{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:09:41Z","timestamp":1772910581768,"version":"3.50.1"},"reference-count":83,"publisher":"MDPI AG","issue":"18","license":[{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["952644"],"award-info":[{"award-number":["952644"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT infrastructures. As such, the solution proposed in this paper is envisioned to deal with the whole supply chain system components, from the IoT ecosystem to the infrastructure connecting them, addressing security and privacy functionalities related to risks and vulnerabilities management, accountability, and mitigation strategies, as well as security metrics and evidence-based security assurance. In this paper, we present FISHY as a preliminary architecture that is designed to orchestrate existing and beyond state-of-the-art security appliances in composed ICT scenarios. To this end, the FISHY architecture leverages the capabilities of programmable networks and IT infrastructure through seamless orchestration and instantiation of novel security services, both in real-time and proactively. The paper also includes a thorough business analysis to go far beyond the technical benefits of a potential FISHY adoption, as well as three real-world use cases highlighting the envisioned benefits of a potential FISHY adoption.<\/jats:p>","DOI":"10.3390\/s21186057","type":"journal-article","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T21:36:58Z","timestamp":1631223418000},"page":"6057","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4755-556X","authenticated-orcid":false,"given":"Xavi","family":"Masip-Bruin","sequence":"first","affiliation":[{"name":"CRAAX Lab, Universitat Polit\u00e8cnica de Catalunya, 08800 Vilanova i la Geltr\u00fa, Spain"}]},{"given":"Eva","family":"Mar\u00edn-Tordera","sequence":"additional","affiliation":[{"name":"CRAAX Lab, Universitat Polit\u00e8cnica de Catalunya, 08800 Vilanova i la Geltr\u00fa, Spain"}]},{"given":"Jos\u00e9","family":"Ruiz","sequence":"additional","affiliation":[{"name":"ATOS Research and Innovation, 28037 Madrid, Spain"}]},{"given":"Admela","family":"Jukan","sequence":"additional","affiliation":[{"name":"Communications Network Group, Technische Universit\u00e4t Braunschweig, 38106 Braunschweig, Germany"}]},{"given":"Panagiotis","family":"Trakadas","sequence":"additional","affiliation":[{"name":"Sinelixis S.A., 14343 Athens, Greece"}]},{"given":"Ales","family":"Cernivec","sequence":"additional","affiliation":[{"name":"XLAB d.o.o., SI-1000 Ljubljana, Slovenia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5669-9338","authenticated-orcid":false,"given":"Antonio","family":"Lioy","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, 10129 Torino, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8326-2000","authenticated-orcid":false,"given":"Diego","family":"L\u00f3pez","sequence":"additional","affiliation":[{"name":"Telef\u00f3nica Investigaci\u00f3n y Desarrollo, 28050 Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5389-3285","authenticated-orcid":false,"given":"Henrique","family":"Santos","sequence":"additional","affiliation":[{"name":"Centro ALGORITMI, Universidade do Minho, 4800-058 Guimaraes, Portugal"}]},{"given":"Antonis","family":"Gonos","sequence":"additional","affiliation":[{"name":"Optimum S.A. Information Technology, 17674 Kallithea, Greece"}]},{"given":"Ana","family":"Silva","sequence":"additional","affiliation":[{"name":"Sonae MC Servi\u00e7os Partilhados S.A., 4470-177 Maia, Portugal"}]},{"given":"Jos\u00e9","family":"Soriano","sequence":"additional","affiliation":[{"name":"Capgemini Engineering, 08005 Barcelona, Spain"}]},{"given":"Grigorios","family":"Kalogiannis","sequence":"additional","affiliation":[{"name":"Sphynx Technology Solutions AG, 6300 Zug, Switzerland"}]}],"member":"1968","published-online":{"date-parts":[[2021,9,9]]},"reference":[{"key":"ref_1","unstructured":"(2021, April 16). Available online: https:\/\/www.thesslstore.com\/blog\/the-rise-of-cyber-resilience\/."