Rethinking Digital Architectures
Rethinking Digital Architectures
RETHINKING DIGITAL
ARCHITECTURES TO
SAFEGUARD THE NEXT
REPORT
GENERATION FROM
CYBERSECURITY BREACHES
Authored by
Vikas Malhotra
Founder & CEO, WOPLLI Technologies
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
Chair - Cyber Security for Next Generation Connectivity Systems at IEEE
Authored by
Vikas Malhotra
Founder & CEO, WOPLLI Technologies
Chair – IEEE Cyber Security for Next Generation Connectivity Systems group
Co-Chair – Artificial Intelligence and Metaverse taskforce at Trust over IP foundation
Keeper L. Sharkey
Vice Chair – Sub-Committee for Quantum computing at IEEE Cyber Security for Next Generation Connectivity
Systems group
Founder and CEO, ODE, L3C and Chair for Quantum Applied Chemistry at Quantum Security Alliance (QSA)
Deepayan Chanda
Principal Cybersecurity Architect – Strategy, Design and Governance (Lab49)
Board of Advisor (Binalyze, FlexibleIR), Advisor to Woplli Technologies
Chair – Sub-Committee for Webx.0 in IEEE Cyber Security for Next Generation Connectivity Systems
Albert H. Carlson
Chair for Entropy and Encryption, Quantum Security Alliance (QSA) & Associate Professor, Austin Community
College
Mark Lizar
CEO and Principal Engineer @ Zero Public Network
Vice Chair – Sub-Committee for Human Centricity & Control at IEEE Cyber Security for Next Generation Connectivity
Systems group
Flow Editor and Co-Author of the Notice Record Specification for Operational Security and Privacy Trans-border
Editor of the Consent Receipt Specification (now at ISO/IEC 27560)
Pamela Gupta
CEO Co-President OutSecure, Inc.
Co-Chair NIST GCTC Smart Secure Communities Cybersecurity & Privacy
Chair – Sub Committee for AI & Autonomous Systems at IEEE Cybersecurity for Next Generation Connectivity
Systems group
Michael A. Enright
CEO/President of Quantum Dimension, Inc.
Chair – IEEE SA Sub-Committee Chair for 5G/6G of Cyber Security for Next Generation Connectivity Systems
Secretary – IEEE SA P3120 Standard for Quantum Computing Architecture Working Group
Member – IEEE ComSoc Future Networks Initiative in Security Working Group
Member – Cloud Security Alliance Zero Trust Working Group
Alex Polyakov
Co-Founder, CEO, Adversa AI.
Member, Forbes Technology Council
Chair – Sub-Committee for Heterogeneous control applications at IEEE Cyber Security for Next Generation
Connectivity Systems group
Debbie Reynolds
CEO and Chief Data Privacy Officer of Debbie Reynolds Consulting LLC
Chair – IEEE Sub Committee Chair for Human Centricity & Control at IEEE Cyber Security for Next Generation
Connectivity Systems group.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
TRADEMARKS AND DISCLAIMERS
IEEE believes the information in this publication is accurate as of its publication date; such information is subject to change
without notice. IEEE is not responsible for any inadvertent errors.
The ideas and proposals in this specification are the respective author’s views and do not represent the views of the affiliated
organization.
ACKNOWLEDGMENTS
Special thanks are given to the following reviewers of this paper:
The Institute of Electrical and Electronics Engineers, Inc. 3 Park Avenue, New York, NY 10016-5997, USA
All rights reserved. 4 November 2022. Printed in the United States of America.
IEEE is a registered trademark in the U. S. Patent & Trademark Office, owned by The Institute of Electrical and Electronics Engineers,
Incorporated. All other trademarks are the property of the respective trademark owners.
IEEE prohibits discrimination, harassment, and bullying. For more information, visit
http://www.ieee.org/web/aboutus/whatis/policies/p9-26.html.
No part of this publication may be reproduced in any form, in an electronic retrieval system, or otherwise, without the prior written
permission of the publisher.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
NOTICE AND DISCLAIMER OF LIABILITY CONCERNING THE USE
OF IEEE SA INDUSTRY CONNECTIONS DOCUMENTS
This IEEE Standards Association (“IEEE SA”) Industry Connections publication (“Work”) is not a consensus standard document.
Specifically, this document is NOT AN IEEE STANDARD. Information contained in this Work has been created by, or obtained
from, sources believed to be reliable, and reviewed by members of the IEEE SA Industry Connections activity that produced
this Work. IEEE and the IEEE SA Industry Connections activity members expressly disclaim all warranties (express, implied,
and statutory) related to this Work, including, but not limited to, the warranties of: merchantability; fitness for a particular
purpose; non-infringement; quality, accuracy, effectiveness, currency, or completeness of the Work or content within the
Work. In addition, IEEE and the IEEE SA Industry Connections activity members disclaim all conditions relating to: results; and
workmanlike effort. This IEEE SA Industry Connections document is supplied “AS IS” and “WITH ALL FAULTS.”
Although the IEEE SA Industry Connections activity members who have created this Work believe that the information and
guidance given in this Work serve as an enhancement to users, all persons must rely upon their own skill and judgment when
making use of it. IN NO EVENT SHALL IEEE OR IEEE SA INDUSTRY CONNECTIONS ACTIVITY MEMBERS BE LIABLE FOR ANY
ERRORS OR OMISSIONS OR DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO: PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS WORK, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE AND REGARDLESS OF WHETHER SUCH DAMAGE WAS FORESEEABLE.
Further, information contained in this Work may be protected by intellectual property rights held by third parties or
organizations, and the use of this information may require the user to negotiate with any such rights holders in order to
legally acquire the rights to do so, and such rights holders may refuse to grant such rights. Attention is also called to the
possibility that implementation of any or all this Work may require use of subject matter covered by patent rights. By
publication of this Work, no position is taken by the IEEE with respect to the existence or validity of any patent rights in
connection therewith. The IEEE is not responsible for identifying patent rights for which a license may be required, or for
conducting inquiries into the legal validity or scope of patents claims. Users are expressly advised that determination of the
validity of any patent rights, and the risk of infringement of such rights, is entirely their own responsibility. No commitment
to grant licenses under patent rights on a reasonable or non-discriminatory basis has been sought or received from any rights
holder. The policies and procedures under which this document was created can be viewed at
http://standards.ieee.org/about/sasb/iccom/.
