Security Evaluation Framework for Military IoT Devices

Sungyong Cha, Seungsoo Baek, Sooyoung Kang, Seung-Joo Kim

Research output: Contribution to journalArticle

Abstract

IoT is gaining importance in our lives and in the military too. With the application of IoT paradigm in the military and the weapon system's connectivity to the network, this facilitates the commanders to make real-time decisions. However, cybersecurity threats to weapon systems intensify along with the growing of IoT's benefits. Coping with these cybersecurity threats nowadays, we require the implementation of "security by design" concept during weapon system development throughout the system lifecycle, but not traditional security solutions. Since only developed countries are capable of developing systems on their own, they adopt "security by design" when developing new weapon systems; another approach to acquire weapon systems is through import if a country cannot develop the whole weapon system. However, few studies have been done on the security evaluation framework that could be used upon purchase and integration of the developed weapon system. In this paper, we proposed a novel security evaluation framework that could be used to integrate IoT devices and components into the weapon system and a method to address cybersecurity requirements using international standard security control.

Original languageEnglish
Article number6135845
JournalSecurity and Communication Networks
Volume2018
DOIs
Publication statusPublished - 2018 Jan 1

Fingerprint

Internet of things

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Cite this

Security Evaluation Framework for Military IoT Devices. / Cha, Sungyong; Baek, Seungsoo; Kang, Sooyoung; Kim, Seung-Joo.

In: Security and Communication Networks, Vol. 2018, 6135845, 01.01.2018.

Research output: Contribution to journalArticle

Cha, Sungyong ; Baek, Seungsoo ; Kang, Sooyoung ; Kim, Seung-Joo. / Security Evaluation Framework for Military IoT Devices. In: Security and Communication Networks. 2018 ; Vol. 2018.
@article{5c913932699e42a5acd1273d4741422f,
title = "Security Evaluation Framework for Military IoT Devices",
abstract = "IoT is gaining importance in our lives and in the military too. With the application of IoT paradigm in the military and the weapon system's connectivity to the network, this facilitates the commanders to make real-time decisions. However, cybersecurity threats to weapon systems intensify along with the growing of IoT's benefits. Coping with these cybersecurity threats nowadays, we require the implementation of {"}security by design{"} concept during weapon system development throughout the system lifecycle, but not traditional security solutions. Since only developed countries are capable of developing systems on their own, they adopt {"}security by design{"} when developing new weapon systems; another approach to acquire weapon systems is through import if a country cannot develop the whole weapon system. However, few studies have been done on the security evaluation framework that could be used upon purchase and integration of the developed weapon system. In this paper, we proposed a novel security evaluation framework that could be used to integrate IoT devices and components into the weapon system and a method to address cybersecurity requirements using international standard security control.",
author = "Sungyong Cha and Seungsoo Baek and Sooyoung Kang and Seung-Joo Kim",
year = "2018",
month = "1",
day = "1",
doi = "10.1155/2018/6135845",
language = "English",
volume = "2018",
journal = "Security and Communication Networks",
issn = "1939-0122",
publisher = "John Wiley and Sons Inc.",

}

TY - JOUR

T1 - Security Evaluation Framework for Military IoT Devices

AU - Cha, Sungyong

AU - Baek, Seungsoo

AU - Kang, Sooyoung

AU - Kim, Seung-Joo

PY - 2018/1/1

Y1 - 2018/1/1

N2 - IoT is gaining importance in our lives and in the military too. With the application of IoT paradigm in the military and the weapon system's connectivity to the network, this facilitates the commanders to make real-time decisions. However, cybersecurity threats to weapon systems intensify along with the growing of IoT's benefits. Coping with these cybersecurity threats nowadays, we require the implementation of "security by design" concept during weapon system development throughout the system lifecycle, but not traditional security solutions. Since only developed countries are capable of developing systems on their own, they adopt "security by design" when developing new weapon systems; another approach to acquire weapon systems is through import if a country cannot develop the whole weapon system. However, few studies have been done on the security evaluation framework that could be used upon purchase and integration of the developed weapon system. In this paper, we proposed a novel security evaluation framework that could be used to integrate IoT devices and components into the weapon system and a method to address cybersecurity requirements using international standard security control.

AB - IoT is gaining importance in our lives and in the military too. With the application of IoT paradigm in the military and the weapon system's connectivity to the network, this facilitates the commanders to make real-time decisions. However, cybersecurity threats to weapon systems intensify along with the growing of IoT's benefits. Coping with these cybersecurity threats nowadays, we require the implementation of "security by design" concept during weapon system development throughout the system lifecycle, but not traditional security solutions. Since only developed countries are capable of developing systems on their own, they adopt "security by design" when developing new weapon systems; another approach to acquire weapon systems is through import if a country cannot develop the whole weapon system. However, few studies have been done on the security evaluation framework that could be used upon purchase and integration of the developed weapon system. In this paper, we proposed a novel security evaluation framework that could be used to integrate IoT devices and components into the weapon system and a method to address cybersecurity requirements using international standard security control.

UR - http://www.scopus.com/inward/record.url?scp=85050249644&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85050249644&partnerID=8YFLogxK

U2 - 10.1155/2018/6135845

DO - 10.1155/2018/6135845

M3 - Article

AN - SCOPUS:85050249644

VL - 2018

JO - Security and Communication Networks

JF - Security and Communication Networks

SN - 1939-0122

M1 - 6135845

ER -