},{"key":"ref_2","unstructured":"Ross, R., Graubart, R., Bodeau, D., and McQuaid, R. (2018). Systems Security Engineering: Cyberresiliency Considerations for the Engineering of Trustworthy Secure Systems."},{"key":"ref_3","unstructured":"(2021, April 16). WannaCry Ransomware Attack. Available online: https:\/\/en.wikipedia.org\/wiki\/WannaCry_ransomware_attack."},{"key":"ref_4","unstructured":"(2021, April 16). Accenture \u201cExploring Consumers\u201d Digital Trust. Available online: https:\/\/www.accenture.com\/us-en\/insight-accenture-health-2017-consumer-survey."},{"key":"ref_5","unstructured":"Orrey, K. (2010). Cyber Attack: Exploiting the User\u2014There Are So Many Ways! MSc Computer Security and Forensics. [Ph.D. Thesis, University of Bedfordshire]."},{"key":"ref_6","unstructured":"(2013, February 15). From the Puget Sound Business Journal. 3:00 am PST, Boeing 787 Battery Lags behind Evolving Lithium-Ion Technology. Available online: http:\/\/www.bizjournals.com\/seattle\/print-edition\/2013\/02\/15\/lithium-ion-battery-technology-has.html."},{"key":"ref_7","first-page":"51","article-title":"Supply Chain Cyber Security\u2014Potential Threats","volume":"29","author":"Urciuoli","year":"2013","journal-title":"Inf. Secur. Int. J."},{"key":"ref_8","unstructured":"(2021, April 16). Development of a Strategic Roadmap towards a Large Scale Demonstration Project in European Logistics and Supply Chain Security, LOGSEC Deliverable. Available online: www.logsec.org\/images\/upload\/file\/docs_logsec-roadmap-finalpublic.pdf."},{"key":"ref_9","unstructured":"(2021, April 16). Available online: https:\/\/www.appknox.com\/resources#0."},{"key":"ref_10","unstructured":"(2021, April 16). Symantec, The Cyber Resilience Blueprint: A New Perspective on Security, While Paper. Available online: https:\/\/www.ten-inc.com\/presentations\/Symantec-The-Cyber-Resilience-Blueprint.pdf."},{"key":"ref_11","unstructured":"(2021, April 16). Gemalto, Breach Level Index 2017\u2014H1 Report. Available online: https:\/\/www6.thalesgroup.com\/breach-level-index-2017-csoonline-in."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Hamlen, K.W. (2013, January 4\u20137). Stealthy Software: Next-generation Cyber-attacks and Defenses. Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, Seattle, WA, USA.","DOI":"10.1109\/ISI.2013.6578797"},{"key":"ref_13","unstructured":"Independent IT Security Institute (2021, April 16). AVTest, Statistics Report. Available online: https:\/\/www.av-test.org\/en\/statistics\/malware\/."},{"key":"ref_14","unstructured":"Monahan, D. (2021, April 16). EMA Report Summary: Achieving High-Fidelity Security. Available online: https:\/\/www.savvius.com\/wp-content\/uploads\/2017\/07\/EMA_Savvius_High_Fidelity_Security_2016.pdf."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Masip-Bruin, X., Ren, G., Serral-Gracia, R., and Yannuzzi, M. (2013, January 15\u201318). Unlocking the Value of Open Data with a Process-based Information Platform. Proceedings of the 2013 IEEE 15th Conference on Business Informatics, Vienna, Austria.","DOI":"10.1109\/CBI.2013.54"},{"key":"ref_16","unstructured":"Research Reveals Organizations (2021, April 16). Falling behind in Cybersecurity Analytics and Operations Despite Business Pressure to Improve, Businesswire. Available online: https:\/\/www.businesswire.com\/news\/home\/20170509005087\/en\/Research-Reveals-Organizations-Falling-Behind-in-Cybersecurity-Analytics-and-Operations-Despite-Business-Pressure-to-Improve."},{"key":"ref_17","unstructured":"(2021, April 16). Available online: https:\/\/www.gartner.com\/en\/newsroom."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Kahvazadeh, S., Barbosa, V., Masip-Bruin, X., Mar\u00edn-Tordera, E., Garcia, J., and Diaz, R. (2017, January 23\u201327). Securing combined Fog-to-Cloud System through SDN approach. Proceedings of the 4th Workshop on CrossCloud Infrastructures & Platforms, Belgrade, Serbia.","DOI":"10.1145\/3069383.3069385"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.ijcip.2018.05.006","article-title":"Standards on Cybersecurity Assessment of Smart Grid","volume":"22","author":"Leszczyna","year":"2018","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Scarfone, K., Souppaya, M., Cody, A., and Orebaugh, A. (2009). Special Publication 800-115 Technical Guide to Information Security Testing and Assessment: Recommendations of the National Institute of Standards and Technology, DIANE Publishing.","DOI":"10.6028\/NIST.SP.800-115"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3005714","article-title":"A Survey on Systems Security Metrics","volume":"49","author":"Pendleton","year":"2016","journal-title":"ACM Comput. Surv."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Yee, G.O.M. (2019, January 15\u201319). Designing Good Security Metrics. Proceedings of the 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, WI, USA.","DOI":"10.1109\/COMPSAC.2019.10270"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Wang, L., Jajodia, S., and Singhal, A. (2017). Network Security Metrics, Springer International Publishing.","DOI":"10.1007\/978-3-319-66505-4"},{"key":"ref_24","first-page":"141","article-title":"A New Approach to Quantify Network Security by Ranking of Security Metrics and Considering Their Relationships","volume":"20","author":"Behi","year":"2018","journal-title":"Int. J. Netw. Secur."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"12020","DOI":"10.1088\/1757-899X\/550\/1\/012020","article-title":"Measuring effectiveness of control of information security management system based on SNI ISO\/IEC 27004: 2013 standard","volume":"Volume 550","author":"Aldya","year":"2019","journal-title":"IOP Conference Series: Materials Science and Engineering"},{"key":"ref_26","first-page":"108","article-title":"Measuring information security: Understanding and selecting appropriate metrics","volume":"9","author":"Houngbo","year":"2015","journal-title":"Int. J. Comput. Sci. Secur."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Bhol, S.G., Mohanty, J.R., and Pattnaik, P.-K. (2020). Cybersecurity Metrics Evaluation Using Multi-criteria Decision-Making Approach. Smart Intelligent Computing and Applications. Smart Innovation, Systems and Technologies, Springer Nature.","DOI":"10.1007\/978-981-32-9690-9_71"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Craven, R., Lobo, J., Lupu, E., Russo, A., and Sloman, M. (2009, January 9). Security policy refinement using data integration: A position paper. Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, Chicago, IL, USA.","DOI":"10.1145\/1655062.1655068"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s10922-007-9063-z","article-title":"Implementation of a Formal Security Policy Refinement Process in WBEM Architecture","volume":"15","author":"Laborde","year":"2007","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1016\/j.comnet.2011.09.014","article-title":"A Survey on Policy Languages in Network and Security Management","volume":"56","author":"Han","year":"2012","journal-title":"Comput. Netw."},{"key":"ref_31","unstructured":"(2021, April 16). Available online: https:\/\/www.snort.org\/."},{"key":"ref_32","unstructured":"(2021, April 16). Available online: https:\/\/suricata-ids.org\/."},{"key":"ref_33","unstructured":"(2021, April 16). Available online: http:\/\/www.trustedcomputinggroup.org\/."