The Future Internet of Things and Security of its Control Systems

نویسندگان

  • Misty K. Blowers
  • Jose Iribarne
  • Edward Colbert
  • Alexander Kott
چکیده

Introduction We consider the future of ICS cyber security. As best as we can see, much of this future unfolds in the context of the Internet of Things. In fact, we envision that all industrial and infrastructure environments, and cyber-physical systems in general, will take the form reminiscent of what today is referred to as the Internet of Things. Internet of Things is envisioned as multitude of heterogeneous devices densely interconnected and communicating with the objective of accomplishing a diverse range of objectives, often collaboratively. One can argue that in the relatively near future, the IoT construct will subsume industrial plants, infrastructures, housing and other systems that today are controlled by ICS and SCADA systems. The advent of IoT will be accompanied by a number of developments: miniaturization of devices and sensors, increasing mobility of devices, wearable devices, ubiquitous robotics and growing automation of all functions of IoT. Many of these devices will be smart sensor that contains a microprocessor that conditions the signals before transmission to the control network. Some of the devices are likely to be nano-robots with overall size of the order of a few micrometers or less in all spatial directions and constituted by nanoscopic components. IoT will be associated with great increase in automation. In addition to supporting highly autonomous devices, IoT itself will be self-organizing, self-configuring, and self-healing. The increase in automation may cause an increase in system vulnerability. With automation comes the necessity of reducing the need for manual intervention. Automated security monitoring will be essential as control systems grow large enough to exceed the capacity for humans to identify and process security logs and other security information. Other game-changing development may include radically new computing and networking paradigms. Emerging computing paradigms—nanocomputing, quantum computing, biologically or genome-based computing—might develop soon enough to make most current cybersecurity technologies obsolete, thus drastically changing the market. Quantum computing and networking are already fueling lively debate. Biologically inspired computation and communication paradigms will attract growing interest, especially as they offer promises for autonomous adaptation to previously unknown threats and even self-healing. In the IoT environments, cybersecurity will derive largely from system agility, moving-target defenses, cyber-maneuvering, and other autonomous or semi-autonomous behaviors. Cyber security of IoT may also benefit from new design methods for mixed-trusted systems; and from big data analytics— predictive and autonomous.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

Computer security in the future

Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...

متن کامل

Home appliances energy management based on the IoT system

The idea of the Internet of Things (IoT) has turned out to be increasingly prominent in the cuttingedge period of innovation than at any other time. From little family unit gadgets to extensive modernmachines, the vision of IoT has made it conceivable to interface the gadgets with the physical worldaround them. This expanding prominence has likewise made the IoT gadgets and ap...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

A Novel Trust Management Model in the Social Internet of Things

The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1610.01953  شماره 

صفحات  -

تاریخ انتشار 2016