Avoiding the internet of insecure industrial things

Article, Preprint English OPEN
Urquhart, Lachlan; McAuley, Derek;
  • Publisher: Elsevier
  • Related identifiers: doi: 10.1016/j.clsr.2017.12.004
  • Subject: Computer Science - Distributed, Parallel, and Cluster Computing | network and information security | autonomous vehicles | smart grids | Computer Science - Human-Computer Interaction | industrial control systems | data protection | industrial internet of things | Computer Science - Computers and Society | cybersecurity | data protectionsmart grids

Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawi... View more
  • References (127)
    127 references, page 1 of 13

    2 Lachlan Urquhart and Tom Rodden, “New Directions in Information Technology Law: Learning from Human-computer Interaction,” International Review of Law, Computers & Technology 31, no. 2 (2017): 1-19. - their working definition is derived from surveying a range of IoT stakeholder definitions e.g. Internet Engineering Task Force; International Telecommunications Union; Cisco; Internet Society etc.

    3 Accenture Technology, “Driving Unconventional Growth through the Industrial Internet of Things,” 2015, https://www.accenture.com/ gb-en/_acnmedia/Accenture/next-gen/reassembling-industry/pdf/ Accenture-Driving-Unconventional-Growth-through-IIoT.pdf.

    4 World Economic Forum / Accenture, “Industrial Internet of Things: Unleashing the Potential of Connected Products and Services” (Cologny, 2015), http://www3.weforum.org/docs/WEFUSA _IndustrialInternet_Report2015.pdf.

    5 Li Da Xu et al., “Internet of Things in Industries: A Survey,” IEEE Transactions on Industrial Informatics 10, no. 4 (2014), doi:10.1109/ TII.2014.2300753.

    6 Ibid.

    7 Derek O'Halloran and Elena Kvochko, “Industrial Internet of Things: Unleashing the Potential of Connected Products and Services,” World Economic Forum, no. January (2015): 40.

    8 Iain Thomson, “BBC's Micro:bit Turns out to Be an Excellent Drone Hijacking Tool • The Register,” The Register, 2017, https://www.there gister.co.uk/2017/07/29/bbcs_microbit_drone_hijacking_tool/.

    9 Jim Finkle, “J & J Warns Diabetic Patients: Insulin Pump Vulnerable to Hacking,” Reuters, 2016, http://uk.reuters.com/article/ us-johnson-johnson-cyber-insulin-pumps-e-idUKKCN12411L.Lily Hay Newman, 'Medical Devices Are the Next Security Nightmare', Wired, 2017, https://www.wired.com/2017/03/medical-devicesnext-security-nightmare/.

    10 ENISA, Threat Landscape Report 2016 (ENISA, Heraklion, 2017), 67- 72.

    11 Dmitri Alperovitch, “Revealed: Operation Shady RAT,” White Paper, 2011, https://www.mcafee.com/us/resources/white-papers/wpoperation-shady-rat.pdf.

  • Metrics
    views in OpenAIRE
    views in local repository
    downloads in local repository

    The information is available from the following content providers:

    FromNumber Of ViewsNumber Of Downloads
    Nottingham ePrints - IRUS-UK 0 65
Share - Bookmark