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Cesena, E., Ramunno, G., Sassu, R., Vernizzi, D., and Lioy, A. (2011, January 17). On scalability of remote attestation. Proceedings of the Sixth ACM Workshop on Scalable Trusted Computing, Chicago, IL USA.","DOI":"10.1145\/2046582.2046588"},{"key":"ref_35","unstructured":"Sailer, R., Zhang, X., Jaeger, T., and van Doorn, L. (2004, January 9\u201313). Design and implementation of a TCG-based integrity measurement architecture. Proceedings of the 13th Conference on USENIX Security Symposium, San Diego, CA, USA."},{"key":"ref_36","unstructured":"Rescorla, E. (2021, April 16). The Transport Layer Security (TLS) Protocol Version 1.3. RFC8446. Available online: https:\/\/datatracker.ietf.org\/doc\/html\/rfc8446."},{"key":"ref_37","unstructured":"Frankel, S., and Krishnan, S. (2021, April 16). IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap, RFC6071. Available online: https:\/\/tools.ietf.org\/html\/rfc6071."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1109\/JIOT.2017.2703088","article-title":"Mutual Authentication in IoT Systems using Physical Unclonable Functions","volume":"4","author":"Aman","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1007\/s11235-017-0345-9","article-title":"Security in Internet of Things: Issues, challenges, taxonomy, and architecture","volume":"67","author":"Adat","year":"2018","journal-title":"Telecommun. Syst."},{"key":"ref_40","unstructured":"(2021, April 16). Available online: https:\/\/www.bro.org\/."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"3799","DOI":"10.1016\/j.ins.2007.03.025","article-title":"A hybrid machine learning approach to network anomaly detection","volume":"177","author":"Shon","year":"2007","journal-title":"Inf. Sci."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Livadas, C., Walsh, R., Lapsley, D., and Strayer, W.T. (2006, January 14\u201316). Using Machine Learning Techniques to Identify Botnet Traffic. Proceedings of the 2006 31st Conference on Local Computer Networks, Tampa, FL, USA.","DOI":"10.1109\/LCN.2006.322210"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"206942","DOI":"10.1109\/ACCESS.2020.3037093","article-title":"An IIoT based ICS to improve safety through fast and accurate hazard detection and differentiation","volume":"8","author":"Moradbeikie","year":"2020","journal-title":"IEEE Access"},{"key":"ref_44","first-page":"593","article-title":"Incidents Information Sharing Platform for Distributed Attack Detection","volume":"1","author":"Fotiadou","year":"2020","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Lagutin, D., Bellesini, F., Bragatto, T., Cavadenti, A., Croce, V., Kortesniemi, Y., Leligou, H.C., Oikonomidis, Y., Polyzos, G.C., and Raveduto, G. (2019, January 18\u201321). Secure open federation of IoT platforms through interledger technologies-the SOFIE approach. Proceedings of the European Conference on Networks and Communications (EuCNC), Valencia, Spain.","DOI":"10.1109\/EuCNC.2019.8802017"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MIS.2017.18","article-title":"Redecentralizing the Web with Distributed Ledgers","volume":"32","author":"Simperl","year":"2017","journal-title":"IEEE Intell. Syst."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MSP.2018.3111247","article-title":"A First Look at Identity Management Schemes on the Blockchain","volume":"16","author":"Dunphy","year":"2018","journal-title":"IEEE Secur. Priv."},{"key":"ref_48","unstructured":"Larchev\u00eaque, E. (2021, April 16). Bitcoin Address Authentication Protocol (Bitid). Available online: https:\/\/github.com\/bitid\/bitid\/blob\/master\/BIP_draft."},{"key":"ref_49","unstructured":"(2021, April 16). What Is Openid, Openid. Available online: http:\/\/openid.net\/get-an-openid\/what-is-openid\/."},{"key":"ref_50","unstructured":"Kraft, D. (2021, April 16). Nameid: Your Crypto-Openid. Available online: https:\/\/nameid.org\/."