Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security Standard Compliance in System of Systems
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab. University of Applied Sciences Burgenland.ORCID iD: 0000-0003-2477-3692
2020 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The world we live in is becoming digitalized by transforming our society and economyin an unpredicted way. Digital technologies are transforming products, manufacturingassets, and entire supply chains. These technologies revolutionize how organisations en-gage with customers, other partners, and society depending on the ability to connectpeople, technology, and processes. Distributed services through different platforms, or-ganisations, and even regions are becoming very common with the digital transformationof industrial processes. More and more systems are being constructed by interconnectingexisting and new independent systems. The transformation from traditional and isolatedsystems to connected components in a System of Systems (SoS), provides many advan-tages such as flexibility, efficiency, interoperability, and competitiveness. While it is clearthat digital technology will transform most industries, there are a number of challengesto be addressed, especially in terms of standards and security.In the past, providing a secure environment meant isolation from external access andproviding physical protection, usually based on proprietary standards. Nowadays, withthe development of state-of-the-art technologies, these systems have to meet and provideproof of fulfilling several requirements and involving many stakeholders. Thus, to assurethat organisations can move towards this multi-stakeholder cooperation, security is one ofthe challenges that need to be addressed. With the increasing number of devices, systems,and services in these complex systems and the number of standards and regulationsthey should fulfill, the need for automated standard compliance verification is of utmostimportance. Such verification will ensure that the components included in their businessprocesses comply with the imposed standards, laws and regulations.The research presented in this thesis targets the automated and continuous standardcompliance verification in SoS. Standard compliance verification provides evidence thatprocesses and their components satisfy the requirements defined by national and interna-tional standards. The thesis proposes an automated and continuous standard complianceverification framework that provides evidence if SoS components fulfill security standards’requirements based on extracted measurable indicator points. Since these systems evolveover time, the standard compliance is verified in design time and continuously monitoredand verified during run time after the SoS has been deployed.

Place, publisher, year, edition, pages
Luleå University of Technology, 2020.
Series
Doctoral thesis / Luleå University of Technology 1 jan 1997 → …, ISSN 1402-1544
Keywords [en]
Security, Standard, Security Standards, System of Systems, Industry 4.0, Digitization, Standard Compliance, Security Standards, Standardization Bodies, Internet of Things, Cyber Physical Systems
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Electronic systems
Identifiers
URN: urn:nbn:se:ltu:diva-80454ISBN: 978-91-7790-632-2 (print)ISBN: 978-91-7790-633-9 (electronic)OAI: oai:DiVA.org:ltu-80454DiVA, id: diva2:1459036
Public defence
2020-11-18, A1543, 13:00 (English)
Opponent
Supervisors
Available from: 2020-08-20 Created: 2020-08-18 Last updated: 2020-10-28Bibliographically approved
List of papers
1. Harmonized Monitoring for High Assurance Clouds
Open this publication in new window or tab >>Harmonized Monitoring for High Assurance Clouds
Show others...
2016 (English)In: 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2016Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2016
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:ltu:diva-65903 (URN)10.1109/IC2EW.2016.20 (DOI)000392269400020 ()2-s2.0-84992121146 (Scopus ID)978-1-5090-3684-4 (ISBN)978-1-5090-3685-1 (ISBN)
Conference
2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), Berlin, 4-8 April 2016
Projects
SECCRIT
Funder
EU, FP7, Seventh Framework Programme, 312758
Available from: 2017-10-02 Created: 2017-10-02 Last updated: 2024-08-19Bibliographically approved
2. Operations security evaluation of IaaS-cloud backend for industry 4.0
Open this publication in new window or tab >>Operations security evaluation of IaaS-cloud backend for industry 4.0
Show others...
2018 (English)In: CLOSER 2018: Proceedings of the 8th International Conference on Cloud Computing and Services Science / [ed] Ferguson D.,Helfert M.,Pahl C.,Munoz V.M., 2018, p. 392-399Conference paper, Published paper (Refereed)
Abstract [en]

The fast growing number of cloud based Infrastructure-as-a-Service instances raises the question, how the operations security depending on the underlying cloud computing infrastructure can be sustained and guaranteed. Security standards provide guidelines for information security controls applicable to the provision and use of the cloud services. The objectives of operations security are to support planning and sustaining of day-to-day processes that are critical with respect to security of information environments. In this work we provide a detailed analysis of ISO 27017 standard regarding security controls and investigate how well popular cloud platforms can cater for them. The resulting gap of support for individual security controls is furthermore compared with outcomes of recent cloud security research projects. Hence the contribution is twofold, first we identify a set of topics that still require research and development and secondly, as a practical output, we provide a comparison of popular industrial and open-source platforms focusing on private cloud environments, which are important for Industry 4.0 use cases.

