Trustworthiness in IoT Systems
CONTENTS
1 Introduction .................................................................................................................................. 3 2 Trustworthiness Methods ............................................................................................................. 3 3 What Does Operation Mean ? ........................................................................................................ 4
4 Time . Hazards , Perils ..................................................................................................................... 7 |
4.1 |
Hazard ................................................................................................................................ 8 |
4.2 |
Threat ................................................................................................................................. 9 |
4.3 |
Incident ............................................................................................................................. 10 |
4.4 |
Obvious Differences : Hazard Versus Threat ........................................................................ 10 |
4.5 |
Software Bug ..................................................................................................................... 11 |
4.6 |
Nature-Caused Incidents .................................................................................................... 11 |
4.7 |
Peril .................................................................................................................................. 11 |
5 A System Perils Model ................................................................................................................. 11 6 A Refinement of the TSSM ........................................................................................................... 12 7 System Status Beyond the TSSM .................................................................................................. 13 8 Preparing for the Incidents .......................................................................................................... 14 9 Summary .................................................................................................................................... 15 10 References .................................................................................................................................. 15 11 Acknowledgements ..................................................................................................................... 15
FIGURES
Figure 3-1 : IT / OT convergence and trustworthiness ......................................................................................... 5 Figure 3-2 : IT / OT landscape ............................................................................................................................. 6 Figure 3-3 : IT / OT landscape and trustworthiness ............................................................................................. 7 Figure 4-1 : Trustworthy system status model ( TSSM ). ..................................................................................... 8 Figure 5-1 : System perils model ..................................................................................................................... 12 Figure 6-1 : Refined trustworthy system status model ( TSSM ) with hazards and threats . ................................ 13
TABLES
Table 3-1 : Comparison of traditional IT , operational IT , digital OT and physical OT . ......................................... 6 Table 4-1 : Terms and definitions of the peril model ....................................................................................... 11 Table 5-1 : Terms and definitions of the peril model ....................................................................................... 12
2 July 2022