8
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Avoiding the Internet of Insecure Industrial Things

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives. Legal changes are being ushered by the European Union (EU) Network and Information Security (NIS) Directive 2016 and the General Data Protection Regulation 2016 (GDPR) (both to be enforced from May 2018). We use the case study of the emergent smart energy supply chain to frame, scope out and consolidate the breadth of security concerns at play, and the regulatory responses. We argue the industrial IoT brings four security concerns to the fore, namely: appreciating the shift from offline to online infrastructure; managing temporal dimensions of security; addressing the implementation gap for best practice; and engaging with infrastructural complexity. Our goal is to surface risks and foster dialogue to avoid the emergence of an Internet of Insecure Industrial Things

          Related collections

          Most cited references1

          • Record: found
          • Abstract: not found
          • Article: not found

          Commission decision 2002/657/EC implementing Council directive 96/23/EC concerning the performance of analytical methods and the interpretation of results

            Bookmark

            Author and article information

            Journal
            22 January 2018
            Article
            10.1016/j.clsr.2017.12.004
            1801.07207
            ddbad98c-cb66-4f74-940c-f517a8648624

            http://arxiv.org/licenses/nonexclusive-distrib/1.0/

            History
            Custom metadata
            Computer Law and Security Review, 2018
            cs.HC cs.CY cs.DC

            Comments

            Comment on this article