A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System

Bruno Dorsemaine, Jean Philippe Gaulier, Jean Philippe Wary, Nizar Kheir, Pascal Urien

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we propose a new approach to manage the threats brought by an IoT infrastructure to a legacy information system (IS). We first give a state of art for information security properties in IoT and IS based on standards such as ISO 16982 and ISO 27005 and a previously published taxonomy. Then we detail an innovative method, based on the evaluation of threats brought by an IoT infrastructure onto an IS. It is represented as a qualitative matrix between IoT infrastructure threats and the Security properties of the IS. The method is then applied to the use case of connected light bulbs. Thanks to this approach, it is possible to logically organize threat management while integrating an IoT infrastructure into an IS.

Original languageEnglish
Title of host publicationProceedings - IEEE 37th International Conference on Distributed Computing Systems Workshops, ICDCSW 2017
EditorsJoao E. Ferreira, Teruo Higashino, Aibek Musaev
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages105-112
Number of pages8
ISBN (Electronic)9781538632925
DOIs
Publication statusPublished - 13 Jul 2017
Event37th IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2017 - Atlanta, United States
Duration: 5 Jun 20178 Jun 2017

Publication series

NameProceedings - IEEE 37th International Conference on Distributed Computing Systems Workshops, ICDCSW 2017

Conference

Conference37th IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2017
Country/TerritoryUnited States
CityAtlanta
Period5/06/178/06/17

Keywords

  • Internet of Things
  • information systems
  • security
  • threat management

Fingerprint

Dive into the research topics of 'A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System'. Together they form a unique fingerprint.

Cite this