This Work is published with the understanding that IEEE and the ICCom members are supplying information through this
Work, not attempting to render engineering or other professional services. If such services are required, the assistance of an
appropriate professional should be sought. IEEE is not responsible for the statements and opinions advanced in this Work.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
ABSTRACT ............................................................................................................................. 6
TABLE OF CONTENTS
1. INTERNET AND SECURITY ................................................................................................. 7
3. RETHINK.......................................................................................................................... 15
5. CITATIONS ...................................................................................................................... 28
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
RETHINKING DIGITAL ARCHITECTURES TO
SAFEGUARD THE NEXT GENERATION FROM
CYBERSECURITY BREACHES
ABSTRACT
This paper outlines the reasons why next-generation architecture is needed that can protect technology, systems,
networks, and data in a dynamic risk environment. Although the Internet is integral to the flow of information
across the globe and national boundaries, it was not built for the highly sensitive, critical data we see today.
Architecture throughout protocol and software application stacks is not set up to face the cybersecurity issues.
The forward-facing and strategic approach introduced here promotes an architecture inherently resilient to
cybersecurity threats. This approach would also address the needs for 6G technologies, Web X.0, Metaverse, and
any evolutionary technologies envisioned.
To overcome the issues and challenges related to current architecture and to develop a framework for next-
generation connectivity, we propose an architecture built on the principles of (1) human centricity, (2) decentralized
identity, (3) distributed storage and processing, (4) heterogenous control application and assessment, and (5) self-
healing. This novel approach, when applied to current applications, can help secure them. More importantly, when
applied to the following five new and upcoming critical areas, this approach will not only enhance security but will
also help us to better prepare for future Cyber Black Swan Events (CBSEs):
The IEEE Industry Connection group on “Cyber Security for Next Generation Connectivity Systems” investigates the
five proposed architecture principles and their application on the five new and upcoming areas above in different
subcommittees led by industry leaders in these fields. More information on this group can be found at IEEE SA -
Cyber Security for Next Generation Connectivity Systems.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
1. INTERNET AND SECURITY
The Internet has enabled groundbreaking communication leading to new forms of research and capabilities. The
brief history of the Internet shown in FIGURE 1 outlines how the Internet has progressed and how humans have
benefited.
FIGURE 1 Brief history of the Internet
Although the benefits of the Internet have been many, the Internet has also brought along security and safety
issues for the consumers of Internet-driven technologies. These issues are rooted in the design of new digital
information security architectures. In his groundbreaking series of essays published in 2005 called “The Laws of
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
Identity” [7], Kim Cameron—Microsoft’s Chief Architect for Identity from 2004 to 2019—said:
The Internet was built without a way to know who and what you are connecting to. This limits what we
can do with it and exposes us to growing dangers. If we do nothing, we will face rapidly proliferating
episodes of theft and deception that will cumulatively erode public trust on the Internet.
Kim’s prophecy has come frighteningly true despite 20 years of collective work trying to solve these problems. In
2015, at the European Identity & Cloud (EIC) Conference, in his keynote address, Kim presented on what the future
of the Internet would be like in 2020 [6]: “Attacks will be proliferating, and attack protection will be the number
one concern.”
Nineteen percent of breaches occur because of stolen or compromised credentials. Sixteen percent of
them occur because of phishing. Cloud misconfiguration causes 15% (IBM [26]).
As of 2020, cyber-criminals use phishing most often in their attacks (FBI Internet Crime Complaint Centre
[19]).
In the first six months of 2021, 1,767 publicly recorded data breaches exposed a total of 18.8 billion
records (Risk Based Security [46]).
Major breaches have increased year over year as per the Center of Strategic and International Studies
(CSIS Staff [10]).
More than 90% of all healthcare organizations reported at least one security breach in the last three
years with 61% acknowledging they lack effective mechanisms to maintain proper cybersecurity (Frost
RadarError! Reference source not found.).
In 2021, a corporate data breach cost an average of US $4.24 million (IBM [26]).
Most Web traffic (82%) contains Google third-party scripts, and almost half of them are tracking users
(WhoTracks.Me [55]).
Most Internet users (74%) feel they have no control over the personal information collected on them
(Ponemon Institute [43]).
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
Most Americans (72%) report feeling that all, or most, of what they do online or with their cellphone is
being tracked by advertisers, technology firms, or other companies (Pew Research Center [40]).
Rampant misinformation and unverified sources abound. In third-quarter 2020, 1.8 billion fake news
engagements occurred on Facebook (German Marshall Fund [22]).
Unrealized dangers can occur with modern technologies. For instance, 62% of the companies adopting
AI are concerned that it will increase their cybersecurity vulnerabilities and 57% are concerned about
the consequences of their AI systems using personal data without consent (Deloitte [11]).
Most mobile device applications (71%) track people by copying and pasting code called “SDKs” (software
development kits) to integrate subprocessing services, which add features and functionalities like
Google Analytics, routinely disclosing (not sharing) information with so-called “third parties” without
any transparency or legal authority to process personal data or consent, per research by Feal et al. [18].
Feal et al.’s research [18], presented at the Commission Nationale de l'Informatique et des Libertés
(CNIL), indicated that less than 10.0% of sites provided any privacy or security notice, and only 3.5%
continued to work if consent was declined. At the same event, researchers demonstrated that even
privacy tools leak personal data. One researcher demonstrated how 17.0% of forms collect data before
the form is submitted, and that most people leak data about those close to them to third-party social
media services. This process circumvents the individual, with terms and a software license used to get
around privacy regulation.
In 2019, an article exposed how public services in the United Kingdom use code from unauthorized third
parties to systemically leak the data of the vulnerable and poor so when they can access basic
government services (Eich [14]).
The current data security environment highlights the lack of data control, the leakage, and the
dominance of surveillance-based capitalism (Lessig [32]). Code regulates the Internet, not the consent
of the individual.
