Skip to main content

Cyber Security Considerations for Designing IoT-Based Control Systems

  • Conference paper
Information Security Applications (WISA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9503))

Included in the following conference series:

  • 1401 Accesses

Abstract

It is critical to include cyber security measures at the designing stage of the real-life control systems in order to avail the application of the IoT-related devices, such as intelligent terminals or smart sensors, etc. to the system. This is due to the difference between the attributes of the IoT security measures and those of the Internet-related IT security. It requires a differentiated approach with new security concepts and operation methods. This paper outlines the security issues specific to of the hyper-connected society, where things are being applied to control systems, and suggest technical and organizational measures to be considered for designing of secure control system based on IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  2. Xu, T., Wendt, J.B., Potkonjak, M.: Security of IoT systems: Design challenges and opportunities. In: 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2–6 November 2014

    Google Scholar 

  3. Zhang, Y., Zou, W., Chen, X., Yang, C.: The security for power internet of things: Framework, policies, and countermeasures. In: 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 13–15 October 2014

    Google Scholar 

  4. HP: Internet of Things Research Study. 2014 Report, July 29, 2014

    Google Scholar 

  5. United States District Court. Case 5:15-mj-00154-ATB Document 1, April, 15 2015

    Google Scholar 

  6. Kim, I.J., Chung, Y.-J., Lee, Y., Won, D.H.: A time-variant risk analysis and damage estimation for large-scale network systems. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 92–101. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kwangho Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Kim, K. (2016). Cyber Security Considerations for Designing IoT-Based Control Systems. In: Kim, Hw., Choi, D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science(), vol 9503. Springer, Cham. https://doi.org/10.1007/978-3-319-31875-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31875-2_24

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31874-5

  • Online ISBN: 978-3-319-31875-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics