P. Denzler, Siegfried Hollerer, Thomas Frühwirth, W. Kastner
{"title":"工业边缘计算中的安全威胁、安全隐患和相互依赖性的识别","authors":"P. Denzler, Siegfried Hollerer, Thomas Frühwirth, W. Kastner","doi":"10.1145/3453142.3493508","DOIUrl":null,"url":null,"abstract":"Edge computing provides the means for higher integration and seamless communication in industrial automation. Due to the paradigm's distributed nature, it faces several security threats and safety hazards. This paper presents an adjusted method of combing STRIDE-LM and HAZOP to identify security threats, safety hazards, and interdependencies suitable for edge computing. The method allows a bi-directional identification of m: $n$ interdependencies between threats and hazards. The paper concludes by outlining further research, including identifying possible failure chains, later risk analysis, evaluation, and treatment.","PeriodicalId":6779,"journal":{"name":"2021 IEEE/ACM Symposium on Edge Computing (SEC)","volume":"358 1","pages":"397-402"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Identification of security threats, safety hazards, and interdependencies in industrial edge computing\",\"authors\":\"P. Denzler, Siegfried Hollerer, Thomas Frühwirth, W. Kastner\",\"doi\":\"10.1145/3453142.3493508\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Edge computing provides the means for higher integration and seamless communication in industrial automation. Due to the paradigm's distributed nature, it faces several security threats and safety hazards. This paper presents an adjusted method of combing STRIDE-LM and HAZOP to identify security threats, safety hazards, and interdependencies suitable for edge computing. The method allows a bi-directional identification of m: $n$ interdependencies between threats and hazards. The paper concludes by outlining further research, including identifying possible failure chains, later risk analysis, evaluation, and treatment.\",\"PeriodicalId\":6779,\"journal\":{\"name\":\"2021 IEEE/ACM Symposium on Edge Computing (SEC)\",\"volume\":\"358 1\",\"pages\":\"397-402\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE/ACM Symposium on Edge Computing (SEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3453142.3493508\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE/ACM Symposium on Edge Computing (SEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3453142.3493508","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Identification of security threats, safety hazards, and interdependencies in industrial edge computing
Edge computing provides the means for higher integration and seamless communication in industrial automation. Due to the paradigm's distributed nature, it faces several security threats and safety hazards. This paper presents an adjusted method of combing STRIDE-LM and HAZOP to identify security threats, safety hazards, and interdependencies suitable for edge computing. The method allows a bi-directional identification of m: $n$ interdependencies between threats and hazards. The paper concludes by outlining further research, including identifying possible failure chains, later risk analysis, evaluation, and treatment.