Industrial Internet of Things Security for the Transportation Infrastructure
Abstract:
The transportation sector is evolving with the introduction of the Internet of Things (IoT) and Industrial Internet of Things (IIoT). IIoT devices are used in the monitoring and control of industrial and related processes and have many useful applications in the transportation sector. This article provides a comparison between IoT and IIoT, and an overview of the threats, vulnerabilities, risks, and incidents related to their use in the transport infrastructure. A guideline for security standards, frameworks, and controls to govern and secure IoT and IIoT specific to transport infrastructure is proposed, with a focus on the rail and maritime sectors.
AUTHORS
School of Management, Information Technology and Governance University of KwaZulu-Natal Durban,
South Africa
Barend Pretorius joined Transnet in 2014 as a Senior Information Security Analyst and in 2017 was appointed as the Information Security Officer at Transnet Port Terminals. He holds a master’s degree in Information Systems and Technology and Bachelor of Science Honours degree in Statistics. He is also a Certified Information Security Manager.
University of KwaZulu-Natal Durban,
South Africa
Dr. Brett van Niekerk is a senior lecturer in information technology at the Durban University of Technology. He serves as chair for the International Federation of Information Processing Working Group on ICT in Peace and War, and is the co-Editor-in-Chief of the International Journal of Cyber Warfare and Terrorism. He has numerous years of information/cybersecurity experience in both academia and industry and has contributed to the ISO/IEC information security standards. In 2012, he graduated with his PhD focusing on information operations and critical infrastructure protection. He is also holds a MSC in electronic engineering and is CISM certified.
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive