain Attacks; a legal analysis

The world is currently strongly connected through both the internet at l...
research
12/18/2022

From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem

Despite the numerous pompous statements regarding 5G, it is indisputable...
research
07/11/2019

Supply chain malware targets SGX: Take care of what you sign

Malware attacks represent a significant part of today's security threats...

Please sign up or login with your details

Forgot password? Click here to reset