{"title":"使用零信任和区块链保护物联网设备","authors":"Suparna Dhar, I. Bose","doi":"10.1080/10919392.2020.1831870","DOIUrl":null,"url":null,"abstract":"ABSTRACT The benefits ushered through the use of IoT come with its share of security concerns. IoT networks are heterogeneous and existing network security tools and controls are inadequate for them. The IoT devices and the data transmitted to and from these devices remain exposed to a multitude of threats. In this paper, we review the security concerns involved in the implementation of IoT and propose a framework for security of IoT devices based on Zero Trust and blockchain. A risk-based segmentation of IoT network increases the homogeneity of IoT device attributes and communication protocols. Zero Trust extends the perimeter of trust beyond the IT/OT network. Blockchain improves the device identification and access control capabilities of the IoT network. We support the conceptual framework with a case study on the implementation of IoT security using Zero Trust and blockchain. We provide a risk-scoring method and a five-point recommendation for management of IoT security. Our proposed IoT security framework will help implementors of IoT to overcome existing security concerns and will benefit academic researchers and practitioners alike.","PeriodicalId":54777,"journal":{"name":"Journal of Organizational Computing and Electronic Commerce","volume":"31 1","pages":"18 - 34"},"PeriodicalIF":2.0000,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/10919392.2020.1831870","citationCount":"30","resultStr":"{\"title\":\"Securing IoT Devices Using Zero Trust and Blockchain\",\"authors\":\"Suparna Dhar, I. Bose\",\"doi\":\"10.1080/10919392.2020.1831870\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT The benefits ushered through the use of IoT come with its share of security concerns. IoT networks are heterogeneous and existing network security tools and controls are inadequate for them. The IoT devices and the data transmitted to and from these devices remain exposed to a multitude of threats. In this paper, we review the security concerns involved in the implementation of IoT and propose a framework for security of IoT devices based on Zero Trust and blockchain. A risk-based segmentation of IoT network increases the homogeneity of IoT device attributes and communication protocols. Zero Trust extends the perimeter of trust beyond the IT/OT network. Blockchain improves the device identification and access control capabilities of the IoT network. We support the conceptual framework with a case study on the implementation of IoT security using Zero Trust and blockchain. We provide a risk-scoring method and a five-point recommendation for management of IoT security. Our proposed IoT security framework will help implementors of IoT to overcome existing security concerns and will benefit academic researchers and practitioners alike.\",\"PeriodicalId\":54777,\"journal\":{\"name\":\"Journal of Organizational Computing and Electronic Commerce\",\"volume\":\"31 1\",\"pages\":\"18 - 34\"},\"PeriodicalIF\":2.0000,\"publicationDate\":\"2020-11-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1080/10919392.2020.1831870\",\"citationCount\":\"30\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Organizational Computing and Electronic Commerce\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1080/10919392.2020.1831870\",\"RegionNum\":4,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Organizational Computing and Electronic Commerce","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1080/10919392.2020.1831870","RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Securing IoT Devices Using Zero Trust and Blockchain
ABSTRACT The benefits ushered through the use of IoT come with its share of security concerns. IoT networks are heterogeneous and existing network security tools and controls are inadequate for them. The IoT devices and the data transmitted to and from these devices remain exposed to a multitude of threats. In this paper, we review the security concerns involved in the implementation of IoT and propose a framework for security of IoT devices based on Zero Trust and blockchain. A risk-based segmentation of IoT network increases the homogeneity of IoT device attributes and communication protocols. Zero Trust extends the perimeter of trust beyond the IT/OT network. Blockchain improves the device identification and access control capabilities of the IoT network. We support the conceptual framework with a case study on the implementation of IoT security using Zero Trust and blockchain. We provide a risk-scoring method and a five-point recommendation for management of IoT security. Our proposed IoT security framework will help implementors of IoT to overcome existing security concerns and will benefit academic researchers and practitioners alike.
期刊介绍:
The aim of the Journal of Organizational Computing and Electronic Commerce (JOCEC) is to publish quality, fresh, and innovative work that will make a difference for future research and practice rather than focusing on well-established research areas.
JOCEC publishes original research that explores the relationships between computer/communication technology and the design, operations, and performance of organizations. This includes implications of the technologies for organizational structure and dynamics, technological advances to keep pace with changes of organizations and their environments, emerging technological possibilities for improving organizational performance, and the many facets of electronic business.
Theoretical, experimental, survey, and design science research are all welcome and might look at:
• E-commerce
• Collaborative commerce
• Interorganizational systems
• Enterprise systems
• Supply chain technologies
• Computer-supported cooperative work
• Computer-aided coordination
• Economics of organizational computing
• Technologies for organizational learning
• Behavioral aspects of organizational computing.