Cargando…

Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture

The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT...

Descripción completa

Detalles Bibliográficos
Autores principales: Masip-Bruin, Xavi, Marín-Tordera, Eva, Ruiz, José, Jukan, Admela, Trakadas, Panagiotis, Cernivec, Ales, Lioy, Antonio, López, Diego, Santos, Henrique, Gonos, Antonis, Silva, Ana, Soriano, José, Kalogiannis, Grigorios
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8472925/
https://www.ncbi.nlm.nih.gov/pubmed/34577264
http://dx.doi.org/10.3390/s21186057
_version_ 1784574859456544768
author Masip-Bruin, Xavi
Marín-Tordera, Eva
Ruiz, José
Jukan, Admela
Trakadas, Panagiotis
Cernivec, Ales
Lioy, Antonio
López, Diego
Santos, Henrique
Gonos, Antonis
Silva, Ana
Soriano, José
Kalogiannis, Grigorios
author_facet Masip-Bruin, Xavi
Marín-Tordera, Eva
Ruiz, José
Jukan, Admela
Trakadas, Panagiotis
Cernivec, Ales
Lioy, Antonio
López, Diego
Santos, Henrique
Gonos, Antonis
Silva, Ana
Soriano, José
Kalogiannis, Grigorios
author_sort Masip-Bruin, Xavi
collection PubMed
description The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT infrastructures. As such, the solution proposed in this paper is envisioned to deal with the whole supply chain system components, from the IoT ecosystem to the infrastructure connecting them, addressing security and privacy functionalities related to risks and vulnerabilities management, accountability, and mitigation strategies, as well as security metrics and evidence-based security assurance. In this paper, we present FISHY as a preliminary architecture that is designed to orchestrate existing and beyond state-of-the-art security appliances in composed ICT scenarios. To this end, the FISHY architecture leverages the capabilities of programmable networks and IT infrastructure through seamless orchestration and instantiation of novel security services, both in real-time and proactively. The paper also includes a thorough business analysis to go far beyond the technical benefits of a potential FISHY adoption, as well as three real-world use cases highlighting the envisioned benefits of a potential FISHY adoption.
format Online
Article
Text
id pubmed-8472925
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-84729252021-09-28 Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture Masip-Bruin, Xavi Marín-Tordera, Eva Ruiz, José Jukan, Admela Trakadas, Panagiotis Cernivec, Ales Lioy, Antonio López, Diego Santos, Henrique Gonos, Antonis Silva, Ana Soriano, José Kalogiannis, Grigorios Sensors (Basel) Review The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT infrastructures. As such, the solution proposed in this paper is envisioned to deal with the whole supply chain system components, from the IoT ecosystem to the infrastructure connecting them, addressing security and privacy functionalities related to risks and vulnerabilities management, accountability, and mitigation strategies, as well as security metrics and evidence-based security assurance. In this paper, we present FISHY as a preliminary architecture that is designed to orchestrate existing and beyond state-of-the-art security appliances in composed ICT scenarios. To this end, the FISHY architecture leverages the capabilities of programmable networks and IT infrastructure through seamless orchestration and instantiation of novel security services, both in real-time and proactively. The paper also includes a thorough business analysis to go far beyond the technical benefits of a potential FISHY adoption, as well as three real-world use cases highlighting the envisioned benefits of a potential FISHY adoption. MDPI 2021-09-09 /pmc/articles/PMC8472925/ /pubmed/34577264 http://dx.doi.org/10.3390/s21186057 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Masip-Bruin, Xavi
Marín-Tordera, Eva
Ruiz, José
Jukan, Admela
Trakadas, Panagiotis
Cernivec, Ales
Lioy, Antonio
López, Diego
Santos, Henrique
Gonos, Antonis
Silva, Ana
Soriano, José
Kalogiannis, Grigorios
Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture
title Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture
title_full Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture
title_fullStr Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture
title_full_unstemmed Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture
title_short Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture
title_sort cybersecurity in ict supply chains: key challenges and a relevant architecture
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8472925/
https://www.ncbi.nlm.nih.gov/pubmed/34577264
http://dx.doi.org/10.3390/s21186057
work_keys_str_mv AT masipbruinxavi cybersecurityinictsupplychainskeychallengesandarelevantarchitecture
AT marintorderaeva cybersecurityinictsupplychainskeychallengesandarelevantarchitecture
AT ruizjose cybersecurityinictsupplychainskeychallengesandarelevantarchitecture
AT jukanadmela cybersecurityinictsupplychainskeychallengesandarelevantarchitecture
AT trakadaspanagiotis cybersecurityinictsupplychainskeychallengesandarelevantarchitecture
AT cernivecales cybersecurityinictsupplychainskeychallengesandarelevantarchitecture
AT lioyantonio cybersecurityinictsupplychainskeychallengesandarelevantarchitecture
AT lopezdiego cybersecurityinictsupplychainskeychallengesandarelevantarchitecture
AT santoshenrique cybersecurityinictsupplychainskeychallengesandarelevantarchitecture
AT gonosantonis cybersecurityinictsupplychainskeychallengesandarelevantarchitecture
AT silvaana cybersecurityinictsupplychainskeychallengesandarelevantarchitecture
AT sorianojose cybersecurityinictsupplychainskeychallengesandarelevantarchitecture
AT kalogiannisgrigorios cybersecurityinictsupplychainskeychallengesandarelevantarchitecture