National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Industrial Electronics
Identifiers
urn:nbn:se:ltu:diva-70237 (URN)2-s2.0-85048945725 (Scopus ID)9789897582950 (ISBN)
Conference
8th International Conference on Cloud Computing and Services Science, CLOSER 2018, Funchal, Madeira, Portugal, 19-21 March 2018
Available from: 2018-08-07 Created: 2018-08-07 Last updated: 2021-10-02Bibliographically approved
3. A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
Open this publication in new window or tab >>A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment
Show others...
2019 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 6, no 1, p. 288-296Article in journal (Refereed) Published
Abstract [en]

In the emerging Industrial IoT era, Machine-to-Machine (M2M) communication technology is considered as a key underlying technology for building Industrial IoT environments where devices (e.g., sensors, actuators, gateways) are enabled to exchange information with each other in an autonomous way without human intervention. However, most of the existing M2M protocols that can be also used in the Industrial IoT domain provide security mechanisms based on asymmetric cryptography resulting in high computational cost. As a consequence, the resource-constrained IoT devices are not able to support them appropriately and thus, many security issues arise for the Industrial IoT environment. Therefore, lightweight security mechanisms are required for M2M communications in Industrial IoT in order to reach its full potential. As a step towards this direction, in this paper, we propose a lightweight authentication mechanism, based only on hash and XOR operations, for M2M communications in Industrial IoT environment. The proposed mechanism is characterized by low computational cost, communication and storage overhead, while achieving mutual authentication, session key agreement, device’s identity confidentiality, and resistance against the following attacks: replay attack, man-in-the-middle attack, impersonation attack, and modification attack.

Place, publisher, year, edition, pages
IEEE, 2019
Keywords
Device to Device Communication, IoT, Security, Privacy
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:ltu:diva-65912 (URN)10.1109/JIOT.2017.2737630 (DOI)000459709500026 ()2-s2.0-85029177309 (Scopus ID)
Projects
SemI4.0
Funder
EU, Horizon 2020, 692466
Available from: 2017-10-02 Created: 2017-10-02 Last updated: 2024-03-23Bibliographically approved
4. Security standard compliance and continuous verification for Industrial Internet of Things
Open this publication in new window or tab >>Security standard compliance and continuous verification for Industrial Internet of Things
2020 (English)In: International Journal of Distributed Sensor Networks, ISSN 1550-1329, E-ISSN 1550-1477, Vol. 16, no 6, article id 1550147720922731Article in journal (Refereed) Published
Abstract [en]

Due to globalization and digitalization of industrial systems, standard compliance is gaining more attention. In order to stay competitive and remain in business, different sectors within industry are required to comply with multiple regulations. Compliance aims to fulfill regulations by including all measures imposed by laws and standards. Every device, application, or service implements several technologies at many levels, and standards support interoperability across them. They help to create global markets for industries and enable networked development in order to be successful and sustainable. This work highlights the importance of standard compliance and continuous verification in industrial Internet of Things and implements an automatic monitoring and standard compliance verification framework. In this work, we focus on security, safety, and organizational aspects of industrial Internet of Things. We identify a number of standards and best practice guidelines, which are used to extract security, safety, and organizational measurable indicator points. In addition, a metric model is provided that forms the basis for the necessary information needed for compliance verification, including requirements, standards, and metrics. Also, we present the prototype of the monitoring and standard compliance verification framework used to show the security compliance of an industrial Internet of Things use case.

