The Resilience Model Supporting IIoT System Trustworthiness
C
Dynamic Reconfiguration / AR
Path Diversity / Di
The set of Attribute-Based Usage Restriction Trust-Based Privilege Management / PR
parameters
/ PR
for
the
Dynamic Privileges / PR
algorithms
R
Dynamic Resource Allocation / AR
System
resources
used
to
perform the
operations
Asset Mobility / DP
Purposing / Ra
Offloading / Ra
Protected Backup and Restore / Re
Surplus Capacity / Re
Replication / Re
D X
Obfuscation / De
Synthetic Diversity / Di
Input data in Functional Relocation of Cyber Fragmentation / DP
the
IT Resources / DP
context
Non-Persistent Information / NP
D S IoT
Disinformation / De
Monitoring and Damage Assessment /
AM
Environment Misdirection / De
Sensor Fusion and Analysis / AM
represented
Tainting / De
in the IT
Dynamic Mapping and Profiling / DR
context
Functional Relocation of Sensors /
DP
Z
Adaptive Management / AR
System
Monitoring
and
requirements Assessment / AM
Calibrated Defense-in-Depth / CD
Damage Sensor Fusion and Analysis / AM
Self-Challenge / CD
Malware and Forensic Analysis /
Dynamic Threat Modeling / DR
AM
Mission Dependency and Status
Integrity Checks / SI
Visualization / DR
Provenance Tracking / SI
Behavior Validation / SI
- 127 -
IIC Journal of Innovation