Research Article

Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process

Table 1

Criteria and descriptions of ICS security requirements.

ā€‰Hierarchy IHierarchy II
CriteriaDescriptionCriteriaDescription

ICS security requirementsNetwork robustnessRequire network robustness against external cyberattacks or internal abnormal behaviorFuzzing testRequire handling capability to sustain the ICS service when receiving abnormal network packet
Stress testRequire providing ICS service even when overloading the network traffic
Resource availabilityRequire resource management procedures, such as backup and recovery, so that resources can perform their normal functions
Service continuityRequire stable and continuous servicePhysical interface protectionRequire resource management procedures, such as backup and recovery, so that resources can perform their normal functions
Event responseRequire checking the status of devices, systems, and networks in real-time and responding to failures
Security functionsRequire security features such as component identification, authentication, and access controlSecurity auditRequire security audits through creating and encrypting audit-logs for major events
Identification, authentication, and access controlRequire separation or restriction about identification and access authority of devices/users with a user authentication procedure
Data protectionRequire confidentiality and integrity of sensitive transmission or stored data
Security functions managementRequire network and security settings of the control software, secure encryption algorithms, and key management
State managementRequire state management such as integrity verification of the execution code, normal operation test, and vulnerability response