Advertisement

On the Security Implications of Disruptive Technologies

  • Neil Robinson
  • Lorenzo Valeri
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 253)

This paper summarizes the results of a study that explored the security implications of the use of “disruptive technologies” in various economic sectors. Robust evidence of the security challenges associated with deploying advanced technologies was gathered by bringing together internationally-renowned experts with firsthand experience involving major case studies. Policy recommendations in the context of the European i2010 strategy were also articulated. This paper focuses on three technologies: Voice over Internet Protocol (VoIP), Radio Frequency Identification (RFID) and Internet Protocol version 6 (IPv6). It examines the security challenges related to the three technologies, and analyzes security issues that apply more generally to disruptive technologies.

Keywords: Disruptive technologies, security implications, VoIP, RFID, IPv6

Keywords

Supply Chain Internet Protocol Voice Over Internet Protocol Security Challenge Disruptive Technology 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Airbus, Airbus applies RFID technology to supply of aircraft spare parts (www. airbus. com/en/presscentre/pressreleases/pressreleases items/09 18 03 RFID technology. html), 2003.
  2. Airbus, Airbus corporate website (www.airbus. com), 2007.
  3. [3]
    T. Alves and D. Feldon, TrustZone: Integrated hardware and software se- curity, White Paper, ARM, Cambridge, United Kingdom, 2004.Google Scholar
  4. [4]
    J. Baird, DREN IPv6 pilot network for HPC users, presented at the Super-computing 2004 Conference, 2004.Google Scholar
  5. [5]
    J. Bower and C. Christensen, Disruptive technologies: Catching the wave, Harvard Business Review, vol. 73(1), pp. 43-53, 1995.Google Scholar
  6. [6]
    C. Christensen, The Innovator’s Dilemma, Harvard Business School Press, Boston, Massachusetts, 1997.Google Scholar
  7. [7]
    C. Christiansen and M. Overdorf, Meeting the challenge of disruptive change, Harvard Business Review, vol. 78(2), pp. 67-76, 2000.Google Scholar
  8. Department of Defense, Defense research and engineering network definition (www. hpcmo. hpc. mil/Htdocs/DREN/dren-def. html, 2004.
  9. European Commission, i2010: A European Information Society for Growth and Employment, Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions, COM(2005) 229 Fi-nal, Brussels, Belgium (europa. eu. int/eur-lex/lex/LexUriServ/site/en/ com/2005/com2005 0229en01. pdf ), 2005.Google Scholar
  10. Federal Aviation Administration, Policy for passive-only radio frequency identification devices, U. S. Department of Transportation, Washington, DC (www.airweb. faa. gov/Regulatory and Guidance Library/rgPolicy. nsf/ 0/495367dd1bd773e18625715400718e2e?OpenDocument), 2005.
  11. Foresight Programme, Cyber Trust and Crime Prevention Project (www.foresight. gov. uk/previous projects/cyber trust and crime prevention/index.html), 2005.
  12. [13]
    P. Gabriel, RFID consultation website: Towards an RFID policy for Europe, 2007.Google Scholar
  13. [14]
    M. Handley, Why the Internet only just works, BT Technology Journal, vol. 24(3), pp. 119-129, 2006.CrossRefGoogle Scholar
  14. [15]
    L. Heinz, TransPlant: Helping organizations to make the transition, News @ SEI, vol. 4(4), Software Engineering Institute, Carnegie Mel- lon University, Pittsburgh, Pennsylvania,(www.sei.cmu.edu/news-at-sei/ features/2001/4q01/feature-4-4q01.htm) 2001.Google Scholar
  15. [16]
    M. Hines, Worried about Wi-Fi security, 2005.Google Scholar
  16. [18]
    Logica CMG, Case study: Airbus takes RFID into the spare parts supply, 2005.Google Scholar
  17. [19]
    J. Schumpeter, Creative destruction, in Capitalism, Socialism and Democ- racy, Harper, New York, pp. 82-85, 1975.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Neil Robinson
    • 1
  • Lorenzo Valeri
    • 1
  1. 1.RANDEuropeUK

Personalised recommendations