scholarly journals Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture

Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6057
Author(s):  
Xavi Masip-Bruin ◽  
Eva Marín-Tordera ◽  
José Ruiz ◽  
Admela Jukan ◽  
Panagiotis Trakadas ◽  
...  

The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT infrastructures. As such, the solution proposed in this paper is envisioned to deal with the whole supply chain system components, from the IoT ecosystem to the infrastructure connecting them, addressing security and privacy functionalities related to risks and vulnerabilities management, accountability, and mitigation strategies, as well as security metrics and evidence-based security assurance. In this paper, we present FISHY as a preliminary architecture that is designed to orchestrate existing and beyond state-of-the-art security appliances in composed ICT scenarios. To this end, the FISHY architecture leverages the capabilities of programmable networks and IT infrastructure through seamless orchestration and instantiation of novel security services, both in real-time and proactively. The paper also includes a thorough business analysis to go far beyond the technical benefits of a potential FISHY adoption, as well as three real-world use cases highlighting the envisioned benefits of a potential FISHY adoption.

Author(s):  
Xavi Masip-Bruin ◽  
Eva Marín-Tordera ◽  
José Ruiz ◽  
Admela Jukan ◽  
Panagiotis Trakadas ◽  
...  

The specific demands inherent to supply chains built upon large IoT systems, make a must the design of a coordinated framework for cyber resilience provisioning intended to guaranteeing trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure and heterogeneous ICT infrastructures. As such, the proposed solution is envisioned to deal with the whole supply chain system components, from the IoT ecosystem to the infrastructure connecting them, addressing security and privacy functionalities related to risks and vulnerabilities management, accountability and mitigation strategies as well as security metrics and evidence-based security assurance. In this paper we present FISHY, as a preliminary designed architecture, designed to orchestrate both existing and beyond state-of-the-art security appliances in composed ICT scenarios and also leveraging capabilities of programmable network and IT infrastructure through seamless orchestration and instantiation of novel security services, both in real-time and proactively. The paper also includes a thorough business analysis to go far beyond the technical benefits of a potential FISHY adoption as well as three real-world use cases where to strongly support the envisioned benefits of a FISHY adoption.


2021 ◽  
Vol 13 (8) ◽  
pp. 4206
Author(s):  
Jamilya Nurgazina ◽  
Udsanee Pakdeetrakulwong ◽  
Thomas Moser ◽  
Gerald Reiner

The lack of transparency and traceability in food supply chains (FSCs) is raising concerns among consumers and stakeholders about food information credibility, food quality, and safety. Insufficient records, a lack of digitalization and standardization of processes, and information exchange are some of the most critical challenges, which can be tackled with disruptive technologies, such as the Internet of Things (IoT), blockchain, and distributed ledger technologies (DLTs). Studies provide evidence that novel technological and sustainable practices in FSCs are necessary. This paper aims to describe current practical applications of DLTs and IoT in FSCs, investigating the challenges of implementation, and potentials for future research directions, thus contributing to achievement of the United Nations’ Sustainable Development Goals (SDGs). Within a systematic literature review, the content of 69 academic publications was analyzed, describing aspects of implementation and measures to address the challenges of scalability, security, and privacy of DLT, and IoT solutions. The challenges of high costs, standardization, regulation, interoperability, and energy consumption of DLT solutions were also classified as highly relevant, but were not widely addressed in literature. The application of DLTs in FSCs can potentially contribute to 6 strategic SDGs, providing synergies and possibilities for more sustainable, traceable, and transparent FSCs.


Author(s):  
Tao Luo ◽  
LiangMin Wang ◽  
ShangNan Yin ◽  
Hao Shentu ◽  
Hui Zhao

AbstractEdge computing has developed rapidly in recent years due to its advantages of low bandwidth overhead and low delay, but it also brings challenges in data security and privacy. Website fingerprinting (WF) is a passive traffic analysis attack that threatens website privacy which poses a great threat to user’s privacy and web security. It collects network packets generated while a user accesses website, and then uses a series of techniques to discover patterns of network packets to infer the type of website user accesses. Many anonymous networks such as Tor can meet the need of hide identity from users in network activities, but they are also threatened by WF attacks. In this paper, we propose a website fingerprinting obfuscation method against intelligent fingerprinting attacks, called Random Bidirectional Padding (RBP). It is a novel website fingerprinting defense technology based on time sampling and random bidirectional packets padding, which can covert the real packets distribution to destroy the Inter-Arrival Time (IAT) features in the traffic sequence and increase the difference between the datasets with random bidirectional virtual packets padding. We evaluate the defense against state-of-the-art website fingerprinting attacks in real scenarios, and show its effectiveness.


2021 ◽  
Author(s):  
Mounir Bensalem

The evolution towards Industry 4.0 is driving the need for innovative solutions in the area of network management, considering the complex, dynamic and heterogeneous nature of ICT supply chains. To this end, Intent-Based networking (IBN) which is already proven to evolve how network management is driven today, can be implemented as a solution to facilitate the management of large ICT supply chains. In this paper, we first present a comparison of the main architectural components of typical IBN systems and, then, we study the key engineering requirements when integrating IBN with ICT supply chain network systems while considering AI methods. We also propose a general architecture design that enables intent translation of ICT supply chain specifications into lower level policies, to finally show an example of how the access control is performed in a modeled ICT supply chain system.


Author(s):  
Mohammadali Vosooghidizaji ◽  
◽  
Atour Taghipour ◽  
Béatrice Canel-Depitre

Supply chains consist of several actors from supplier, manufacturer, distributer, wholesaler and retailers connected to each other by financial, material and informational flows. Optimal performance of supply chains requires set of actions that coordinate the members’ decisions [1], [2]. In many cases, members are trying to optimize their own objectives which can lead to asymmetric information by keeping some strategic information private. Although, this information asymmetry is a challenge affecting the coordination of supply chain, but it is achievable if proper set of coordinating mechanism executed. This paper presents a comprehensive literature review of supply chain coordination under asymmetric information and tries to analyze the trend in the context and address the evolution and gaps in existing literature.


Complexity ◽  
2017 ◽  
Vol 2017 ◽  
pp. 1-12 ◽  
Author(s):  
Junhai Ma ◽  
Wandong Lou

This paper studies the complex characteristics caused by the price competition in multichannel household appliance supply chains. We consider a two-level household appliance supply chain system consisting of a manufacturer with an Internet channel and a retailer with a traditional channel and an Internet channel. Each channel’s price-setting follows the bounded rational decision process in order to obtain the optimal profit or more market share. Considering that the price competition often leads to the demand and order fluctuation, we also investigate the bullwhip effect of the multichannel supply chains on the basis of the order-up-to-inventory policy. From the numerical simulation, we find a system in a chaotic state will suffer larger bullwhip effect than a stable system, and the manufacturer’s Internet channel is helpful to mitigate the bullwhip effect. Our results provide some useful managerial inspirations for the household manufacturer and retailers. Firstly, each channel should make their retail price with a suitable price adjustment speed in the stable region, and each time pricing cannot exceed the domain of attraction. Secondly, the manufacturer can adopt a more radical pricing strategy in their Internet channel to mitigate the bullwhip effect. Thirdly, the price adjustment should be reviewed and be appropriately reduced if the price adjustment is too large.


Author(s):  
Yessenia Berenice Llive ◽  
Norbert Varga ◽  
László Bokor

In the near future with the innovative services and solutions being currently tested and deployed for cars, homes, offices, transport systems, smart cities, etc., the user connectivity will considerably change. It means that smart devices will be connected to the internet and produce a big impact on the internet traffic, increasing the service demand generated by devices and sensors. However most of these devices are vulnerable to attacks. Hence, the security and privacy become a crucial feature to be included in towards its appropriate deployment. Interconnected, cooperative, service-oriented devices and their related hardware/software solutions will contain sensitive data making such systems susceptible to attacks and leakage of information. Therefore, robust secure communication infrastructures must be established to aid suitable deployment. This chapter is a state-of-the-art assessment of US and EU C-ITS security solutions.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 76541-76567 ◽  
Author(s):  
Muktar Yahuza ◽  
Mohd Yamani Idna Bin Idris ◽  
Ainuddin Wahid Bin Abdul Wahab ◽  
Anthony T. S. Ho ◽  
Suleman Khan ◽  
...  

2016 ◽  
Vol 3 (4) ◽  
pp. 1-20 ◽  
Author(s):  
Geetika Sarna ◽  
M.P.S. Bhatia

Users on the social media can share positive as well as negative information intentionally and unintentionally in the form of multimedia content without knowing its impact on other user, which threatens the security and privacy of social media. Cyberbullying is one of the risks associated with social media. Cyberbullying is an aggressive act carried out intentionally against the victim by posting harmful material on social media to harm his/her reputation. Aggressive act creates depression, anxiety in users which may lead to diversion of attention and sometimes suicidal actions. In this paper the authors have included a survey on recent algorithms which work on detection of cyberbullying. State-of-the-art studies only focus on the detection of cyberbullying but not on the preventive measures against cyberbullying. In order to tackle this problem, the authors showed how the severity of the bullying in messages helps to find the real culprit.


Sign in / Sign up

Export Citation Format

Share Document