当前位置: X-MOL 学术IEEE Commun. Mag. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Security, Privacy, and Dependability Evaluation in Verification and Validation Life Cycles for Military IoT Systems
IEEE Communications Magazine ( IF 11.2 ) Pub Date : 2020-08-01 , DOI: 10.1109/mcom.001.2000342
Manas Pradhan , Josef Noll

The Internet of Things (IoT) is a disruptive technology that complements the usage of modern day information and communications technology (ICT) systems. IoT systems, with their small form and cost factor coupled with their increasing reliability, have made huge inroads in all markets. Connected to some form of interconnected networks, either to the mainstream Internet or private networks, they enable ubiquitous and to a large extent autonomous operation. This has taken away the idea that sensing, actuation, and computing needs to be dependent on expensive and complicated legacy systems. Although complete discontinuation of legacy systems is still quite a long journey and would not be completely possible, IoT systems show the waypoints as to how the ICT industry will evolve. The military domain is not far away from adopting IoT technologies in its operational construct. The NATO IST-147 and 176 research task groups have closely examined applicability of IoT for federated and ubiquitous military applications. Introducing IoT devices in the military domain requires verification and validation (V&V) of ICT systems as per operational guidelines. This article proposes and applies a concept for security, privacy, and eependability evaluation of IoT systems that could be used for V&V processes. This would enable more streamlined and standardized evaluations of IoT systems before they can be deemed usable for military contexts.

中文翻译:

军事物联网系统验证和验证生命周期中的安全性、隐私性和可靠性评估

物联网 (IoT) 是一种颠覆性技术,可补充现代信息和通信技术 (ICT) 系统的使用。物联网系统凭借其小巧的外形和成本因素以及不断提高的可靠性,已在所有市场上取得了巨大的进步。连接到某种形式的互连网络,无论是连接到主流互联网还是专用网络,它们都可以实现无处不在并在很大程度上实现自主操作。这消除了传感、驱动和计算需要依赖于昂贵且复杂的遗留系统的想法。尽管完全停止遗留系统仍然是一个漫长的过程,也不可能完全实现,但物联网系统为 ICT 行业将如何发展指明了方向。军事领域距离在其作战结构中采用物联网技术不远了。北约 IST-147 和 176 研究任务组仔细研究了物联网在联合和无处不在的军事应用中的适用性。在军事领域引入物联网设备需要根据操作指南对 ICT 系统进行验证和验证 (V&V)。本文提出并应用了可用于 V&V 流程的物联网系统的安全性、隐私性和可靠性评估概念。这将使物联网系统在被认为可用于军事环境之前对其进行更简化和标准化的评估。在军事领域引入物联网设备需要根据操作指南对 ICT 系统进行验证和验证 (V&V)。本文提出并应用了可用于 V&V 流程的物联网系统的安全性、隐私性和可靠性评估概念。这将使物联网系统在被认为可用于军事环境之前对其进行更简化和标准化的评估。在军事领域引入物联网设备需要根据操作指南对 ICT 系统进行验证和验证 (V&V)。本文提出并应用了可用于 V&V 流程的物联网系统的安全性、隐私性和可靠性评估概念。这将使物联网系统在被认为可用于军事环境之前对其进行更简化和标准化的评估。
更新日期:2020-08-01
down
wechat
bug