TY - JOUR
T1 - Security Evaluation Framework for Military IoT Devices
AU - Cha, Sungyong
AU - Baek, Seungsoo
AU - Kang, Sooyoung
AU - Kim, Seungjoo
N1 - Funding Information:
This research was supported by the MSIT (Ministry of Science, ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2018-2015-0-00403) supervised by the IITP (Institute for Information & Communications Technology Promotion).
Publisher Copyright:
© 2018 Sungyong Cha et al.
PY - 2018
Y1 - 2018
N2 - IoT is gaining importance in our lives and in the military too. With the application of IoT paradigm in the military and the weapon system's connectivity to the network, this facilitates the commanders to make real-time decisions. However, cybersecurity threats to weapon systems intensify along with the growing of IoT's benefits. Coping with these cybersecurity threats nowadays, we require the implementation of "security by design" concept during weapon system development throughout the system lifecycle, but not traditional security solutions. Since only developed countries are capable of developing systems on their own, they adopt "security by design" when developing new weapon systems; another approach to acquire weapon systems is through import if a country cannot develop the whole weapon system. However, few studies have been done on the security evaluation framework that could be used upon purchase and integration of the developed weapon system. In this paper, we proposed a novel security evaluation framework that could be used to integrate IoT devices and components into the weapon system and a method to address cybersecurity requirements using international standard security control.
AB - IoT is gaining importance in our lives and in the military too. With the application of IoT paradigm in the military and the weapon system's connectivity to the network, this facilitates the commanders to make real-time decisions. However, cybersecurity threats to weapon systems intensify along with the growing of IoT's benefits. Coping with these cybersecurity threats nowadays, we require the implementation of "security by design" concept during weapon system development throughout the system lifecycle, but not traditional security solutions. Since only developed countries are capable of developing systems on their own, they adopt "security by design" when developing new weapon systems; another approach to acquire weapon systems is through import if a country cannot develop the whole weapon system. However, few studies have been done on the security evaluation framework that could be used upon purchase and integration of the developed weapon system. In this paper, we proposed a novel security evaluation framework that could be used to integrate IoT devices and components into the weapon system and a method to address cybersecurity requirements using international standard security control.
UR - http://www.scopus.com/inward/record.url?scp=85050249644&partnerID=8YFLogxK
U2 - 10.1155/2018/6135845
DO - 10.1155/2018/6135845
M3 - Article
AN - SCOPUS:85050249644
SN - 1939-0122
VL - 2018
JO - Security and Communication Networks
JF - Security and Communication Networks
M1 - 6135845
ER -