},{"key":"ref_51","unstructured":"Lundkvist, C., Heck, R., Torestensson, J., Mitton, Z., and Sena, M. (2021, April 16). Uport: A Platform for Self-Sovereign Identity. Technical Report. Available online: http:\/\/whitepaper.uport.me\/uPort_whitepaper_DRAFT20161020.pdf."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1007\/s10922-007-9083-8","article-title":"Policy-based management: A historical perspective","volume":"15","author":"Raouf","year":"2007","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_53","unstructured":"Walker, J., and Kulkarni, A. (2021, April 16). Common Open Policy Service (COPS) over Transport Layer Security (TLS), RFC4261. Available online: https:\/\/datatracker.ietf.org\/doc\/rfc4261\/."},{"key":"ref_54","unstructured":"Enns, R., Bjorklund, M., Schoenwaelder, J., and Bierman, A. (2021, April 16). NETCONF Configuration Protocol, RFC6241. Available online: https:\/\/datatracker.ietf.org\/doc\/rfc6241\/."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Bjorklund, M. (2010). YANG\u2014A Data Modeling Language for the Network Configuration Protocol (NETCONF), IETF.","DOI":"10.17487\/rfc6020"},{"key":"ref_56","unstructured":"OpenDaylight (2021, April 16). Network Intent Composition:Main. Available online: https:\/\/wiki.opendaylight.org\/view\/Network_Intent_Composition:Main."},{"key":"ref_57","unstructured":"Open Networking Foundation (2021, January 08). Project Boulder: Intent Northbound Interface (NBI). Available online: https:\/\/github.com\/OpenNetworkingFoundation\/BOULDER-Intent-NBI."},{"key":"ref_58","unstructured":"Berde, P., Gerola, M., Hart, J., Higuchi, Y., Kobayashi, M., Koide, T., Lantz, B., O\u2019Connor, B., Radoslavov, P., and Snow, W. (2014, January 22). ONOS: Towards an open, distributed SDN OS. Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, New York, NY, USA."},{"key":"ref_59","unstructured":"The OpenDaylight Project, Inc (2021, April 16). Available online: https:\/\/www.opendaylight.org."},{"key":"ref_60","unstructured":"Ibnemo (2021, April 16). About Ibnemo. Available online: https:\/\/www.ietf.org\/mailman\/listinfo\/ibnemo."},{"key":"ref_61","unstructured":"OpenDaylight (2021, April 16). NEMO:Main. Available online: https:\/\/wiki.opendaylight.org\/view\/NEMO:Main."},{"key":"ref_62","unstructured":"Hares, S. (2021, April 16). Intent-Based Nemo Overview, IETF Internet-Draft Draft-Hares-Ibnemo-Overview-01. Available online: https:\/\/datatracker.ietf.org\/doc\/html\/draft-hares-ibnemo-overview-00."},{"key":"ref_63","unstructured":"Xia, Y., Jiang, S., Zhou, T., Hares, S., and Zhang, Y. (2021, April 16). NEMO (NEtwork MOdeling) Language, Internet Engineering Task Force, Internet-Draft Draft-Xia-Sdnrg-Nemo-Language-04. Available online: https:\/\/datatracker.ietf.org\/doc\/html\/draft-xia-sdnrg-nemo-language-04."},{"key":"ref_64","unstructured":"Prakash, C., Lee, J., Turner, Y., Kang, J.M., Akella, A., Banerjee, S., Clark, C., Ma, Y., Sharma, P., and Zhang, Y. (2015, January 17). Pga: Using graphs to express and automatically reconcile network policies. Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, New York, NY, USA."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Trakadas, P., Simoens, P., Gkonis, P., Sarakis, L., Angelopoulos, A., Ramallo-Gonz\u00e1lez, A.P., Skarmeta, A., Trochoutsos, C., Calv\u03bf, D., and Pariente, T. (2020). An Artificial Intelligence-Based Collaboration Approach in Industrial IoT Manufacturing: Key Concepts, Architectural Extensions and Potential Applications Sensors. Sensors, 20.","DOI":"10.3390\/s20195480"},{"key":"ref_66","unstructured":"Kephart, J.O., and Chess, D.M. (2021, April 16). The Vision of Autonomic Computing. Available online: http:\/\/ieeexplore.ieee.org\/document\/1160055\/."},{"key":"ref_67","unstructured":"(2021, April 16). A White Paper by 5GPPP Network Management & Quality of Service Working Group. Cognitive Network Management for 5G. Available online: https:\/\/5g-ppp.eu\/wp-content\/uploads\/2017\/03\/NetworkManagement_WhitePaper_1.pdf."