P. Denzler, Siegfried Hollerer, Thomas Frühwirth, W. Kastner
{"title":"Identification of security threats, safety hazards, and interdependencies in industrial edge computing","authors":"P. Denzler, Siegfried Hollerer, Thomas Frühwirth, W. Kastner","doi":"10.1145/3453142.3493508","DOIUrl":null,"url":null,"abstract":"Edge computing provides the means for higher integration and seamless communication in industrial automation. Due to the paradigm's distributed nature, it faces several security threats and safety hazards. This paper presents an adjusted method of combing STRIDE-LM and HAZOP to identify security threats, safety hazards, and interdependencies suitable for edge computing. The method allows a bi-directional identification of m: $n$ interdependencies between threats and hazards. The paper concludes by outlining further research, including identifying possible failure chains, later risk analysis, evaluation, and treatment.","PeriodicalId":6779,"journal":{"name":"2021 IEEE/ACM Symposium on Edge Computing (SEC)","volume":"358 1","pages":"397-402"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE/ACM Symposium on Edge Computing (SEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3453142.3493508","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Edge computing provides the means for higher integration and seamless communication in industrial automation. Due to the paradigm's distributed nature, it faces several security threats and safety hazards. This paper presents an adjusted method of combing STRIDE-LM and HAZOP to identify security threats, safety hazards, and interdependencies suitable for edge computing. The method allows a bi-directional identification of m: $n$ interdependencies between threats and hazards. The paper concludes by outlining further research, including identifying possible failure chains, later risk analysis, evaluation, and treatment.