Towards Mapping the security Challenges of the Internet of Things (IoT) supply Chain
Towards Mapping the security Challenges of the Internet of Things (IoT) supply Chain
The flow complexity in today's IoT supply chain is enormouS. To produce an item in a global network of suppliers requires a delicate dance of people, assets, Systems, information, companies, and even governmentS. The opportunities for security vulnerabilities abound. In this paper, we describe the security challenges facing an IoT supply chain. We first start by describing what an IoT endpoint is, their various types together with their concomitant security challengeS. An IoT endpoint is an output of an IoT supply chain, and the enumeration of its security challenges is then used to describe what IoT attack surfaces are, together with the threats and vulnerabilities facing a typical IoT supply chain. We use the iPhone/Apple supply chain as an exemplar, creating a map, and using that map to depict likely vulnerabilities and attackS. We conclude by discussing the mitigations against potential vulnerabilities in such a supply chain.
Cyberphysical Systems;Internet of Things, IoT, IoT security, IoT supply Chain, Supply Chain security
441-450
Omitola, Tope
1c60a885-5485-4676-8907-d657c22d5f58
Wills, Gary
3a594558-6921-4e82-8098-38cd8d4e8aa0
2018
Omitola, Tope
1c60a885-5485-4676-8907-d657c22d5f58
Wills, Gary
3a594558-6921-4e82-8098-38cd8d4e8aa0
Omitola, Tope and Wills, Gary
(2018)
Towards Mapping the security Challenges of the Internet of Things (IoT) supply Chain.
Procedia Computer Science, 126, .
(doi:10.1016/j.procS.2018.07.278).
Abstract
The flow complexity in today's IoT supply chain is enormouS. To produce an item in a global network of suppliers requires a delicate dance of people, assets, Systems, information, companies, and even governmentS. The opportunities for security vulnerabilities abound. In this paper, we describe the security challenges facing an IoT supply chain. We first start by describing what an IoT endpoint is, their various types together with their concomitant security challengeS. An IoT endpoint is an output of an IoT supply chain, and the enumeration of its security challenges is then used to describe what IoT attack surfaces are, together with the threats and vulnerabilities facing a typical IoT supply chain. We use the iPhone/Apple supply chain as an exemplar, creating a map, and using that map to depict likely vulnerabilities and attackS. We conclude by discussing the mitigations against potential vulnerabilities in such a supply chain.
Text
1-s2.0-S1877050918312547-main
- Version of Record
More information
Accepted/In Press date: 1 January 2018
e-pub ahead of print date: 28 August 2018
Published date: 2018
Keywords:
Cyberphysical Systems;Internet of Things, IoT, IoT security, IoT supply Chain, Supply Chain security
Identifiers
Local EPrints ID: 426622
URI: http://eprints.soton.ac.uk/id/eprint/426622
ISSN: 1877-0509
PURE UUID: 74222034-be81-4302-b254-27a5cd57eba5
Catalogue record
Date deposited: 06 Dec 2018 17:30
Last modified: 06 Jun 2024 01:35
Export record
Altmetrics
Contributors
Author:
Gary Wills
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics