Impact Assessment Model for the IoT (IAM)

Mike Stead Harnessing Economic Value, Safety and Security, Supply and Control Systems

TEAM: Petar Radanliev (University of Oxford), David De Roure (University of Oxford) Partners: Cisco Systems, USA, Coelition-Fujitsu, Cardiff University, Southampton University, Imperial College London The research project was undertaken between January 2018 and June 2018 at the Oxford e-Research Centre, University of Oxford. The research project combined desk-based research, literature review, case study research, grounded theory and mathematical approximations. The …

EBIS+: Extending BIM Level 2 to support IoT & Security Demonstrator

Angel Zafra Harnessing Economic Value, Privacy and Trust, Supply and Control Systems

Team: Peter T. Kirstein (University College London) Partners: BRE Global Limited The use of a secured distributed Digital Object Management System (DOMS) to represent deployments including security, data description and access process information with the relevant security metadata and extensive use of Templates. Various applications may use the deployment database, deriving appropriate new identifiers with attributes extended from the original deployment …

Newcastle Urban Sciences Building IoT (NUSBIoT)

John Mace Safety and Security, Standards, Governance and Policy, Supply and Control Systems

Newcastle Urban Sciences Building IoT (NUSBIoT) Team: Carsten Maple (University of Warwick), Hugh Boyes (University of Warwick), John Mace (University of Warwick, seconded to Newcastle University), Charles Morisset (Newcastle University), John Fitzgerald (Newcastle University), Tony Williams (Cube2 Ltd.) Partners: Newcastle University, Cube2 Ltd. Smart buildings contain multiple systems implemented as control loops comprised of networked cyber controllers effecting, or being …

Identifying Attack Vectors for Network Intrusion to Determine Impact Across Threat Surfaces (IoT-Depends)

adrian Adoption and Acceptability, Safety and Security, Supply and Control Systems

Identifying Attack Vectors for Network Intrusion via IoT devices & Developing a Goal-Oriented Approach to Determine Impact Across Threat Surfaces (IoT-Depends) (Supported by Lloyd’s Register Foundation) Team: Pete Burnap (Cardiff University) Partners: Airbus group IoT devices are vulnerable to breach from a number of attack vectors – from Web application exploits to RansomWare. The impact of attacks can affect local …

Economic Value of IoT Data in Cyberphysical Supply Chains (EVIoT)

rachael Harnessing Economic Value, Safety and Security, Supply and Control Systems

EVIoT – Economic Value of IoT Data in Cyberphysical Supply Chains Team: Carsten Maple (Warwick University), Jan Godsell (Warwick University), Jim Smith (Warwick University), Jonathan Cave (Warwick University). Partners: Concentra, Costain, Pinsent Masons The coming of the 4th Industrial Revolution, is re-defining not only business models but the supply chains and networks required to support them. Whilst there can be intrinsic value in …

IoT in Control

adrian Infrastructure, Safety and Security, Standards, Governance and Policy, Supply and Control Systems

IoTinControl – Secure IoT Control Systems Team: Jeremy Watson (University College London), Awais Rashid (University of Lancaster), Carsten Maple (University of Warwick). Partners: BRE, Cube group, CESG This project will explore the vulnerabilities that exist in industrial (PLC and SCADA) and building control (BMS) systems. These are believed to arise from technical and behavioural causes. The work will collect thumbnail …