Place, publisher, year, edition, pages
Sage Publications, 2020
Keywords
Industrial Internet of things, Internet of things, security, safety, organizational, standard, compliance, monitoring, digitalization, Industry 4.0
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Electronic systems; Industrial Electronics
Identifiers
urn:nbn:se:ltu:diva-79938 (URN)10.1177/1550147720922731 (DOI)000544721300001 ()2-s2.0-85086702920 (Scopus ID)
Note

Validerad;2020;Nivå 2;2020-07-21 (cisjan)

Available from: 2020-06-30 Created: 2020-06-30 Last updated: 2020-08-18Bibliographically approved
5. Monitoring Industry 4.0 applications for security and safety standard compliance
Open this publication in new window or tab >>Monitoring Industry 4.0 applications for security and safety standard compliance
2018 (English)Conference paper, Published paper (Refereed)
Abstract [en]

In Industry 4.0 independent entities shall inter-operate to allow flexible and customized production. To assure the parties that individual components are secured to inter-operate, we investigate automated standard compliance. The standard compliance is defined based on given sets of security and safety requirements from which are derived measurable indicator points. Those reflect configurations of systems recommended by security, safety or legally relevant standards and guidelines, which help to demonstrate the state of compliance. We propose in this paper an initial approach to automate such assessment when components are inter-operating with each other by using a monitoring and standard compliance verification framework. This will assure the parties that services or devices within their organizations operate in a secure and standard compliant way, without compromising the underlying infrastructure.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2018
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Industrial Electronics
Identifiers
urn:nbn:se:ltu:diva-70247 (URN)10.1109/ICPHYS.2018.8390801 (DOI)2-s2.0-85050145938 (Scopus ID)9781538665312 (ISBN)
Conference
1st IEEE International Conference on Industrial Cyber-Physical Systems, ICPS 2018, ITMO University Saint Petersburg, Russian Federation, 15-18 May 2018
Available from: 2018-08-07 Created: 2018-08-07 Last updated: 2020-08-18Bibliographically approved
6. Security Safety and Organizational Standard Compliance in Cyber Physical Systems
Open this publication in new window or tab >>Security Safety and Organizational Standard Compliance in Cyber Physical Systems
Show others...
2019 (English)In: Infocommunications Journal, ISSN 2061-2079, Vol. XI, no 1, p. 2-9Article in journal (Refereed) Published
Abstract [en]

In Industry 4.0 independent entities should interoperate to allow flexible and customized production. To assure the parties that individual components are secured to inter-operate, we investigate automated standard compliance. The standard compliance is defined based on given sets of security and safety requirements for which measurable indicator points are derived. Those reflect configurations of systems recommended by security, safety or process management relevant standards and guidelines, which help to demonstrate the state of compliance. We propose in this paper an approach to automate such an assessment when components are inter-operating with each other by using a monitoring and standard compliance verification framework. The framework will assure the parties that services or devices within their organizations operate in a secure and standard compliant way, without compromising the underlying infrastructure.

Place, publisher, year, edition, pages
Péter Nagy, 2019
Keywords
Security, safety, organizational, standard, compliance, monitoring, Cyber Physical Systems
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Electronic systems
Identifiers
urn:nbn:se:ltu:diva-80452 (URN)000499239400002 ()
Note

Godkänd;2020;Nivå 0;2020-08-25 (alebob)

Available from: 2020-08-18 Created: 2020-08-18 Last updated: 2020-08-25Bibliographically approved
7. Towards Trustworthy End-to-End Communication in Industry 4.0
Open this publication in new window or tab >>Towards Trustworthy End-to-End Communication in Industry 4.0
Show others...
2017 (English)In: Proceedings: 2017 IEEE 15th International Conference on Industrial Informatics, INDIN 2017, Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2017, p. 889-896, article id 8104889Conference paper, Published paper (Refereed)
Abstract [en]

Industry 4.0 considers integration of IT and control systems with physical objects, software, sensors and connectivity in order to optimize manufacturing processes. It provides advanced functionalities in control and communication for an infrastructure that handles multiple tasks in various locations automatically. Automatic actions require information from trustworthy sources. Thus, this work is focused on how to ensure trustworthy communication from the edge devices to the backend infrastructure. We derive a meta-model based on RAMI 4.0, which is used to describe an end-to-end communication use case for an Industry 4.0 application scenario and to identify dependabilities in case of security challenges. Furthermore, we evaluate secure messaging protocols and the integration of Trusted Platform Module (TPM) as a root of trust for dataexchange. We define a set of representative measurable indicator points based on existing standards and use them for automated dependability detection within the whole system.

Place, publisher, year, edition, pages
Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2017
Series
IEEE International Conference on Industrial Informatics INDIN, ISSN 1935-4576
Keywords
Trustworthy, communication, Industry4.0, CPS, Security
National Category
Engineering and Technology Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Industrial Electronics
Identifiers
urn:nbn:se:ltu:diva-65909 (URN)10.1109/INDIN.2017.8104889 (DOI)000427453200133 ()2-s2.0-85041171299 (Scopus ID)978-1-5386-0837-1 (ISBN)
Conference
15th IEEE International Conference on Industrial Informatics, INDIN 2017, University of Applied Science Emden/LeerEmden, Germany, 24-26 July 2017
Funder
EU, Horizon 2020, 692466
Available from: 2017-10-02 Created: 2017-10-02 Last updated: 2021-10-02Bibliographically approved
8. Interacting with the arrowhead local cloud: On-boarding procedure
Open this publication in new window or tab >>Interacting with the arrowhead local cloud: On-boarding procedure
Show others...
2018 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Industrial automation systems are advancing rapidly and a wide range of standards, communication protocols and platforms supporting the integration of devices are introduced. It is therefore necessary to design and build appropriate tools and frameworks that allow the integration of devices with multiple systems and services. In this work we present the Arrow-head Framework, used to enable collaborative IoT automation and introduce two support core systems, SystemRegistry and DeviceRegistry, which are needed to create a chain of trust from a hardware device to a software system and its associated services. Furthermore, we propose an on-boarding procedure of a new device interacting with the Arrowhead local cloud. This ensures that only valid and authorized devices can host software systems within an Arrowhead local cloud.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2018
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Industrial Electronics
Identifiers
urn:nbn:se:ltu:diva-70253 (URN)10.1109/ICPHYS.2018.8390800 (DOI)2-s2.0-85050137809 (Scopus ID)9781538665312 (ISBN)
Conference
1st IEEE International Conference on Industrial Cyber-Physical Systems, ICPS 2018, ITMO University Saint Petersburg, Russian Federation, 15-18 May 2018
Available from: 2018-08-07 Created: 2018-08-07 Last updated: 2021-10-02Bibliographically approved
9. Towards a security baseline for IaaS-cloud back-ends in Industry 4.0
Open this publication in new window or tab >>Towards a security baseline for IaaS-cloud back-ends in Industry 4.0
Show others...
2017 (English)Conference paper, Published paper (Refereed)
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:ltu:diva-80453 (URN)10.23919/ICITST.2017.8356438 (DOI)2-s2.0-85048050761 (Scopus ID)
Conference
International Conference for Internet Technology and Secured Transactions
Note

ISBN för värdpublikation: 978-1-908320-93-3

Available from: 2020-08-18 Created: 2020-08-18 Last updated: 2024-04-09Bibliographically approved
10. Harmonized Monitoring for High Assurance Clouds
Open this publication in new window or tab >>Harmonized Monitoring for High Assurance Clouds
Show others...
2016 (English)In: 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2016Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), 2016
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:ltu:diva-65903 (URN)10.1109/IC2EW.2016.20 (DOI)000392269400020 ()2-s2.0-84992121146 (Scopus ID)978-1-5090-3684-4 (ISBN)978-1-5090-3685-1 (ISBN)
Conference
2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), Berlin, 4-8 April 2016
Projects
SECCRIT
Funder
EU, FP7, Seventh Framework Programme, 312758
Available from: 2017-10-02 Created: 2017-10-02 Last updated: 2024-08-19Bibliographically approved

Open Access in DiVA

fulltext(2168 kB)1143 downloads
File information
File name FULLTEXT02.pdfFile size 2168 kBChecksum SHA-512
0941aa96cb8b1f4273d95793bfd6cef96daf479a90fe5e39387d49dab293b8125bf10c7312a9e99a0166c0d8c340dce226547f542001a2f1f2091370e32afef1
Type fulltextMimetype application/pdf

Authority records

Bicaku, Ani

Search in DiVA

By author/editor
Bicaku, Ani
By organisation
Embedded Internet Systems Lab
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 1148 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 1059 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf