The University of Southampton
University of Southampton Institutional Repository

Towards Mapping the security Challenges of the Internet of Things (IoT) supply Chain

Towards Mapping the security Challenges of the Internet of Things (IoT) supply Chain
Towards Mapping the security Challenges of the Internet of Things (IoT) supply Chain

The flow complexity in today's IoT supply chain is enormouS. To produce an item in a global network of suppliers requires a delicate dance of people, assets, Systems, information, companies, and even governmentS. The opportunities for security vulnerabilities abound. In this paper, we describe the security challenges facing an IoT supply chain. We first start by describing what an IoT endpoint is, their various types together with their concomitant security challengeS. An IoT endpoint is an output of an IoT supply chain, and the enumeration of its security challenges is then used to describe what IoT attack surfaces are, together with the threats and vulnerabilities facing a typical IoT supply chain. We use the iPhone/Apple supply chain as an exemplar, creating a map, and using that map to depict likely vulnerabilities and attackS. We conclude by discussing the mitigations against potential vulnerabilities in such a supply chain.

Cyberphysical Systems;Internet of Things, IoT, IoT security, IoT supply Chain, Supply Chain security
1877-0509
441-450
Omitola, Tope
1c60a885-5485-4676-8907-d657c22d5f58
Wills, Gary
3a594558-6921-4e82-8098-38cd8d4e8aa0
Omitola, Tope
1c60a885-5485-4676-8907-d657c22d5f58
Wills, Gary
3a594558-6921-4e82-8098-38cd8d4e8aa0

Omitola, Tope and Wills, Gary (2018) Towards Mapping the security Challenges of the Internet of Things (IoT) supply Chain. Procedia Computer Science, 126, 441-450. (doi:10.1016/j.procS.2018.07.278).

Record type: Article

Abstract

The flow complexity in today's IoT supply chain is enormouS. To produce an item in a global network of suppliers requires a delicate dance of people, assets, Systems, information, companies, and even governmentS. The opportunities for security vulnerabilities abound. In this paper, we describe the security challenges facing an IoT supply chain. We first start by describing what an IoT endpoint is, their various types together with their concomitant security challengeS. An IoT endpoint is an output of an IoT supply chain, and the enumeration of its security challenges is then used to describe what IoT attack surfaces are, together with the threats and vulnerabilities facing a typical IoT supply chain. We use the iPhone/Apple supply chain as an exemplar, creating a map, and using that map to depict likely vulnerabilities and attackS. We conclude by discussing the mitigations against potential vulnerabilities in such a supply chain.

Text 1-s2.0-S1877050918312547-main - Version of Record
Download (542kB)

More information

e-pub ahead of print date: 28 August 2018
Published date: 2018
Keywords: Cyberphysical Systems;Internet of Things, IoT, IoT security, IoT supply Chain, Supply Chain security

Identifiers

Local EPrints ID: 426622
URI: https://eprints.soton.ac.uk/id/eprint/426622
ISSN: 1877-0509
PURE UUID: 74222034-be81-4302-b254-27a5cd57eba5
ORCID for Gary Wills: ORCID iD orcid.org/0000-0001-5771-4088

Catalogue record

Date deposited: 06 Dec 2018 17:30
Last modified: 08 Dec 2018 01:36

Export record

Altmetrics

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of https://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×