Skip to main content
Top
Published in:
Cover of the book

2022 | OriginalPaper | Chapter

1. IoT and Supply Chain Security

Authors : Tim Kieras, Junaid Farooq, Quanyan Zhu

Published in: IoT Supply Chain Security Risk Analysis and Mitigation

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet of things (IoT) applications rely on a variety of technological components that are manufactured and operated by different entities around the globe. Supply chain is emerging as the next frontier of threats in the rapidly evolving IoT ecosystem. It is fundamentally more complex compared to traditional information and communications technology (ICT) systems. This chapter highlights potential sources of supply chain risks in IoT systems and their unique aspects along with providing an overview of the fundamental challenges in supply chain risk assessment and mitigation.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference C. Kolias, G. Kambourakis, A. Stavrou, J. Voas, DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)CrossRef C. Kolias, G. Kambourakis, A. Stavrou, J. Voas, DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)CrossRef
5.
go back to reference R. Langner, Stuxnet: Dissecting a cyberwarfare weapon. IEEE Secur. Privacy 9(3), 49–51 (2011)CrossRef R. Langner, Stuxnet: Dissecting a cyberwarfare weapon. IEEE Secur. Privacy 9(3), 49–51 (2011)CrossRef
6.
go back to reference J. Cashin, B. Lawson, Managing cyber supply chain risk - best practices for small entities, American Public Power Association, Washington, DC, Tech. Rep. (2018) J. Cashin, B. Lawson, Managing cyber supply chain risk - best practices for small entities, American Public Power Association, Washington, DC, Tech. Rep. (2018)
9.
go back to reference G. Gereffi, What does the covid-19 pandemic teach us about global value chains? the case of medical supplies. J. Int. Business Policy 3(3), 287–301 (2020)CrossRef G. Gereffi, What does the covid-19 pandemic teach us about global value chains? the case of medical supplies. J. Int. Business Policy 3(3), 287–301 (2020)CrossRef
10.
go back to reference B.K. Mohanta, D. Jena, S.S. Panda, S. Sobhanayak, Blockchain technology: A survey on applications and security privacy challenges. Internet Things 8, 100107 (2019)CrossRef B.K. Mohanta, D. Jena, S.S. Panda, S. Sobhanayak, Blockchain technology: A survey on applications and security privacy challenges. Internet Things 8, 100107 (2019)CrossRef
11.
go back to reference S.A. Abeyratne, R.P. Monfared, Blockchain ready manufacturing supply chain using distributed ledger. Int. J. Res. Eng. Technol. 5(9), 1–10 (2016)CrossRef S.A. Abeyratne, R.P. Monfared, Blockchain ready manufacturing supply chain using distributed ledger. Int. J. Res. Eng. Technol. 5(9), 1–10 (2016)CrossRef
12.
go back to reference K. Korpela, J. Hallikas, T. Dahlberg, Digital supply chain transformation toward blockchain integration, in Proceedings of the 50th Hawaii International Conference on System Sciences (2017) K. Korpela, J. Hallikas, T. Dahlberg, Digital supply chain transformation toward blockchain integration, in Proceedings of the 50th Hawaii International Conference on System Sciences (2017)
13.
go back to reference D.J. Trump, Presidential executive order on assessing and strengthening the manufacturing and defense industrial base and supply chain resiliency of the united states (2017) D.J. Trump, Presidential executive order on assessing and strengthening the manufacturing and defense industrial base and supply chain resiliency of the united states (2017)
14.
go back to reference J. Villasenor, Compromised by Design?: Securing the Defense Electronics Supply Chain (Center for Technology Innovation at Brookings, 2013) J. Villasenor, Compromised by Design?: Securing the Defense Electronics Supply Chain (Center for Technology Innovation at Brookings, 2013)
15.
16.
go back to reference N. Manworren, J. Letwat, O. Daily, Why you should care about the target data breach. Business Horizons 59(3), 257–266 (2016)CrossRef N. Manworren, J. Letwat, O. Daily, Why you should care about the target data breach. Business Horizons 59(3), 257–266 (2016)CrossRef
18.
go back to reference J. Boyens, C. Paulsen, R. Moorthy, N. Bartol, Supply chain risk management practices for federal information systems and organizations. National Institute of Standards and Technology, Gaithersburg, MD, Tech. Rep. (2015) J. Boyens, C. Paulsen, R. Moorthy, N. Bartol, Supply chain risk management practices for federal information systems and organizations. National Institute of Standards and Technology, Gaithersburg, MD, Tech. Rep. (2015)
