Utilize este identificador para referenciar este registo: https://hdl.handle.net/1822/74941

Registo completo
Campo DCValorIdioma
dc.contributor.authorMasip-Bruin, Xavipor
dc.contributor.authorMarín-Tordera, Evapor
dc.contributor.authorRuiz, Josépor
dc.contributor.authorJukan, Admelapor
dc.contributor.authorTrakadas, Panagiotispor
dc.contributor.authorCernivec, Alespor
dc.contributor.authorLioy, Antoniopor
dc.contributor.authorLópez, Diegopor
dc.contributor.authorSantos, Henriquepor
dc.contributor.authorGonos, Antonispor
dc.contributor.authorSilva, Anapor
dc.contributor.authorSoriano, Josépor
dc.contributor.authorKalogiannis, Grigoriospor
dc.date.accessioned2021-12-13T11:58:21Z-
dc.date.available2021-12-13T11:58:21Z-
dc.date.issued2021-09-09-
dc.identifier.citationMasip-Bruin, X.; Marín-Tordera, E.; Ruiz, J.; Jukan, A.; Trakadas, P.; Cernivec, A.; Lioy, A.; López, D.; Santos, H.; Gonos, A.; Silva, A.; Soriano, J.; Kalogiannis, G. Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture. Sensors 2021, 21, 6057. https://doi.org/10.3390/s21186057por
dc.identifier.issn1424-8220por
dc.identifier.urihttps://hdl.handle.net/1822/74941-
dc.description.abstractThe specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT infrastructures. As such, the solution proposed in this paper is envisioned to deal with the whole supply chain system components, from the IoT ecosystem to the infrastructure connecting them, addressing security and privacy functionalities related to risks and vulnerabilities management, accountability, and mitigation strategies, as well as security metrics and evidence-based security assurance. In this paper, we present FISHY as a preliminary architecture that is designed to orchestrate existing and beyond state-of-the-art security appliances in composed ICT scenarios. To this end, the FISHY architecture leverages the capabilities of programmable networks and IT infrastructure through seamless orchestration and instantiation of novel security services, both in real-time and proactively. The paper also includes a thorough business analysis to go far beyond the technical benefits of a potential FISHY adoption, as well as three real-world use cases highlighting the envisioned benefits of a potential FISHY adoption.por
dc.description.sponsorshipThis research was funded by H2020 FISHY Project, grant number 952644, and for UPC authors by the Spanish Ministry of Science, Innovation and Universities and FEDER, grant number RTI2018-094532-B-I00.por
dc.language.isoengpor
dc.publisherMultidisciplinary Digital Publishing Institute (MDPI)por
dc.relationinfo:eu-repo/grantAgreement/EC/H2020/952644/EU-
dc.rightsopenAccesspor
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/por
dc.subjectCybersecuritypor
dc.subjectSupply chainspor
dc.subjectIoT systemspor
dc.subjectSystems integrationpor
dc.subjectReal scenarios analysispor
dc.titleCybersecurity in ICT supply chains: key challenges and a relevant architecturepor
dc.typearticlepor
dc.peerreviewedyespor
dc.relation.publisherversionhttps://www.mdpi.com/1424-8220/21/18/6057por
oaire.citationStartPage1por
oaire.citationEndPage24por
oaire.citationIssue18por
oaire.citationVolume21por
dc.date.updated2021-09-25T23:35:14Z-
dc.identifier.eissn1424-8220-
dc.identifier.doi10.3390/s21186057por
dc.identifier.pmid34577264por
dc.subject.wosScience & Technologypor
sdum.journalSensorspor
oaire.versionVoRpor
dc.identifier.articlenumber6057por
Aparece nas coleções:BUM - MDPI

Ficheiros deste registo:
Ficheiro Descrição TamanhoFormato 
sensors-21-06057-v3.pdf1,16 MBAdobe PDFVer/Abrir

Este trabalho está licenciado sob uma Licença Creative Commons Creative Commons

Partilhe no FacebookPartilhe no TwitterPartilhe no DeliciousPartilhe no LinkedInPartilhe no DiggAdicionar ao Google BookmarksPartilhe no MySpacePartilhe no Orkut
Exporte no formato BibTex mendeley Exporte no formato Endnote Adicione ao seu ORCID