University of California (UC) Berkley research (Nair et al. [34]) has highlighted unprecedented privacy
risks (from data collection) of the Metaverse from an environment clearly designed to extract personal
data to expose people and their data in public formats on an unprecedented scale.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
Many of these situations arise from large and uncontrollable data collection, its centralized storage, and the
inability to stop its leakage from a variety of attacks. The data may be associated with identity or profiles, or it
may be any other type of data, whether collected in a personal context or in the context of an organization.
The Internet’s founders saw its promise but did not foresee users attacking one another. In a series of articles
published in 2015 (Timberg [48]), Virginia Tech historian Janet Abbate said, “It would have taken enormous
foresight for those planting these early seeds of Internet to envision the security consequences years later, when
it would take a principal place in the world’s economy, culture, and conflicts.” Abbate added, “People don’t
break into banks because they’re not secure. They break into banks because that’s where the money is. People
thought they were building a classroom, but it was a bank.”
At the same time, more digitalization is happening. The Internet continues to grow, the way we deploy
technology for remote work and communication is changing, and new areas and technologies are appearing on
the horizon.
Cybersecurity has become such a key national issue in many countries that on September 14, 2022, the United
States White House released a memorandum for enhancing the security of the software supply chain (DeRusha
[12]). Such efforts will be undertaken globally.
We must prepare for the following five technology and application areas of the future:
IoT
AI
Web X.0+
5G/6G
Quantum Computing
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
These areas each include methods of data input or collection a process to manage the identity of a person or a
thing in the system, storage and processing, control management, and some form of recovery mechanism. As
systems grow in complexity, access control is a concern for systems distributed across multiple computers. We
need to examine these areas in the context of the data input or collection methods to figure out better and more
secure architectures (FIGURE 2).
The number of attacks on the Internet, usually categorized as “incidents,” has been steadily growing. The CSIS
has recorded significant cyber incidents since 2003 (FIGURE 3). The CSIS report [10] on cyber incidents focused
on cyber-attacks on government agencies, defense and high-tech companies, or economic crimes with losses
of more than a million US dollars.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
FIGURE 3 Number of Cyber Incidents Since 2003
In addition, a steady rise in the number of vulnerabilities has occurred according to the Common Vulnerabilities
Research Framework (CVRF). The numbers have been recorded by CVRF since 1999 (FIGURE 4).
To further analyze this area, we must look at the nature of the wicked security problem in regard to dynamism
(threats, assets, structures, risks), pernicious dependencies, and complex coupled systems.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
We also must look at the nature of the breaches, the reasons behind their increased severity, their frequency, and
their velocity.
2.1.2. COSTS
Securing enterprise and its information asset has never been cheap, and it likely will become more expensive
unless we change. The cost of security cannot be measured in currency alone; we should consider the effort and
time as well. Although everything seemingly can be attributed a dollar value, we need to think about the overall
cost and not just the expense. Given the limited time available for the purpose of this paper, an exact cost is
challenging to ascertain; however, we can talk about the cost to an enterprise of a data breach.
Statistically the average cost to deal with such an incident has increased by 12.7% from USD 3.86
million in 2020 to USD 4.35 million in 2022 (IBM [26]).
The cost of a security breach is not only operational, but it also involves data loss or theft. A security breach can
be of any nature; for example, an attack on a banking system can be entirely for money (the Bangladesh Bank
SWIFT Heist in 2016 is a great example as the bank lost US $81 million). Regardless of the reason, a reputation
loss occurs, and to rebuild that reputation, it will cost money, effort, and time. Regulatory fines can or will incur,
and they will have to be paid. Under certain General Data Protection Regulation (GDPR) laws, for example,
noncompliance could cost severe fines ranging between EUR €10 million and EUR €20 million.
A security breach response is another area where the cost cannot be calculated based solely on what is spent
on incident response and related services, tools, and investigation processes. Legal responses need to be
considered too, and in almost all security breaches, legal liabilities exist. For example, the litigation cost was
approximately US $15.3 million in the Home Depot case in 2014 (ArcTitan [3]). And the most concerning area
where the cost will be higher is the operational downtime of the business; any business closed because of a
disruption will cost an organization money, which will be a combination of loss in sales during the time it is down
and then the cost to bring it back online. Therefore, the cost is double fold, the amount of which is tough to
determine as it will be dependent on the type and nature of the business.
Among other factors, we must also consider the cost spent to maintain the IT environment. Was the money
spent on the right set of security architecture solutions and tools, or was it wasted on failed options? If the latter,
then that money was an expensive mistake. For example, in the case of the Colonial Pipeline ransomware breach,
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
the adversaries compromised the company simply because of a legacy VPN solution that did not have the
capability of providing two-factor authentication paving the way to breach the single password. Although the
company did spend approximately US $200 million in IT solutions that included security expenses in a span of
five years, without the two-factor authentication for the VPN solution, the breach still occurred. Therefore, can
we learn from this costly mistake and say that the money should be spent on the right set of solutions and tools
rather than on just any option?
During and after the COVID-19 pandemic, the workplace environment in most businesses either changed
completely or evolved from the way it used to be. Employees often no longer only work from the confines of the
organizational boundaries. As a result, various security challenges have emerged, involving identity, access to
data, security monitoring, and risk and compliance security controls. In addition, insider threats are more of a
reality now that employees no longer operate within the corporate boundary.
Those employees working remotely have access to company assets and data, and some of them use a home or
a public Internet, which is not necessarily secured. Home wireless networks provide less security compared with
a corporate network. As a result, adversaries might find a weak link to attack corporate assets, access
confidential and sensitive information, and/or steal data. With the sudden increase in demand for portable
computing devices (laptops, tablets, etc.), many employees must use personal devices for their official work,
and these devices do not meet the security baseline and corporate standards in almost all cases.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
Both situations are a realization that we should expect distributed environments in the future, so the
question is, how do we secure data and assets with this new reality?
Remote work has also created another problem: colleagues who may be deep fakes (Dujmovic [13]).
It is not only about strengthening the infrastructure to tackle potential leakage from remote locations
or distributed infrastructure, but also it is about whether you are dealing with a real colleague and a
real person at the other end.
