On the Security Implications of Disruptive Technologies
This paper summarizes the results of a study that explored the security implications of the use of “disruptive technologies” in various economic sectors. Robust evidence of the security challenges associated with deploying advanced technologies was gathered by bringing together internationally-renowned experts with firsthand experience involving major case studies. Policy recommendations in the context of the European i2010 strategy were also articulated. This paper focuses on three technologies: Voice over Internet Protocol (VoIP), Radio Frequency Identification (RFID) and Internet Protocol version 6 (IPv6). It examines the security challenges related to the three technologies, and analyzes security issues that apply more generally to disruptive technologies.
Keywords: Disruptive technologies, security implications, VoIP, RFID, IPv6
KeywordsSupply Chain Internet Protocol Voice Over Internet Protocol Security Challenge Disruptive Technology
- Airbus, Airbus applies RFID technology to supply of aircraft spare parts (www. airbus. com/en/presscentre/pressreleases/pressreleases items/09 18 03 RFID technology. html), 2003.
- Airbus, Airbus corporate website (www.airbus. com), 2007.
- T. Alves and D. Feldon, TrustZone: Integrated hardware and software se- curity, White Paper, ARM, Cambridge, United Kingdom, 2004.Google Scholar
- J. Baird, DREN IPv6 pilot network for HPC users, presented at the Super-computing 2004 Conference, 2004.Google Scholar
- J. Bower and C. Christensen, Disruptive technologies: Catching the wave, Harvard Business Review, vol. 73(1), pp. 43-53, 1995.Google Scholar
- C. Christensen, The Innovator’s Dilemma, Harvard Business School Press, Boston, Massachusetts, 1997.Google Scholar
- C. Christiansen and M. Overdorf, Meeting the challenge of disruptive change, Harvard Business Review, vol. 78(2), pp. 67-76, 2000.Google Scholar
- Department of Defense, Defense research and engineering network definition (www. hpcmo. hpc. mil/Htdocs/DREN/dren-def. html, 2004.
- ECMA International, QSIG home page (www. ecma-international. org/ activities/Communications/QSIG page. htm, 2006.
- European Commission, i2010: A European Information Society for Growth and Employment, Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions, COM(2005) 229 Fi-nal, Brussels, Belgium (europa. eu. int/eur-lex/lex/LexUriServ/site/en/ com/2005/com2005 0229en01. pdf ), 2005.Google Scholar
- Federal Aviation Administration, Policy for passive-only radio frequency identification devices, U. S. Department of Transportation, Washington, DC (www.airweb. faa. gov/Regulatory and Guidance Library/rgPolicy. nsf/ 0/495367dd1bd773e18625715400718e2e?OpenDocument), 2005.
- Foresight Programme, Cyber Trust and Crime Prevention Project (www.foresight. gov. uk/previous projects/cyber trust and crime prevention/index.html), 2005.
- P. Gabriel, RFID consultation website: Towards an RFID policy for Europe, 2007.Google Scholar
- L. Heinz, TransPlant: Helping organizations to make the transition, News @ SEI, vol. 4(4), Software Engineering Institute, Carnegie Mel- lon University, Pittsburgh, Pennsylvania,(www.sei.cmu.edu/news-at-sei/ features/2001/4q01/feature-4-4q01.htm) 2001.Google Scholar
- M. Hines, Worried about Wi-Fi security, 2005.Google Scholar
- HSBCHoldings, IT strategy (www.hsbc. com/1/PA 1 1 S5/content/assets/ investor relations/HSBC Investor day 6. pdf ), 2003.
- Logica CMG, Case study: Airbus takes RFID into the spare parts supply, 2005.Google Scholar
- J. Schumpeter, Creative destruction, in Capitalism, Socialism and Democ- racy, Harper, New York, pp. 82-85, 1975.Google Scholar