Show simple item record

dc.contributor.authorMancini, Federicoen_GB
dc.contributor.authorJohnsen, Frank T.en_GB
dc.date.accessioned2021-06-23T08:26:33Z
dc.date.accessioned2021-06-25T07:59:33Z
dc.date.available2021-06-23T08:26:33Z
dc.date.available2021-06-25T07:59:33Z
dc.date.issued2020
dc.identifier.citationMancini F, Johnsen FT. A Novel IoBT Security Assessment Framework: LoRaWAN Case Study. International Command and Control Research and Technology Symposium (ICCRTS) proceedings. 2020en_GB
dc.identifier.urihttp://hdl.handle.net/123456789/165043
dc.identifier.urihttp://hdl.handle.net/20.500.12242/2909
dc.descriptionMancini, Federico; Johnsen, Frank T.. A Novel IoBT Security Assessment Framework: LoRaWAN Case Study. International Command and Control Research and Technology Symposium (ICCRTS) proceedings 2020en_GB
dc.description.abstractThe Internet of Things (IoT) is interesting because this potentially disruptive technology can also be used as a low-cost approach to augment information in military systems. This makes following IoT trends important when considering the future of command and control systems. However, it is critical to make sure that employing IoT for defense purposes, the so-called Internet of Battle eld Things (IoBT), does not introduce unacceptable security risks into the missions. Because of the large variety of devices and the di erent ways in which they can be used, there is no one-size- ts-all security solution, and individual assessments would, ideally, have to be performed for each speci c case. This can quickly become an unmanageable overhead in the mission-planning phase, which can lead to either discarding the technology or using it in an insecure way. In this paper, we discuss a more systematic and e cient approach to assess and manage the security risks associated with IoBT. We outline a modular framework where mission-dependent security requirements can be derived and tested against actual security assessments of relevant IoT devices and technologies. Residual risk can then be identi ed and systematically reduced to an acceptable level where possible. We evaluate the framework by assessing the security of two implementations of the Long Range Wide Area Network (LoRaWAN) protocol in two different military scenarios.en_GB
dc.language.isoenen_GB
dc.subjectInformasjonsteknologien_GB
dc.subjectKommunikasjonsteknologien_GB
dc.subjectEksperimenteringen_GB
dc.titleA Novel IoBT Security Assessment Framework: LoRaWAN Case Studyen_GB
dc.typeArticleen_GB
dc.date.updated2021-06-23T08:26:33Z
dc.identifier.cristinID1867871
dc.identifier.cristinID1867871
dc.source.issn2577-1604
dc.type.documentJournal article
dc.relation.journalInternational Command and Control Research and Technology Symposium (ICCRTS) proceedings


Files in this item

This item appears in the following Collection(s)

Show simple item record