3. RETHINK
New and previously unrealized attack vectors require new protection and response architectures. Our current
methods will fail with a continued rise in incidents and vulnerabilities. Our costs when a breach occurs only
increase, and new patterns of our work and life emerge with remote communications.
Given the evolving landscape and ever-increasing breaches, we must create new approaches to how
architectures are built. We must aim to create safe and secure digital environments for people to connect with
and perform various functions and transactions in their personal lives or at work. We propose the following five
principles as the basis of the architectures of the next-generation systems:
The question that often arises is, who has control when that collection is happening? Can we push
more control to a person to discourage unabated data collection and, hence, reduce these risks?
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
Identity, applicable to anything anywhere:
o Most digital constructs are based on the digital identity of people and things. When applied to
humans in digital constructs, they take the form of online accounts. Many “things” out there do
not even have an identity and no processes exist for how they should be managed. Two
situations arise from current identity systems that are centralized and federated constructs: (1)
A person may end up with multiple digital accounts and passwords in various properties, which
then are the subject of privacy and security issues; and (2) a person, or a thing, cannot be truly
verified in current identity systems, which can lead to situations in which bad actors can perform
actions in an anonymous fashion or commit identity fraud.
The question is whether identity systems can be decentralized to mitigate security related problems
and enable some form of verification, which can verify a person or a thing with real identity when
communicating over the network. Current identity methods cannot.
With this context, the question is, could we change storage and processing architectures in such a way
that they are not centralized anymore? Can we distribute the data so that the sum of all pieces will
form the whole and in the context of the data owner?
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
The question is whether we could create environments where controls are sourced from different
vendors and sources to avoid failures if a control or a vendor fails.
The question is, how do we identify that something has gone wrong and recover from it quickly?
Recalling Virginia Abbate’s quote that with the Internet, we have built a bank that people want to break into, we
must consider whether the bank (aka “the Internet”) should continue to collect all the currency (aka “the data”)
often without people’s knowledge and store it centrally. Instead, wouldn’t it be better to allow people to have
more control over their currency (data) and to store it in a more distributed fashion? In 2022, the onslaught of
daily breaches should be a reminder that the Internet’s architecture needs to approach cybersecurity for the
next generation differently. We should aim to be in a much better situation by 2030 or even 2025. New
technology areas and our inability to control breaches today present us with a real danger of CBSEs or cyber-
attacks (Herbolzheimer [24]).
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
We propose the following five principles based on the methods discussed earlier:
A. Human Centricity: Given that more and unnecessary data collection can lead to both privacy and security
problems, could we create situations in which a person can control their data and information flow into
the environment? We recommend a “human-centric” environment where a person has control on how
their data flows in and is used. As a result, the locus of control shifts to the holder or generator of data.
Therefore, we propose “human centricity” as the first principle.
Benefits: Prevents unwanted data flow into the system. Enables privacy and hence security at the edge.
With human centricity, we propose to build better controls for the flow of information from a human
standpoint that may lead to less but relevant and compliant data collection. We would assess whether
these controls can lead to lowering unabated data collection, which has implications on privacy and
security, at both the personal and national levels.
B. Decentralized Identity: Human centricity goes hand in hand with identity. On the one hand, a person or
a thing needs to be verified against the real identity so that fakes, bots, or malicious actors (such as
originators of phishing emails) can be removed; on the other hand, a move should occur toward less
central storage of account information, passwords, and so on. In today’s centralized and federated
environments, this cannot be overcome; however, new constructs of identity, such as decentralized
identifiers (DIDs; as recommended by W3C [52]), self-sovereign identities, and verifiable credentials,
together can help achieve these goals. Hence, we propose “decentralized identity” as the second
principle.
Benefits: Reduces centralization of information, avoids single points of failures, provides for stronger
authentication, provides for peer–peer communication channels, reduces identity fraud, and enables
two-way verification and single sign-on.
As a result, we propose defining a decentralized and self-sovereign identity with verifiable credentials,
which is applicable to both humans and things (such as IoT) and assess whether such a situation will
lead to less centralization of identity and realization of benefits, as stated previously.
C. Distribution of Data Storage and Processing: Although the identity data are decentralized back to a
person or a thing, which can help manage large, distributed environments, such as IoT or software
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
popping up everywhere, we recognize that some data flow and storage will occur into the systems. Could
we create situations in which data cannot be constructed as a whole if a single system is breached?
Hence, we propose “data storage and processing distribution” as the third principle.
Benefits: Increased resilience, in which failure of one part does not lead to failure of the whole system.
With distribution in storage and processing, we propose to define methods by which the data and
information are not stored or processed in entirety in a single place, but they are spread across various
systems in the context of the owner. With such methods, we will ensure that if part of the storage or
processing system fails, then the entire system does not fail.
D. Heterogeneous Control Applications: Systems fail if a control or set of controls from a single provider or
source fails. This issue is especially important when we work with the next-generation solutions, such as
AI or Quantum, in which 100% reliable defense approaches have not yet been invented, and a need
exists for combinations of controls on each step of the solution lifecycle from development to
operations. Hence, we propose that controls sourced from various places and vendors be applied,
making “heterogenous control applications” the fourth principle.
Benefits: Increased resilience, which reduces dependence on a single set of controls or service.
With heterogenous control systems, we propose finding ways to apply controls from multiple sources
to a system and assessing whether failure of one control or a source of control leads to failure of a
system.
E. Self-healing: Despite our best efforts, failures and breaches will still occur. The key lies in identifying the
failure situation quickly and in recovering from it in a seamless fashion. To do so, continuous verification
and identification of the components and their failure states must occur using the criteria of security.
Hence, we propose “self-healing” as the fifth principle.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
With self-healing, we propose finding methods and ways for how a system, service, or product can
adjust and self-heal based on various types of triggers or criteria. The triggers or criteria could have
many types, including regulatory changes, software updates, better control availability, or failure (or
potential failure) of a subcomponent. Building self-healing systems will require us to continuously
measure systems, services, or products at a subcomponent level and to keep adjusting
the security configuration based on observed triggers or criteria. As a vision, we would like to explore
how a system, service, or product can be dynamically protected (in a self-healing manner) based on
those observed criteria.
We propose these five principles as the basis of the assessment of innovative technology areas, which are (1) AI
and autonomous systems, (2) IT/OT, (3) Web X.0+, (4) 5G/6G, and (5) quantum computing (FIGURE 5). The aim
is to build systems that would avoid CBSEs.
How do we ensure that data remain secure to increase human, societal, and national security when
using such systems? How do we ensure security is maintained during these situations? Can we build
more secure next-generation systems with the five proposed principles, or do we need to consider more
principles?
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
4.1. ARTIFICIAL INTELLIGENCE AND
AUTONOMOUS SYSTEMS
AI systems are software (and possibly hardware) systems that act in the physical or digital dimension by
perceiving their environments through data acquisition, interpreting data, and reasoning/making decisions on
the knowledge, or processing the information, derived from these data. AI systems can either use symbolic rules
or learn a numeric model, and they can adapt their behavior by analyzing how the environment is affected by
their previous actions.
As a scientific discipline, AI includes several approaches and techniques, such as machine learning (ML, of which
deep learning and reinforcement learning are specific examples), machine reasoning (which includes planning,
scheduling, knowledge representation and reasoning, search, and optimization), and robotics (which includes
control, perception, sensors and actuators, as well as the integration of all other techniques into cyber-physical
systems).
“Machine learning systems differ from traditional software-based systems in that the
behavior of ML systems is not specified directly in code but is learned from data.”
(Breck et al. [4])
With regard to how AI and autonomous systems work, we will examine how AI transforms the threat landscape.
We will discuss the cybersecurity threat models of AI systems and how they differ from conventional systems,
as well as discuss ways to make these systems resilient and self-healing so that they can be reliably used for
decision-making.
In various situations, data must be secured for AI and autonomous systems, for instance, during data input, data
storage and processing, and run time when an AI or autonomous system takes an action. AI is a new way of
developing solutions called “Software 2.0.” Here, instead of code, we have algorithms, and these algorithms
offer a new attack surface. Therefore, the stakes are higher as the responsibilities of AI are more significant than
the ones of traditional software. Examples of AI incidents are already happening. For instance, Zillow lost US $6
billion of its valuation due to its problems with AI algorithms. Tesla’s autonomous cars, as another example, can
be made to crash into airplanes or can be fooled into changing lanes. Even cybersecurity solutions such as the
Cylance AI-driven Malware detection engine can became vulnerable to attacks.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
In the old paradigm, software vulnerabilities often occurred because of improper command filtering, incorrect
data handling, or design flaws. Now, however, AI commands can be visual, audial, or textual. Thus, filtering,
handling, and detecting malicious inputs and interactions is much more difficult. Only in the last decade have
researchers released more than 2,000 papers about different types of vulnerabilities in AI algorithms, also called
“adversarial attacks.” Adversarial attacks on AI can be separated into the following three categories:
1. Manipulation attacks, such as evasion, allow adversaries to bypass expected AI behavior or even make
AI systems perform unexpected jobs.
2. Infection attacks, such as poisoning, can sabotage the quality of AI decisions and enable stealth control
of AI systems.
3. Exfiltration attacks aim to steal data or algorithm logic from AI systems.
Unfortunately, AI cannot be secure out of the box, and current cybersecurity solutions like code analysis or
firewalls cannot deal with AI vulnerabilities as software security solutions cannot help with hardware security.
Autonomous systems such as modern autonomous vehicles could be enormously complex. This complexity may
lead to thorny cybersecurity challenges with real-world consequences. Unlike a classic cyberattack in which data
are stolen or ransomware locks down a system, cyberattacks on cars could lead to property damage or injuries
(IEEE Staff [27]).
We need new solutions for assessing and securing AI applications and autonomous systems. Could we leverage
the architecture principles we proposed earlier to establish secure AI and autonomous systems? Different
environments may require different solutions. Therefore, depending on the environment, these principles could
be sufficient, other principles could be needed, or a completely different paradigm could be required. For
example, in the development environment in ML, which is used for discovery and model training, large
amounts of production data are necessary; thus, the development environment for ML should be secure and
have strict access controls and back-up, and recovery should be required. The development environment for
traditional software engineering, on the other hand, looks more like a production environment.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
economy by enabling a variety of new business models and applications. But it can also expose industries and
consumers to unanticipated security issues. The IoT promises to deliver substantial productivity improvements
over the coming decade, but very few IoT assets feature adequate security, something many business leaders
do not know. As a result, many companies expect to run what they presume to be high-integrity applications in
what they do not realize are low-integrity environments.
Apply “secure-by-design” principles throughout a product’s development, from concept ideation to series
manufacturing, instead of addressing security issues at the end of the cycle. Designers should also build
in operational controls when originally configuring systems to verify that all component behaviors
conform to expected operational norms and undertake a complete analysis of a system’s threat-versus-
risk profile. Engineering responses should focus on eliminating undesirable outcomes (e.g., breached
customer data).
Monitor the IoT’s operational and security health continuously—a big data challenge that requires a big
data solution. Furthermore, an IoT system might depend on other such systems, so we should design for
failure survival and focus on resiliency, starting with anomaly detection capabilities enabled by machine
learning and effective responses.
Build tailored threat models that consider key business goals, the underlying technical infrastructure, and
potential threats that can disrupt the business. Such models can help to prioritize IoT security threats and
uncover blind spots.
The IoT is now a fixture of modern digital life, but as technology improves, we will see more reliance on
complex, Internet-connected devices that will be deployed in consumer and commercial uses over time,
and we will witness the exponential growth of IoT devices now and in the future. IoT devices are modern
marvels with the ability to collect data and track information in ways that were not possible in the past.
To get an idea of the scope, scale, and ubiquitous nature of IoT device uses, the following statistics help to tell
the story:
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
The number of Internet-connected devices is expected to increase from 31 billion in 2020 to 35 billion in
2021 and 75 billion in 2025 (Statista Research Department [47]), making it a widely distributed
infrastructure that needs management.
By 2026, experts estimate that the IoT device market will reach US $1.1 trillion (Security Today).
