Abstract
AbstractIn the Internet of Things (IoT), interconnected smart things enable new products and services in cyber-physical systems. Yet, smart things not only inherit information technology (IT) security risks from their digital components, but they may also aggravate them through the use of technology platforms (TPs). In the context of the IoT, TPs describe a tangible (e.g., hardware) or intangible (e.g., software and standards) general-purpose technology that is shared between different models of smart things. While TPs are evolving rapidly owing to their functional and economic benefits, this is partly to the detriment of security, as several recent IoT security incidents demonstrate. We address this problem by formalizing the situation’s dynamics with an established risk quantification approach from platforms in the automotive industry, namely a Bernoulli mixture model. We outline and discuss the implications of relevant parameters for security risks of TP use in the IoT, i.e., correlation and heterogeneity, vulnerability probability and conformity costs, exploit probability and non-conformity costs, as well as TP connectivity. We argue that these parameters should be considered in IoT governance decisions and delineate prescriptive governance implications, identifying potential counter-measures at the individual, organizational, and regulatory levels.
Funder
Fonds National de la Recherche Luxembourg
Publisher
Springer Science and Business Media LLC
Reference118 articles.
1. Aftergood, S. (2018). Governments want your smart devices to have stupid security flaws. Nature, 560(7720), 550–551. https://doi.org/10.1038/d41586-018-06033-9
2. Almeida, V. A., Doneda, D., & Monteiro, M. (2015). Governance Challenges for the Internet of Things. IEEE Internet Computing, 19(4), 56–59. https://doi.org/10.1109/MIC.2015.86
3. Alter, S. (2019). Making sense of smartness in the context of smart devices and smart systems. Information Systems Frontiers, 9(4), 381–393. https://doi.org/10.1007/s10796-019-09919-9
4. Arentz, S. (2005). Hacking Linux-powered devices. Retrieved March 25, 2024, from http://bofh.nikhef.nl/events/CCC/congress/21c3/papers/136%20Hacking%20Linux-Powered%20Devices.pdf
5. Arnold, L., Jöhnk, J., Vogt, F., & Urbach, N. (2022). IIoT platforms’ architectural features - a taxonomy and five prevalent archetypes. Electronic Markets, 32(2), 927–944. https://doi.org/10.1007/s12525-021-00520-0