Trust and Security of Embedded Smart Devices in Advanced Logistics Systems

被引:0
|
作者
VanYe, Christopher M. [1 ]
Li, Beatrice E. [1 ]
Koch, Andrew T. [1 ]
Luu, Mai N. [1 ]
Adekunle, Rahman O. [1 ]
Moghadasi, Negin [1 ]
Collier, Zachary A. [2 ]
Polmateer, Thomas L. [3 ]
Barnes, David [4 ]
Slutzky, David [5 ]
Manasco, Mark C. [6 ]
Lambert, James H. [1 ]
机构
[1] Univ Virginia, Engn Syst & Environm, Charlottesville, VA 22903 USA
[2] Radford Univ, Dept Management, Radford, VA USA
[3] Univ Virginia, CCALS, Engn Syst & Environm, Charlottesville, VA USA
[4] Syst Planning & Anal Inc, Strateg Operat & Surety Div, Alexandria, VA USA
[5] Univ Virginia, Fermata LLC, Charlottesville, VA USA
[6] Commonwealth Ctr Adv Logist Syst, Richmond, VA USA
基金
美国国家科学基金会;
关键词
Hypersonics; Bidirectional Charging; Trust and Security; Electric Vehicle Charging; Enterprise Resilience; Risk Register; Systems Integration;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses security and risk management of hardware and embedded systems across several applications. There are three companies involved in the research. First is an energy technology company that aims to leverage electric-vehicle batteries through vehicle to grid (V2G) services in order to provide energy storage for electric grids. Second is a defense contracting company that provides acquisition support for the DOD's conventional prompt global strike program (CPGS). These systems need protections in their production and supply chains, as well as throughout their system life cycles. Third is a company that deals with trust and security in advanced logistics systems generally. The rise of interconnected devices has led to growth in systems security issues such as privacy, authentication, and secure storage of data. A risk analysis via scenario-based preferences is aided by a literature review and industry experts. The analysis is divided into various sections of Criteria, Initiatives, C-I Assessment, Emergent Conditions (EC), Criteria-Scenario (C-S) relevance and EC Grouping. System success criteria, research initiatives, and risks to the system are compiled. In the C-I Assessment, a rating is assigned to signify the degree to which criteria are addressed by initiatives, including research and development, government programs, industry resources, security countermeasures, education and training, etc. To understand risks of emergent conditions, a list of Potential Scenarios is developed across innovations, environments, missions, populations and workforce behaviors, obsolescence, adversaries, etc. The C-S Relevance rates how the scenarios affect the relevance of the success criteria, including cost, schedule, security, return on investment, and cascading effects. The Emergent Condition Grouping (ECG) collates the emergent conditions with the scenarios. The generated results focus on ranking Initiatives based on their ability to negate the effects of Emergent Conditions, as well as producing a disruption score to compare a Potential Scenario's impacts to the ranking of Initiatives. The results presented in this paper are applicable to the testing and evaluation of security and risk for a variety of embedded smart devices and should be of interest to developers, owners, and operators of critical infrastructure systems.
引用
收藏
页码:204 / 209
页数:6
相关论文
共 50 条
  • [1] Tiered Trust for Useful Embedded Systems Security
    Ayers, Hudson
    Dutta, Prabal
    Levis, Philip
    Levy, Amit
    Pannuto, Pat
    Van Why, Johnathan
    Watson, Jean-Luc
    [J]. PROCEEDINGS OF THE 15TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 22), 2022, : 15 - 21
  • [2] Formal Security Analysis of Smart Embedded Systems
    Tabrizi, Farid Molazem
    Pattabiraman, Karthik
    [J]. 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 1 - 15
  • [3] Validation and Debug of Security and Trust Issues in Embedded Systems
    Mishra, Prabhat
    Bhunia, Swarup
    Ravi, Srivaths
    [J]. 2015 28TH INTERNATIONAL CONFERENCE ON VLSI DESIGN (VLSID), 2015, : 3 - 5
  • [4] Smart packaging for security and logistics
    Simske, Steven J.
    [J]. HP Laboratories Technical Report, 2011, (182):
  • [5] Smart Packaging for Security and Logistics
    Simske, Steven J.
    [J]. DIGITAL FABRICATION 2011/ NIP27- 27TH INTERNATIONAL CONFERENCE ON DIGITAL PRINTING TECHNOLOGIES: TECHNICAL PROGRAMS AND PROCEEDINGS, 2011, 2011, : 801 - 804
  • [6] Hardware Root Of Trust for IoT Security In Smart Home Systems
    Mansour, Samah
    Lauf, Adrian
    [J]. 2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [7] Guest Editorial Special Section on Security, Privacy and Trust for Consumer Smart Devices
    Meng, Weizhi
    Lu, Rongxing
    Zhang, Jun
    Samarati, Pierangela
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 3960 - 3962
  • [8] Enhancing the Security for Smart Card-Based Embedded Systems
    Kalyana Abenanth, G.
    Harish, K.
    Sachin, V.
    Rushyendra, A.
    Mohankumar, N.
    [J]. Lecture Notes on Data Engineering and Communications Technologies, 2022, 75 : 673 - 686
  • [9] Guest editors' introdution: Security and trust in embedded-systems design
    Schaumont, Patrick
    Raghunathan, Anand
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 518 - 520
  • [10] Smart Sensing Devices for Logistics Application
    Masoudinejad, Mojtaba
    Venkatapathy, Aswin Karthik Ramachandran
    Emmerich, Jan
    Riesner, Andreas
    [J]. SENSOR SYSTEMS AND SOFTWARE, 2017, 205 : 41 - 52