IoT connections worldwide generated 13.6 zettabytes (ZB) of data in 2019. This data volume of IoT
devices is expected to reach 79.4 ZB by 2025 (IDCError! Reference source not found.). How much of this
data should be collected?
IoT devices have many security-related problems as cited by Langkemper [31]. They range from access control
issues to vulnerability management to privacy-related issues. The rapid growth of technologies expanded
availability, and combinations of technological innovations that can be used in IoT devices create more
complexity and difficulty in preventing cybersecurity and data privacy risks. A few points that highlight challenges
with IoT include the many devices distributed out, the difficulty IoT device users have in knowing what data are
being captured, and the challenge of properly identifying devices. The consumer and commercial marketplaces
are hungry for innovations in the IoT space, but these IoT uses require careful consideration, planning, and
tracking to understand not only the benefits but also the risks. As IoT becomes more vital to the digital future,
we must proactively look at potential human harm, cybersecurity risks, and data privacy challenges created by
IoT that we likely have never contemplated.
Historically, Web 1.0 provided a static content delivery platform. Web 2.0 then allowed users to be more
interactive and had the ability to generate some content, which evolved into Web 3.0, which we experience today.
Web 3.0 revolutionized the Internet completely by allowing people to be creative and have more ability to build
multi-user applications that allow others to use it for various purposes, business, and collaboration.
Web X.0 represents the next generation of Internet where human–machine interactions will be possible, along
with many other advanced applications, like transactions via blockchain technologies and the Metaverse. With a
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
combination of AI and Web X.0+, many experts also speculate that the next generation of users could interact
with Web X.0+ via human implants with ease. Even though this possibility feels exciting at this moment, with some
of its features already available to use, for instance, using one of the virtual assistant control home appliances
(interaction with the physical world) and other devices remotely via a smart watch, a mass transformation is still
a distant future.
As we have discussed, no Web technology is fully secure, and they all have massive security risks with exposure
to many threats. Web X.0 will be no different, and in fact, it will be more prone to security risks and threats and
more attacks might be possible. But unlike its predecessors, Web 1.0, 2.0, and 3.0, we can create it more securely
from the ground up. The charter of the subcommittee for Web X.0+ calls for researching, identifying, and
evaluating possible security risks and then making recommendations and/or suggestions to address them.
4.4. 5G/6G
The 5G, 6G, and future networks have many more threat vectors as shown in FIGURE 6. The different 5G service
classes—eMBB, mMTC, and URLLC—will bring great security challenges, as will O-RAN. With such a broad attack
surface, a new way of thinking about network security is needed. In addition, the vast nature of these systems
means that they will require a greater use of autonomy. These networks must learn on the fly to cope with new
and improved threats to the ecosystem. AI and ML can provide some level of autonomy. However, to date for
5G/6G systems, performance optimizations have been focused on channel and network optimizations; learning-
based security architecture and security signal processing algorithm has been lacking.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
New cybersecurity architectures for 5G/6G systems need to be developed that challenge the traditional way of
thinking about security (i.e., simply thinking that firewalls and anti-virus software are the answer) to protect a
wide range of systems that include terrestrial, satellite, and IoT. Furthermore, there are homogeneous systems,
which comprise a single service provider, and heterogeneous systems, which comprise more than one provider.
Consequently, new thinking about securing the 5G/B5G ecosystem is needed.
A good starting point to begin this journey is the security work done as part of the IEEE Future Networks Initiative
(FNI) Security Working Group from IEEE’s Communication Society as illustrated in their 2022 International
Network Generations Roadmap (INGR) on Security and Privacy. Important topics from security management and
orchestration to AI/ML security to trust and privacy were presented in this work. However, more work needs to
be done.
How could we apply the architecture principles to establish secure 5G/6G networks?
We at IEEE “Cyber Security for Next Generation Connectivity Systems” plan to further this work by looking at
new advances in security and privacy such as zero trust architecture implementations, real-time network
security monitoring and situational awareness, open interfaces for security notification, security signal
processing via artificial intelligence and machine learning, and more. In addition, 5G/6G are the next-generation
wireless systems that will bring processing closer to the user. Although these communication technologies will
be the impetus behind Web X.0+ applications and more ubiquitous processing, new security challenges will
appear as these technologies evolve.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
machines (NSF [36]). In addition, the NSF-WG-QIS also posited that advances in the field would increase
geopolitical, transnational, and localized competitiveness for IT during the coming century.
Although not meant to be comprehensive, the following core concepts should be understood when conducting
analysis of the possibilities that QIS may provide:
The field of QIS saw a large expansion because Peter Sho demonstrated that a quantum computing capability
could factor exceptionally large numbers super efficiently (NSF [36]). For the last 20 years, the field of QIS has
continued to grow and has finally reached a major milestone, the potential to provide increased performance in
several areas of research as posited by the NSF-WG-QIS in 2000, to include the ability to begin to break security
encryption, elements of sensing, quantum key distribution (QKD) solutions, and enhancements to random number
generators. Thus, these types of enhancements also have a downside, which the IEEE Cyber Security for Next
Generation Connectivity Systems Group is researching to create new architectures.
The group has determined that the need to understand the quantum-attack threat patterns may take time, and it
has started the collection process to better inform its members of the emerging potential threat and to establish
workgroups with a multidiscipline approach to include both a cyber and a QIS fusion workgroup. The next
generation of fusion-based cybersecurity and QIS-trained persons will be able to develop the needed cyber
doctrine required to build the next generation of architectures to enhance security while increasing protections
required to thwart a quantum-based cyber-attack. Elements of the CVRF, which is the super dataset collected by
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
MITRE and the National Institute of Standards and Technology (NIST), also have reverse mappings to known
vulnerabilities to the NPC Repository, NIST 800-53 Rev. 4 controls, SCAP Validations Tools, and United States
Government Configuration Baseline (USGCB) initiative discussed in 2.1.1.
The group has begun the process of exploring the impact of the threat vulnerability report to include the Common
Vulnerableness and Exposure (CVE)’s dataset in FIGURE 4. The graphic demonstrates that the CVE dataset has
grown as the threat vectors and vulnerabilities of software and hardware have been developed. If the use of QIS
creates the ability to increase these numbers, it will become a much larger attack-surface space that must be
understood to provide the next generation of cyber protection.
