Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

IoT Supply Chain Security Risk Analysis and Mitigation

Modeling, Computations, and Software Tools

  • Book
  • © 2022

Overview

Part of the book series: SpringerBriefs in Computer Science (BRIEFSCOMPUTER)

This is a preview of subscription content, log in via an institution to check access.

Access this book

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

This SpringerBrief introduces methodologies and tools for quantitative understanding and assessment of supply chain risk to critical infrastructure systems. It unites system reliability analysis, optimization theory, detection theory and mechanism design theory to study vendor involvement in overall system security. It also provides decision support for risk mitigation.

This SpringerBrief introduces I-SCRAM, a software tool to assess the risk. It enables critical infrastructure operators to make risk-informed decisions relating to the supply chain, while deploying their IT/OT and IoT systems.

The authors present examples and case studies on supply chain risk assessment/mitigation of modern connected infrastructure systems such as autonomous vehicles, industrial control systems, autonomous truck platooning and more. It also discusses how vendors of different system components are involved in the overall security posture of the system and how the risk can be mitigatedthrough vendor selection and diversification. The specific topics in this book include:

  • Risk modeling and analysis of IoT supply chains
  • Methodologies for risk mitigation, policy management, accountability, and cyber insurance
  • Tutorial on a software tool for supply chain risk management of IoT

 These topics are supported by up-to-date summaries of the authors’ recent research findings. The authors introduce a taxonomy of supply chain security and discusses the future challenges and directions in securing the supply chains of IoT systems. It also focuses on the need for joint policy and technical solutions to counter the emerging risks, where technology should inform policy and policy should regulate technology development.

This SpringerBrief has self-contained chapters, facilitating the readers to peruse individual topics of interest. It provides a broad understanding of the emerging field of cyber supply chain security in the context of IoT systems to academics, industry professionals and government officials.

Similar content being viewed by others

Keywords

Table of contents (5 chapters)

Authors and Affiliations

  • New York University, Brooklyn, USA

    Timothy Kieras, Quanyan Zhu

  • University of Michigan-Dearborn, Dearborn, USA

    Junaid Farooq

About the authors

Timothy Kieras is currently a Software Engineer at MORSE Corp. He received the Bachelor of Arts and Master of Arts degrees in philosophy from Fordham University, New York, NY, USA, in 2011 and 2012, respectively and the M.S. in Computer Science from New York University, Brooklyn, NY, in 2020. He has been an Instructor at St. Louis University High School, St. Louis, MO, and Regis High School, New York, NY, USA.Junaid Farooq is an Assistant Professor with the Department of Electrical and Computer Engineering at the University of Michigan-Dearborn. He received the B.S. degree in electrical engineering from the National University of Sciences and Technology (NUST), Islamabad, Pakistan, in 2013, the M.S. degree in electrical engineering from the King Abdullah University of Science and Technology (KAUST), Thuwal, Saudi Arabia, in 2015, and the Ph.D. degree in electrical engineering from New York University, Brooklyn, NY, USA, in 2020. From 2015 to 2016, he was a Research Assistant with the Qatar Mobility Innovations Center (QMIC), Qatar Science and Technology Park (QSTP), Doha, Qatar. His current research interests include cybersecurity, modeling and optimization of next generation wireless communication systems, the Internet of Things, and cyber-physical systems.

Quanyan Zhu is an Associate Professor with the Department of Electrical and Computer Engineering at New York University (NYU). He is also an affiliated Faculty Member of the Center for Cyber Security (CCS) and the Center for Urban Science and Progress (CUSP), NYU. He received the B.Eng. degree (Hons.) in electrical engineering from McGill University, in 2006, the M.A.Sc. degree from the University of Toronto, in 2008, and the Ph.D. degree from the University of Illinois at Urbana-Champaign (UIUC), in 2013. His current research interests include game theory, machine learning, cybersecurity and deception, network optimization and control, the Internet of Things, and cyber-physical systems.

Bibliographic Information

  • Book Title: IoT Supply Chain Security Risk Analysis and Mitigation

  • Book Subtitle: Modeling, Computations, and Software Tools

  • Authors: Timothy Kieras, Junaid Farooq, Quanyan Zhu

  • Series Title: SpringerBriefs in Computer Science

  • DOI: https://doi.org/10.1007/978-3-031-08480-5

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: The Author(s), under exclusive license to Springer Nature Switzerland AG 2022

  • Softcover ISBN: 978-3-031-08479-9Published: 06 September 2022

  • eBook ISBN: 978-3-031-08480-5Published: 05 September 2022

  • Series ISSN: 2191-5768

  • Series E-ISSN: 2191-5776

  • Edition Number: 1

  • Number of Pages: XVI, 129

  • Number of Illustrations: 7 b/w illustrations, 58 illustrations in colour

  • Topics: Systems and Data Security, Cyber-physical systems, IoT, Risk Management

Publish with us