Logo des Repositoriums
 

Operational Security Analysis and Challenge for IoT Solutions

dc.contributor.authorGao, Yuan
dc.contributor.authorLou, Xinxin
dc.contributor.editorReussner, Ralf H.
dc.contributor.editorKoziolek, Anne
dc.contributor.editorHeinrich, Robert
dc.date.accessioned2021-01-27T13:33:37Z
dc.date.available2021-01-27T13:33:37Z
dc.date.issued2021
dc.description.abstractThe marketing engagement of Internet of Things (IoT) shows a wide vista together with Industry 4.0 regarding modern manufacturing and services. However, the evolution of technologies and rising regulation concerns regarding security and privacy are bring challenges to IoT solutions. On one side, the security analysis of IoT solutions has to consider the security posture in a much wider scope including both edge and cloud sides even across global geo-locations. On the other side, new regulation requirements demand a full tracking of data access. In addition, authorizations should be evaluated explicitly and can be revoked any time for maximizing data protection. Both challenges can be solved by implementing a novel security model targeting those requirements while zero trust model is a good candidate. Thus in this paper, we compared the most commonly used perimeter security model and the zero trust model under the circumstance for modern IoT solutions. Furthermore, from the regulation perspective, the concepts of zero trust model are analyzed to show its compliance with regulation requirements. For easing the discussion of IoT solutions, a general IoT architecture is proposed and relevant zero trust model implementations are described. Especially, the zero trust model relevant security controls are highlighted as a guidance for the design of IoT solutions. As the conclusion, we propose a general implementation of zero trust model within the context of IoT solution to solve the challenges facing by the industry.en
dc.identifier.doi10.18420/inf2020_30
dc.identifier.isbn978-3-88579-701-2
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/34738
dc.language.isoen
dc.publisherGesellschaft für Informatik, Bonn
dc.relation.ispartofINFORMATIK 2020
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-307
dc.subjectOperational Security Model
dc.subjectZero Trust Model
dc.subjectCloud Security
dc.subjectEdge Computing
dc.subjectIEC 62443
dc.subjectIndustry 4.0
dc.subjectGDPR
dc.subjectIoT
dc.subjectIIoT
dc.titleOperational Security Analysis and Challenge for IoT Solutionsen
gi.citation.endPage331
gi.citation.startPage321
gi.conference.date28. September - 2. Oktober 2020
gi.conference.locationKarlsruhe
gi.conference.sessiontitle5th GI/ACM I4.0 Standardization Workshop on Industrial Automation and Control Systems

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
C4-4.pdf
Größe:
240.32 KB
Format:
Adobe Portable Document Format