Abstract
We chose to conclude this book with a look into the future of ICS cyber security. As best as we can see, much of this future unfolds in the context of the Internet of Things. In fact, we envision that all industrial and infrastructure environments, and cyber-physical systems in general, will take the form reminiscent of what today is referred to as the Internet of Things.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmad, A., Paul, A., Rathore, M. M., & Rho, S. (2015). Power aware mobility management of M2M for IoT communications. Mobile Information Systems, 501, 14.
Allen, J. (2005). Governing for enterprise security (CMU/SEI-2005-TN-023). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University.
Astrom, K. J., & Hagglund, T. (2001). The future of PID control. Control Engineering Practice, 9, 1163–1175.
Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805.
Azim, T., Neamtiu, I., & Marvel, L. (2014). Towards self-healing smartphone software via automated patching, Proceedings 29th IEEE/ACM International Conference Automated Software Eng. (ASE 14), (pp. 623–628), ACM
Bao, F., Chen, I., Chang, M., & Cho, J. (2011). Trust-based intrusion detection in wireless sensor networks. Proceedings 2011 IEEE International Conference Communications (ICC 11) (pp. 1–6). DOI: 10.1109/icc.2011.5963250.
Bennett, S. (1996). A brief history of automatic control. IEEE Control Systems, 96, 17–25.
Blowers, M. (2014). Know thy operator; Establishing ground truth in industrial control systems (ICS). Las Vegas, NV: BSIDES.
Castellani, A., Bui, N., Casari, P., Rossi, M., Shelby, Z., & Zorzi, M. (2010, March). Architecture and protocols for the Internet of Things: A case study. Pervasive Computing and Communications Workshops (PERCOM Workshops), 2010 8th IEEE International Conference on (pp. 678–683). IEEE.
Cavalcanti, A., Hogg, T., Shirinzadeh, B., & Liaw, H.C. (2006). Nanobot communication techniques: A comprehensive tutorial. International Conference Control, Automation, Robotics and Vision, ICCARV, 2006, Singapore.
Cavallaro, F. (2015). Changing minds: The first step to closing the manufacturing skills gap. EBN Online [Online]. Retrieved July 31, 2015, from http://www.ebnonline.com/author.asp?section_id=2171&doc_id=278288.
Charles, H. K., Jr. (2005). Miniaturized electronics. Johns Hopkins APL Technical Digest, 26(4), 402–413.
Chui, M., Loffler, M., & Roberts, R. (2010). The Internet of Things. McKinsey Quarterly, 2(2010), 1–9.
Da Xu, L., He, W., & Li, S. (2014). Internet of Things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.
Endress + Hauser. (2014). Brochure. EtherNet/IP: Leveraging instrument information to enterprise level. Reinach: Endress + Hauser.
Endsley, M. (2014). Integrating Humans & Autonomy [Online] March 2014. Retrieved September 1, 2015, from https://s3.amazonaws.com/edas.assets/cogsima2014/CogSIMA_2014_Endsley.pdf.
Forrest, C. (2015). Chinese factory replaces 90 % of humans with robots, production soars. Tech Republic [Online] July 30, 2015. Retrieved August 6, 2015, from http://www.techrepublic.com/article/chinese-factory-replaces-90-of-humans-with-robots-pr.
Gil, S., Kott, A., & Barabási, A.-L. (2014). A genetic epidemiology approach to cyber-security. Scientific Reports, 4, 5659.
Glickman, D. (2015). How cell phones can help end world hunger, National Geographic (June 10, 2015). Retrieved from http://news.nationalgeographic.com/2015/06/150610-hunger-nutrition-cell-phone-farming-agriculture-africa-world/.
Green, T. (2015). Schneier on ‘really bad’ IoT security: ‘It’s going to come crashing down’, Network World (April 13, 2015). Retrieved from http://www.networkworld.com/article/2909212/security0/schneier-on-really-bad-iot-security-it-s-going-to-come-crashing-down.html.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.
Heyer, C. (2010). Human-robot interaction and future industrial robotics applications. International Conference on Intelligent Robots and Systems, 18–22 October 2010 (pp. 4749–4754). IEEE/RSJ.
Higgins, K.T. (2015). Working with the next generation of plant pros. Food Processing [Online]. Retrieved July 31, 2015, from http://www.foodprocessing.com/articles/2015/next-generation-of-plant-pros/?show=all.
Hirukawa, H. (2015). Robotics for innovation. 2015 Symposium on VLSI Technology (VLSI Technology) (Vol. June).
Holdren, J. P., et al. (2012). A national strategic plan for advanced manufacturing (p. 2012). Washington, DC: US National Science and Technology Council.
Industrial Internet Consortium. (2015). Industrial Internet reference architecture (p. 2015). Needham, MA: Industrial Internet Consortium.
Jajodia, S., Ghosh, A., Swarup, V., Wang, C., & Wang, X. (2011). Moving target defense: Creating asymmetric uncertainty for cyber threats (Vol. 54). New York: Springer.
Joshi, P.C., et al. (2012). Direct digital additive manufacturing technologies: Path towards hybrid integration. Future of Instrumentation International Workshop (FIIW), 2012.
Karimi, K., & Atkinson, G. (2015). What Internet of Things needs to become a reality. EE Times July, 19.
Kennedy, S. (2015). Made in China 2025. Center for strategic and international studies [Online] June 2015. Retrieved August 11, 2015, from http://csis.org/publication/made-china-2025.
Kletz, T.A. (2009). Bhopal leaves a lasting legacy. Chemical Processing [Online] November 23, 2009. Retrieved August 28, 2015, from http://www.chemicalprocessing.com/articles/2009/238/?show=all.
Kott, A. (2014). Towards fundamental science of cyber security (Network Science and Cybersecurity, pp. 1–13). New York: Springer.
Kott, A., & Arnold, C. (2013). The promises and challenges of continuous monitoring and risk scoring. IEEE Security and Privacy, 11(1), 90–93.
Kott, A., Swami, A., & McDaniel, P. (2014a). Six potential game-changers in cyber security. Computer, 47(12), 104–106.
Kott, A., Wang, C., & Erbacher, R. F. (Eds.). (2014b). Cyber defense and situational awareness. New York: Springer.
Krueger, M., et al. (2014). A new era. ABB Review, 4, 70–75.
Matchar, E. (2015). With this self-healing concrete, buildings repair themselves. Smithsonian Magazine [Online] June 5, 2015. Retrieved July 22, 2015, from http://www.smithsonianmag.com/innovation/with-this-self-healing-concrete-buildings-repair-themselves-180955474/?no-ist.
McDonald, C. (2014). How the developments of standards will affect the Internet of Things, Computer Weekly.com (November 2014). Retrieved from http://www.computerweekly.com/feature/How-the-development-of-standards-will-affect-the-internet-of-things.
Meister, J.(2015). Fourth industrial revolution analyzed in new report [Online] May 5, 2015. Retrieved July 8, 2015, from http://www.pddnet.com/news/2015/05/fourth-industrial-revolution-analyzed-new-report.
Melchels, F. P. W., Domingos, M., Klein, T. J., Malda, J., & Bartolo, P. J. (2012). Additive manufacturing of tissues and organs. Progress in Polymer Science, 37(8), 1079–1104.
Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of Things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516.
Monostoria, L. (2014). Cyber-physical production systems: Roots, expectations and R&D challenges. The 47th CIRP Conference on Manufacturing Systems (Vol. 17, pp. 9–13).
Moore, D. A. (2006). Inherently safer technology in the context of chemical site security. Alexandria, VA: AcuTech. Testimony before the U.S. Senate Environment and Public Works Committee.
Murphy, R., & Shields, J. (2012). The role of autonomy in DoD systems. Federation of American Scientists [Online] 2012. Retrieved from http://fas.org/irp/agency/dod/dsb/autonomy.pdf.
NIST (2015). About Manufacturing.gov! Manufacturing.org [Online]. Retrieved August 21, 2015, from http://www.manufacturing.gov/about_adv_mfg.html.
Null, C. (2015). The state of IoT standards: Stand by for the big shakeout, TechBeacon (September 2, 2015). Retrieved from http://techbeacon.com/state-iot-standards-stand-big-shakeout.
Ownby, M., & Kott, A. (2006). Reading the mind of the enemy: predictive analysis and command effectiveness. CCRTS 2006.
Perera, C., Zaslavsky, A., Christen, P., & Georgakopoulos, D. (2014). Context aware computing for the Internet of Things: A survey. IEEE Communications Surveys and Tutorials, 16(1), 414–454.
Pinto, J. (2012). The Automation Internet of Things, Automation World (September 25, 2012). Retrieved from http://www.automationworld.com/sensors-discrete/automation-internet-things.
Pique, A., Mathews, S. A., Pratap, B., Auyeung, R. C. Y., & Karns, B. J. (2006). Embedding electronic circuits by laser direct-write. Microelectronic Engineering, 83, 2527–2533.
