2021
DOI: 10.1016/j.cose.2020.102073
|View full text |Cite
|
Sign up to set email alerts
|

Extending critical infrastructure element longevity using constellation-based ID verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

3
37
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(45 citation statements)
references
References 8 publications
3
37
0
Order By: Relevance
“…This includes using real-world virtualization in industrial system frameworks that integrate IoT/IIoT devices, computation, networking, and physical processes [3]. While the inherent efficiencies, cost savings, etc., brought about by hands-off automation, are certainly desirable, benefits are only realized if the supporting devices achieve their full life expectancy [4] and operational cyber security risks are mitigated. These risks include an increase in the number of wireless doorways for entering the operational attack surface that has expanded with the adoption and networked integration of IoT/IIoT devices [5].…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…This includes using real-world virtualization in industrial system frameworks that integrate IoT/IIoT devices, computation, networking, and physical processes [3]. While the inherent efficiencies, cost savings, etc., brought about by hands-off automation, are certainly desirable, benefits are only realized if the supporting devices achieve their full life expectancy [4] and operational cyber security risks are mitigated. These risks include an increase in the number of wireless doorways for entering the operational attack surface that has expanded with the adoption and networked integration of IoT/IIoT devices [5].…”
Section: Introductionmentioning
confidence: 99%
“…That is, the fingerprint features are extracted from collected emissions of a component, subassembly, or device that is actively operating and performing its intended function. As evident in [6], passive fingerprinting methods are the most prolific and most appropriate for post-deployment protection within the field operation phase of a device's technical lifespan [4].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations