Security Evaluation Framework for Military IoT Devices

Sungyong Cha, Seungsoo Baek, Sooyoung Kang, Seungjoo Kim

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)


IoT is gaining importance in our lives and in the military too. With the application of IoT paradigm in the military and the weapon system's connectivity to the network, this facilitates the commanders to make real-time decisions. However, cybersecurity threats to weapon systems intensify along with the growing of IoT's benefits. Coping with these cybersecurity threats nowadays, we require the implementation of "security by design" concept during weapon system development throughout the system lifecycle, but not traditional security solutions. Since only developed countries are capable of developing systems on their own, they adopt "security by design" when developing new weapon systems; another approach to acquire weapon systems is through import if a country cannot develop the whole weapon system. However, few studies have been done on the security evaluation framework that could be used upon purchase and integration of the developed weapon system. In this paper, we proposed a novel security evaluation framework that could be used to integrate IoT devices and components into the weapon system and a method to address cybersecurity requirements using international standard security control.

Original languageEnglish
Article number6135845
JournalSecurity and Communication Networks
Publication statusPublished - 2018

Bibliographical note

Funding Information:
This research was supported by the MSIT (Ministry of Science, ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2018-2015-0-00403) supervised by the IITP (Institute for Information & Communications Technology Promotion).

Publisher Copyright:
© 2018 Sungyong Cha et al.

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications


Dive into the research topics of 'Security Evaluation Framework for Military IoT Devices'. Together they form a unique fingerprint.

Cite this