Press, G. (2014). Internet of Things by the numbers: Market estimates and forecasts. Forbes [Online] August 22, 2014. Retrieved July 22, 2015, from http://www.forbes.com/sites/gilpress/2014/08/22/internet-of-things-by-the-numbers-marke.
Requicha, A. A. G. (2003). Nanobots, NEMS, and nanoassembly. Proceedings of the IEEE, 91, 1922.
Rizzo, T. (2013). Wearable tech news (January 22, 2013). Retrieved from http://www.wearabletechworld.com/topics/from-the-experts/articles/323855-wearable-technology-next-mobility-market-booming.htm.
Schartel, M. (2015). Software architects in the IoT, Bosch ConnectedWorld Blog (11 March 2015). Retrieved from http://blog.bosch-si.com/categories/technology/2015/11/software-architects-iot/.
Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the IETF protocol suite for the Internet of Things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91–98.
Starr, K. (2015). Tuning in to customer controls. Westerville, OH: ABB Advanced Services.
The Economist, Editorial. The third industrial revolution. The Economist [Online] April 2012. Retrieved June 24, 2015, from http://www.economist.com/node/21553017/print.
Toth, A., et al. (2013). Coalition warfare program (CWP): Secure policy controlled information query and dissemination over a BICES network. In T. Pham et al. (Eds.), Ground/air multisensor interoperability, integration, and networking for persistent ISR IV. Baltimore, MD: SPIE Digital Library. http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=1691136.
Ukil, A., Sen, J., & Koilakonda, S. (2011, March). Embedded security for Internet of Things. Emerging Trends and Applications in Computer Science (NCETACS), 2011 2nd National Conference on (pp. 1–6). IEEE.
Vermesan, O., & Friess, P. (Eds.). (2013). Internet of Things: Converging technologies for smart environments and integrated ecosystems. Aalborg, Denmark: River Publishers. E-Book. ISBN 978-87-92982-96-4.
Want, R., Schilit, B. N., & Jenson, S. (2015). Enabling the Internet of Things. IEEE Computer Society, 1, 28–35.
Waring, J. (2014). Mobile World Live (October 16, 2014). Retrieved from http://www.mobileworldlive.com/featured-content/home-banner/connected-devices-to-hit-4-3-per-person-by-2020-report/.
Weiser, M. (1991). The computer of the 21st century, Special issue on communications, computers, and networks. Scientific American, 3(3), 3–11.
Westby, J.R. (2003). Information Security Governance: Toward a Framework for Action, Business Software Alliance. Retrieved from http://www.bsa.org/country/Research%20and%20Statistics/~/media/BD05BC8FF0F04CBD9D76460B4BED0E67.ashx.
Whitmore, A., Agarwal, A., & Da Xu, L. (2014). The Internet of Things—A survey of topics and trends. Information Systems Frontiers, 17(2), 261–274.
Williamson, M. (2015). 3D printing space exploration. Engineering and Technology, 10(2), 40–43.
Wu, D., Greer, M.J., Rosen, D.W., & Schaefer, D. (2013). Cloud manufacturing: Drivers, current status and future trends. ASME 2013 International Manufacturing Science and Engineering Conference, Madison, Wisconsin (Vols. MSEC2013-1106).
Young, S. (2015). The automation dilemma: Job shifts or eliminations? Argus Leader [Online] August 10, 2015. Retrieved August 15, 2015, from http://www.argusleader.com/story/news/2015/08/10/automation-dilemma-job-shifts-eliminations/31441.
Zorzi, M., Gluhak, A., Lange, S., & Bassi, A. (2010). From today’s intranet of things to a future Internet of things: a wireless-and mobility-related view. IEEE Wireless Communications, 17(6), 44–51.
Zuehlke, D. (2010). SmartFactory—Towards a factory-of-things. Annual Reviews in Control, 34, 129–138. doi:10.1016/j.arcontrol.2010.02.008.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Blowers, M., Iribarne, J., Colbert, E.J.M., Kott, A. (2016). In Conclusion: The Future Internet of Things and Security of Its Control Systems. In: Colbert, E., Kott, A. (eds) Cyber-security of SCADA and Other Industrial Control Systems. Advances in Information Security, vol 66. Springer, Cham. https://doi.org/10.1007/978-3-319-32125-7_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-32125-7_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32123-3
Online ISBN: 978-3-319-32125-7
eBook Packages: Computer ScienceComputer Science (R0)