19.
go back to reference M.J. Farooq, Q. Zhu, Modeling, analysis, and mitigation of dynamic botnet formation in wireless IoT networks. IEEE Trans. Inf. Forens. Secur. 14(9), 2412–2426 (2019)CrossRef M.J. Farooq, Q. Zhu, Modeling, analysis, and mitigation of dynamic botnet formation in wireless IoT networks. IEEE Trans. Inf. Forens. Secur. 14(9), 2412–2426 (2019)CrossRef
20.
go back to reference Q. Zhu, Z. Xu, Cross-layer Design for Secure and Resilient Cyber-physical Systems (Springer, 2020) Q. Zhu, Z. Xu, Cross-layer Design for Secure and Resilient Cyber-physical Systems (Springer, 2020)
21.
go back to reference Q. Zhu, S. Rass, B. Dieber, V.M. Vilches et al., Cybersecurity in robotics: Challenges, quantitative modeling, and practice. Found. Trends® Robot. 9(1), 1–129 (2021) Q. Zhu, S. Rass, B. Dieber, V.M. Vilches et al., Cybersecurity in robotics: Challenges, quantitative modeling, and practice. Found. Trends® Robot. 9(1), 1–129 (2021)
22.
go back to reference Q. Zhu, Control challenges, in Resilient Control Architectures and Power Systems (2021) Q. Zhu, Control challenges, in Resilient Control Architectures and Power Systems (2021)
23.
go back to reference M.J. Farooq, Q. Zhu, On the secure and reconfigurable multi-layer network design for critical information dissemination in the Internet of battlefield things (IoBT). IEEE Trans. Wirel. Commun. 17(4), 2618–2632 (2018)CrossRef M.J. Farooq, Q. Zhu, On the secure and reconfigurable multi-layer network design for critical information dissemination in the Internet of battlefield things (IoBT). IEEE Trans. Wirel. Commun. 17(4), 2618–2632 (2018)CrossRef
24.
go back to reference Q. Zhu, S. Rass, On multi-phase and multi-stage game-theoretic modeling of advanced persistent threats. IEEE Access 6, 13958–13971 (2018)CrossRef Q. Zhu, S. Rass, On multi-phase and multi-stage game-theoretic modeling of advanced persistent threats. IEEE Access 6, 13958–13971 (2018)CrossRef
25.
go back to reference S. Rass, A. Alshawish, M.A. Abid, S. Schauer, Q. Zhu, H. De Meer, Physical intrusion games–optimizing surveillance by simulation and game theory. IEEE Access 5, 8394–8407 (2017)CrossRef S. Rass, A. Alshawish, M.A. Abid, S. Schauer, Q. Zhu, H. De Meer, Physical intrusion games–optimizing surveillance by simulation and game theory. IEEE Access 5, 8394–8407 (2017)CrossRef
26.
go back to reference C. Folk, D.C. Hurley, W.K. Kaplow, J.F.X. Payne, The security implications of the Internet of things, AFCEA International Cyber Committee, Gaithersburg, MD, Tech. Rep. (2015) C. Folk, D.C. Hurley, W.K. Kaplow, J.F.X. Payne, The security implications of the Internet of things, AFCEA International Cyber Committee, Gaithersburg, MD, Tech. Rep. (2015)
28.
go back to reference K. Boeckl, M. Fagan, W. Fisher, N. Lefkovitz, K.N. Megas, E. Nadeau, B. Piccarreta, D.G. O’Rourke, K. Scarfone, Considerations for managing Internet of things (IoT) cybersecurity and privacy risks, National Institute of Standards and Technology, Gaithersburg, MD, Tech. Rep. (2019) K. Boeckl, M. Fagan, W. Fisher, N. Lefkovitz, K.N. Megas, E. Nadeau, B. Piccarreta, D.G. O’Rourke, K. Scarfone, Considerations for managing Internet of things (IoT) cybersecurity and privacy risks, National Institute of Standards and Technology, Gaithersburg, MD, Tech. Rep. (2019)
29.
go back to reference R.E. Hiromoto, M. Haney, A. Vakanski, A secure architecture for IoT with supply chain risk management, in 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 1 (2017), pp. 431–435 R.E. Hiromoto, M. Haney, A. Vakanski, A secure architecture for IoT with supply chain risk management, in 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 1 (2017), pp. 431–435
31.
go back to reference N. Bartol, Cyber supply chain risk management for utilities - roadmap for implementation, Utilities Telecom Council, Washington, DC, Tech. Rep. (2015) N. Bartol, Cyber supply chain risk management for utilities - roadmap for implementation, Utilities Telecom Council, Washington, DC, Tech. Rep. (2015)
Metadata
Title
IoT and Supply Chain Security
Authors
Tim Kieras
Junaid Farooq
Quanyan Zhu
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-031-08480-5_1

Premium Partner