IIC Journal of Innovation 20th Edition Trustworthy July 2022, 20th Edition | Page 7

Trustworthiness in IoT Systems
CONTENTS
1 Introduction .................................................................................................................................. 3 2 Trustworthiness Methods ............................................................................................................. 3 3 What Does Operation Mean ? ........................................................................................................ 4
4 Time . Hazards , Perils ..................................................................................................................... 7
4.1
Hazard ................................................................................................................................ 8
4.2
Threat ................................................................................................................................. 9
4.3
Incident ............................................................................................................................. 10
4.4
Obvious Differences : Hazard Versus Threat ........................................................................ 10
4.5
Software Bug ..................................................................................................................... 11
4.6
Nature-Caused Incidents .................................................................................................... 11
4.7
Peril .................................................................................................................................. 11
5 A System Perils Model ................................................................................................................. 11 6 A Refinement of the TSSM ........................................................................................................... 12 7 System Status Beyond the TSSM .................................................................................................. 13 8 Preparing for the Incidents .......................................................................................................... 14 9 Summary .................................................................................................................................... 15 10 References .................................................................................................................................. 15 11 Acknowledgements ..................................................................................................................... 15
FIGURES
Figure 3-1 : IT / OT convergence and trustworthiness ......................................................................................... 5 Figure 3-2 : IT / OT landscape ............................................................................................................................. 6 Figure 3-3 : IT / OT landscape and trustworthiness ............................................................................................. 7 Figure 4-1 : Trustworthy system status model ( TSSM ). ..................................................................................... 8 Figure 5-1 : System perils model ..................................................................................................................... 12 Figure 6-1 : Refined trustworthy system status model ( TSSM ) with hazards and threats . ................................ 13
TABLES
Table 3-1 : Comparison of traditional IT , operational IT , digital OT and physical OT . ......................................... 6 Table 4-1 : Terms and definitions of the peril model ....................................................................................... 11 Table 5-1 : Terms and definitions of the peril model ....................................................................................... 12
2 July 2022