5. CITATIONS
The sources in the following list have either been referenced within this paper or may be useful for additional
reading:
[1] Adebayo, K. S., “Why CISA wants to release a new version of its Zero Trust Maturity Model,”
VentureBeat, July 29, 2022. https://venturebeat.com/security/cisa-wants-to-release-a-new-version-of-
its-zero-trust-maturity-model-%ef%bf%bc/.
[2] Adversa Staff, “The road to secure and trusted AI,” Adversa, 2022. https://adversa.ai/report-secure-
and-trusted-ai/.
[3] ArcTitan Staff, “Case study: Home Depot data breach cost $179 million,” ArcTitan, Aug. 20, 2021.
.https://www.arctitan.com/blog/case-study-data-breach-cost-home-depot-179-million/.
[4] Eric Breck, Eric, Shanqing Cai, Eric Nielsen, Michael Salib, and D. Sculley, Proceedings of IEEE Big Data
(2017). The ML Test Score: A Rubric for ML Production Readiness and Technical Debt Reduction.
[5] Bresnahan, E., “How digital transformation impacts IT And cyber risk programs,” CyberSaint Security,
2022. https://www.cybersaint.io/blog/managing-risk-in-digital-transformation/.
[6] Cameron, K., “Identity services 2020,” KuppingerCore Analysts, May 13, 2015.
https://www.kuppingercole.com/watch/eic15_keynote_cameron/.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
[7] Cameron, K., “The laws of identity,” Computer Science, 2005.
https://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf/.
[8] Columbus, L., “Why the future of APIs must include zero trust,” VentureBeat, Aug. 1, 2022.
https://venturebeat-com.cdn.ampproject.org/c/s/venturebeat.com/2022/08/01/why-the-future-of-
apis-must-include-zero-trust/amp/.
[9] Computer Hope Staff, “What are the advantages of the Internet?” Computer Hope, Jan. 12, 2019.
https://www.computerhope.com/issues/ch001808.htm/.
[10] CSIS Staff, “Significant cyber incidents,” Center for Strategic & International Studies Blog, Aug. 2022.
https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents/.
[12] DeRusha, C., “Enhancing the security of the software supply chain to deliver a secure government
experience,” The White House, Sept. 14, 2022. https://www.whitehouse.gov/omb/briefing-
room/2022/09/14/enhancing-the-security-of-the-software-supply-chain-to-deliver-a-secure-
government-experience/.
[13] Dujmovic, J., “Remote work has created yet another problem—Colleagues who may be deepfakes,”
MarketWatch, Aug. 5, 2022. https://www-marketwatch-
com.cdn.ampproject.org/c/s/www.marketwatch.com/amp/story/remote-work-has-created-yet-
another-problem-colleagues-who-may-be-deepfakes-11659727993/.
[14] Eich, B., “Surveillance on UK council websites,” Brave, Feb. 2020. https://brave.com/static-
assets/files/Surveillance-on-UK-council-websites_compressed_version.pdf.
[15] Eira, A., “72 vital digital transformation statistics: 2021/2022 spending, adoption, analysis & data,”
FinancesOnline, 2022. https://financesonline.com/digital-transformation-statistics/.
[16] Elgan, M., “You just hired a deepfake. Get ready for the rise of imposter employees,” Protocol, Aug. 22,
2022. https://www.bleepingcomputer.com/news/security/hackers-stole-620-million-from-axie-infinity-
via-fake-job-interviews/.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
[17] Ermetic Team, “93% of security professionals say their identity breaches could have been prevented,”
Ermetic, Undated. https://ermetic.com/blog/cloud/93-of-security-professionals-say-their-identity-
breaches-could-have-been-prevented/.
[18] Feal, Á., J. Gamba, J. Tapiador, P. Wijesekera, J. Reardon, S. Egelman, and N. Vallina-Rodriguez, Don't
Accept Candy from Strangers: An Analysis of Third-Party Mobile SDKs. IMDEA Network Institute.
https://dspace.networks.imdea.org/handle/20.500.12761/1565.
[19] FBI Internet Crime Complaint Centre, 2021, Internet Crime Complaint Center - Wikipedia.
[20] Franceschi-Bicchierai, L., “Hackers took over a commercial satellite to broadcast hacker movies,” VICE,
Aug. 15, 2022. https://www-vice-
com.cdn.ampproject.org/c/s/www.vice.com/amp/en/article/y3pwqx/hackers-took-over-a-commercial-
satellite-to-broadcast-hacker-movies/.
[22] German Marshall Fund, 2020. Technology and Innovation | Strengthening Transatlantic Cooperation
(gmfus.org).
[23] Help Net Security Staff, “Ransomware is not going anywhere: Attacks are up 24%,” Help Net Security,
Aug. 12, 2022. https://www.helpnetsecurity.com/2022/08/12/increase-ransomware-attacks/.
[24] Herbolzheimer, C., “Preparing for a Black Swan cyberattack,” Harvard Business Review, Sept. 14, 2016.
https://hbr.org/2016/09/preparing-for-a-black-swan-cyberattack/.
[25] Huitema, C., et al., Introduction to Trust over IP (White paper). Trust over IP (ToIP) Foundation, Nov. 17,
2021. https://trustoverip.org/permalink/Introduction-to-ToIP-V2.0-2021-11-17.pdf.
[26] IBM Staff, “Cost of a data breach 2022,” IBM, 2022. https://www.ibm.com/reports/data-breach/.
[27] IDC, IoT devices to generate 79.4ZB of data in 2025, says IDC.
[28] IEEE Staff, “Autonomous vehicles: Cyber-physical risk on a massive scale,” IEEE Transmitter, July 13,
2022. https://transmitter.ieee.org/autonomous-vehicles-cyber-physical-risk-on-a-massive-
scale/?utm_campaign=Autonomous+Vehicles,Cyber+Security,IEEE+Transmitter+-
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
+BD&utm_content=why_is_cybersecurity_a_cr&utm_medium=organic&utm_source=linkedin/.
