Abstract
It is critical to include cyber security measures at the designing stage of the real-life control systems in order to avail the application of the IoT-related devices, such as intelligent terminals or smart sensors, etc. to the system. This is due to the difference between the attributes of the IoT security measures and those of the Internet-related IT security. It requires a differentiated approach with new security concepts and operation methods. This paper outlines the security issues specific to of the hyper-connected society, where things are being applied to control systems, and suggest technical and organizational measures to be considered for designing of secure control system based on IoT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Comput. Netw. 54(15), 2787–2805 (2010)
Xu, T., Wendt, J.B., Potkonjak, M.: Security of IoT systems: Design challenges and opportunities. In: 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2–6 November 2014
Zhang, Y., Zou, W., Chen, X., Yang, C.: The security for power internet of things: Framework, policies, and countermeasures. In: 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 13–15 October 2014
HP: Internet of Things Research Study. 2014 Report, July 29, 2014
United States District Court. Case 5:15-mj-00154-ATB Document 1, April, 15 2015
Kim, I.J., Chung, Y.-J., Lee, Y., Won, D.H.: A time-variant risk analysis and damage estimation for large-scale network systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 92–101. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Kim, K. (2016). Cyber Security Considerations for Designing IoT-Based Control Systems. In: Kim, Hw., Choi, D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science(), vol 9503. Springer, Cham. https://doi.org/10.1007/978-3-319-31875-2_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-31875-2_24
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31874-5
Online ISBN: 978-3-319-31875-2
eBook Packages: Computer ScienceComputer Science (R0)