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Abdelkhalek, O., Krichen, S., Guitouni, A., and Mitrovic-Minic, S. (2011, January 26\u201328). A genetic algorithm for a multi-objective nodes placement problem in heterogeneous network infrastructure for surveillance applications. Proceedings of the 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), Toulouse, France.","DOI":"10.1109\/WMNC.2011.6097214"},{"key":"ref_69","unstructured":"(2021, April 16). Microsoft Language Understanding (LUIS). Available online: https:\/\/www.luis.ai\/home."},{"key":"ref_70","unstructured":"(2021, April 16). Facebook Wit.ai. Available online: https:\/\/wit.ai\/."},{"key":"ref_71","unstructured":"(2021, April 16). Google Api.ai. Available online: https:\/\/dialogflow.com."},{"key":"ref_72","unstructured":"(2021, April 16). IBM Watson. Available online: https:\/\/www.ibm.com\/watson."},{"key":"ref_73","unstructured":"L\u00f3pez, D., L\u00f3pez, E., Dunbar, L., Strassner, J., and Kumar, R. (2021, April 16). Framework for Interface to Network Security Functions, RFC8329. Available online: https:\/\/www.rfc-editor.org\/rfc\/rfc8329.html."},{"key":"ref_74","unstructured":"(2021, April 16). W3AF. Open Source Web Application Security Scanner. Available online: https:\/\/w3af.org\/."},{"key":"ref_75","unstructured":"Wazuh (2021, April 16). The Open Source Security Platform. Available online: https:\/\/wazuh.com\/."},{"key":"ref_76","unstructured":"Atos Research and Innovation (2021, April 16). XL-SIEM. Available online: https:\/\/booklet.atosresearch.eu\/xl-siem."},{"key":"ref_77","unstructured":"Atos Research and Innovation (2021, April 16). Smart Security: Cybersecurity, Identity and Privacy. Available online: https:\/\/booklet.atosresearch.eu\/sites\/booklet.atosresearch.eu\/files\/public\/content-files\/page\/2020\/2020_ARI_Smart_Security_thematic%20offering_v1.0.pdf."},{"key":"ref_78","unstructured":"Miquel, M., Mar\u00edn-Tordera, E., Masip-Bruin, X., S\u00e1nchez-L\u00f3pez, S., and Garc\u00eda, J. (2021). Implementing a Blockchain-Based Security System Applied to IoT, Springer Nature."},{"key":"ref_79","unstructured":"OVUM (2021, April 16). Trends to Watch: Cybersecurity. Available online: https:\/\/ovum.informa.com\/resources\/product-content\/2019-trends-to-watch-cybersecurity-int003-000295."},{"key":"ref_80","unstructured":"Analysys Mason (2021, April 16). Opportunities and Threats for Operators in the Edge Computing Value Chain. Available online: https:\/\/www.analysysmason.com\/Research\/Content\/Reports\/edge-computing-report-RMA16\/."},{"key":"ref_81","unstructured":"EY (2021, April 16). Global Information Security Survey (GISS). Available online: https:\/\/www.ey.com\/en_gl\/giss."},{"key":"ref_82","unstructured":"(2021, April 16). Scottish Government: Cyber Resilience Economic Opportunity: Key Actions 2018\u20132021. Available online: https:\/\/www.sae.org\/binaries\/content\/assets\/cm\/content\/topics\/cybersecurity\/securing_the_modern_vehicle.pdf."},{"key":"ref_83","unstructured":"(2021, April 16). Securing the Modern Vehicle: A Study of Automotive Industry Cybersecurity Practices, a Report Released by Synopsys and SAE International. Available online: https:\/\/safecarnews.com\/synopsys-and-sae-international-highlight-critical-cybersecurity-risks-in-a-new-study\/."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/18\/6057\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:59:59Z","timestamp":1760165999000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/18\/6057"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,9]]},"references-count":83,"journal-issue":{"issue":"18","published-online":{"date-parts":[[2021,9]]}},"alternative-id":["s21186057"],"URL":"https:\/\/doi.org\/10.3390\/s21186057","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,9]]}}}