Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric Uncertainties

Supply chain security threats pose new challenges to security risk modeling techniques for complex ICT systems such as the IoT. With established techniques drawn from attack trees and reliability analysis providing needed points of reference, graph-based analysis can provide a framework for considering the role of suppliers in such systems. We present such a framework here while highlighting the need for a component-centered model. Given resource limitations when applying this model to existing systems, we study various classes of uncertainties in model development, including structural uncertainties and uncertainties in the magnitude of estimated event probabilities. Using case studies, we find that structural uncertainties constitute a greater challenge to model utility and as such should receive particular attention. Best practices in the face of these uncertainties are proposed.

[1]  J. B. Fussell,et al.  MOCUS: a computer program to obtain minimal sets from fault trees , 1974 .

[2]  Somesh Jha,et al.  Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[3]  Edward G. Amoroso,et al.  Fundamentals of computer security technology , 1994 .

[4]  Robert Lagerström,et al.  Threat modeling - A systematic literature review , 2019, Comput. Secur..

[5]  John D. Andrews,et al.  A fault tree analysis strategy using binary decision diagrams , 2002, Reliab. Eng. Syst. Saf..

[6]  C. H. Lie,et al.  Fault Tree Analysis, Methods, and Applications ߝ A Review , 1985, IEEE Transactions on Reliability.

[7]  Vaidas Matuzas,et al.  Analysis of large fault trees based on functional decomposition , 2011, Reliab. Eng. Syst. Saf..

[8]  Xinming Ou,et al.  A scalable approach to attack graph generation , 2006, CCS '06.

[9]  Somesh Jha,et al.  Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[10]  Christopher S. Tang Perspectives in supply chain risk management , 2006 .

[11]  Nancy G. Leveson,et al.  Engineering a Safer World: Systems Thinking Applied to Safety , 2012 .

[12]  Antoine Rauzy Toward an efficient implementation of the MOCUS algorithm , 2003, IEEE Trans. Reliab..

[13]  Sjouke Mauw,et al.  Foundations of Attack Trees , 2005, ICISC.

[14]  Marvin Rausand,et al.  System Reliability Theory: Models, Statistical Methods, and Applications , 2003 .

[15]  Barbara Kordy,et al.  DAG-based attack and defense modeling: Don't miss the forest for the attack trees , 2013, Comput. Sci. Rev..

[16]  Quanyan Zhu,et al.  RIoTS: Risk Analysis of IoT Supply Chain Threats , 2020, 2020 IEEE 6th World Forum on Internet of Things (WF-IoT).

[17]  Nadya Bartol,et al.  Supply Chain Risk Management Practices for Federal Information Systems and Organizations , 2015 .

[18]  Chris Rose,et al.  The Security Implications Of The Internet Of Things , 2017 .