[29] Kelly, S., and J. Resnick-ault, “One password allowed hackers to disrupt Colonial Pipeline, CEO tells
senators,” Reuters, June 8, 2021. https://www.reuters.com/business/colonial-pipeline-ceo-tells-senate-
cyber-defenses-were-compromised-ahead-hack-2021-06-08/.
[30] Krebs, B., “It might be our data, but it’s not our breach,” Krebs on Security, Aug. 11, 2022.
https://krebsonsecurity.com/2022/08/it-might-be-our-data-but-its-not-our-breach/.
[31] Langkemper, S., “The most important security problems with IoT devices,” Eurofins, Sept. 10, 2020.
https://www.eurofins-cybersecurity.com/news/security-problems-iot-devices/.
[33] Maguire, M., “Politicians warned not to discuss work near Alexa, Google Home,” Newstalk, Aug. 14,
2022. https://www.newstalk.com/uncategorized/big-brother-politicians-warned-not-to-discuss-work-
near-alexa-google-home-1372431/.
[34] Nair, V., G. M. Garrido, and D. Song, “Exploring the unprecedented privacy risks of the Metaverse,”
arXiv:2207.13176v1, July 26, 2022. https://arxiv.org/pdf/2207.13176.pdf.
[35] Nash, J., “ID.me finds itself accused of biometric data privacy violation,” Biometric Update, Aug. 10,
2022. https://www.biometricupdate.com/202208/id-me-finds-itself-accused-of-biometric-data-privacy-
violation/.
[36] NSF Staff, “Quantum information science and engineering research at NSF,” National Science
Foundation, 2000. https://www.nsf.gov/mps/quantum/quantum_research_at_nsf.jsp/.
[37] Palmer, D., “Critical infrastructure is under attack from hackers. Securing it needs to be a priority -
before it's too late,” ZDNET, Aug. 21, 2022. https://www-zdnet-
com.cdn.ampproject.org/c/s/www.zdnet.com/google-amp/article/critical-infrastructure-is-under-
attack-from-hackers-securing-it-needs-to-be-a-priority-right-now/.
[38] Pegoraro, R., “Ex-CISA chief's advice at Black Hat: Make security valuable and attacks costly,” PCMag,
Aug, 10, 2022. https://www.pcmag.com/news/ex-cisa-chiefs-advice-at-black-hat-make-security-
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
valuable-and-attacks-costly/.
[39] Pelzer, L. M., “The true cost of cybersecurity incidents: The problem,” Palo Alto Networks, June 25,
2021. https://www.paloaltonetworks.com/blog/2021/06/the-cost-of-cybersecurity-incidents-the-
problem/.
[41] Piore, A., “Beijing's plan to control the world’s data: Out-google Google,” Newsweek, Sept. 7, 2022.
https://www.newsweek.com/2022/09/16/beijings-plan-control-worlds-data-out-google-google-
1740426.html/.
[42] Plumb, T., “SBOMs: What they are and why organizations need them,” VentureBeat, July 29, 2022.
https://venturebeat.com/security/sboms-what-they-are-and-why-organizations-need-them/.
[44] Preukschat, A., and D. Reed, Self-Sovereign Identity. Shelter Island, NY: Manning, May 2021.
[45] Reed, D., and V. Syntez, Design Principles for the Trust over IP Stack. Trust over IP (ToIP) Foundation,
Nov. 17, 2021. https://trustoverip.org/permalink/Design-Principles-for-the-ToIP-Stack-V1.0-2022-01-
17.pdf.
[47] Statista Research Department, “Internet of Things—Number of connected devices worldwide 2015-
2025,” Statista, Nov. 27, 2016. https://www.statista.com/statistics/471264/iot-number-of-connected-
devices-worldwide/.
[48] Timberg, C., “The real story of how the Internet became so vulnerable,” The Washington Post, May 30,
2015. https://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/.
[49] Toulas, B., “FBI warns of residential proxies used in credential stuffing attacks,” Bleepingcomputer.com,
Aug. 22, 2022. https://www-bleepingcomputer-
com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/security/fbi-warns-of-residential-
proxies-used-in-credential-stuffing-attacks/amp/.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
[50] Toulas, B., “Hackers scan for vulnerabilities within 15 minutes of disclosure,” Bleepingcomputer.com,
July 26, 2022. https://www.bleepingcomputer.com/news/security/hackers-scan-for-vulnerabilities-
within-15-minutes-of-disclosure/.
[51] Toulas, B., “Hackers stole $620 million from Axie Infinity via fake job interviews,”
Bleepingcomputer.com, July 12, 2022. https://www.bleepingcomputer.com/news/security/hackers-
stole-620-million-from-axie-infinity-via-fake-job-interviews/.
[52] W3C Staff, “Decentralized Identifiers (DIDs) v1.0,” W3C, July 19, 2022. https://www.w3.org/TR/did-
core/.
[53] W3C Staff, “Decentralized Identifiers (DIDs) v1.0 becomes a W3C Recommendation,” W3C, July 19,
2022. https://www.w3.org/2022/07/pressrelease-did-rec.html.en/.
[54] Watchorn, M. S., Cyber Black Swan Event—Cyber security landscape ontology and taxonomy—
Integration analysis and the critical infrastructure protection,” LinkedIn, Aug. 28, 2018.
https://www.linkedin.com/pulse/cyber-black-swan-event-security-landscape-ontology-dr-merrick-s-/.
[55] WhoTracks.Me, 2019, WhoTracks.me: Find out where you're being tracked on the web (cliqz.com).
[56] Winder, D., “Cisco hacked: Ransomware gang claims it has 2.8GB of data,” Forbes, Aug. 13, 2022.
https://www.forbes.com/sites/daveywinder/2022/08/13/cisco-hacked-ransomware-gang-claims-it-
has-28gb-of-data/amp/.
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.
RAISING THE WORLD’S
STANDARDS
Tel.+1732-981-0060 Fax+1732-562-1571
Authorized licensed use limited to: VTU Consortium. Downloaded on March 09,2023 at 04:29:12 UTC from IEEE Xplore. Restrictions apply.