1,635 research outputs found

    Advancing security in IoT-driven critical infrastructure: a focus on smart transportation system.

    Get PDF
    As new technological platforms such as the Internet of Things (IoT), blockchain, Artificial Intelligence (AI) and Machine Learning (ML) are gradually emerging and being integrated into critical infrastructures which are subjected to digital attacks. i.e., the critical systems are vulnerable to new cybersecurity threatsand thus requires corresponding security approach to challenge the threats.It is therefore imperative to identify the various types of possible cyber-attacks on the systems and develop a security framework to manage the associated security risks. IoT-based critical infrastructure systemslike smart healthcare, smart transportation and smart manufacturing are prone to attacks such as Denial of Service (DoS) attacks, brute-force attacks, Man-in-the-Middle attacks (MiTM), Stuxnet computer virus etc. This paper focuses on a detailed study of the smart transportation system and its security issues; various threat vectors used by the attackers are examinedalongsidecorresponding countermeasures. Additionally,an in-depth analysis on how an identified malicious attack on smart transportationcould be achieved was carried out by using an open-source vehicular network tool called Vehicle in Network Simulation (Veins). A detailed evaluation of the impact of MiTM attack was then carried out based on the evaluation metrics. Results from the simulation results indicate that attacks on the built STSthesis vehicular network have a higher influence on the network. Also, although the STSthesis was a basic network that was run with considerable node, limited time and injected malicious node, the impact of the MiTM attack was still visible. Furthermore, implementing the elliptic-curve Diffie-Hellman (ECDH) with the Advanced Encryption Standard (AES) in the early stage of design and implementation will prevent the MiTM attacks from intercepting messages between legitimate nodes

    Security in IoT systems - Issues and Solutions

    Get PDF

    Evaluating Resilience of Cyber-Physical-Social Systems

    Get PDF
    Nowadays, protecting the network is not the only security concern. Still, in cyber security, websites and servers are becoming more popular as targets due to the ease with which they can be accessed when compared to communication networks. Another threat in cyber physical social systems with human interactions is that they can be attacked and manipulated not only by technical hacking through networks, but also by manipulating people and stealing users’ credentials. Therefore, systems should be evaluated beyond cy- ber security, which means measuring their resilience as a piece of evidence that a system works properly under cyber-attacks or incidents. In that way, cyber resilience is increas- ingly discussed and described as the capacity of a system to maintain state awareness for detecting cyber-attacks. All the tasks for making a system resilient should proactively maintain a safe level of operational normalcy through rapid system reconfiguration to detect attacks that would impact system performance. In this work, we broadly studied a new paradigm of cyber physical social systems and defined a uniform definition of it. To overcome the complexity of evaluating cyber resilience, especially in these inhomo- geneous systems, we proposed a framework including applying Attack Tree refinements and Hierarchical Timed Coloured Petri Nets to model intruder and defender behaviors and evaluate the impact of each action on the behavior and performance of the system.Hoje em dia, proteger a rede não é a única preocupação de segurança. Ainda assim, na segurança cibernética, sites e servidores estão se tornando mais populares como alvos devido à facilidade com que podem ser acessados quando comparados às redes de comu- nicação. Outra ameaça em sistemas sociais ciberfisicos com interações humanas é que eles podem ser atacados e manipulados não apenas por hackers técnicos através de redes, mas também pela manipulação de pessoas e roubo de credenciais de utilizadores. Portanto, os sistemas devem ser avaliados para além da segurança cibernética, o que significa medir sua resiliência como uma evidência de que um sistema funciona adequadamente sob ataques ou incidentes cibernéticos. Dessa forma, a resiliência cibernética é cada vez mais discutida e descrita como a capacidade de um sistema manter a consciência do estado para detectar ataques cibernéticos. Todas as tarefas para tornar um sistema resiliente devem manter proativamente um nível seguro de normalidade operacional por meio da reconfi- guração rápida do sistema para detectar ataques que afetariam o desempenho do sistema. Neste trabalho, um novo paradigma de sistemas sociais ciberfisicos é amplamente estu- dado e uma definição uniforme é proposta. Para superar a complexidade de avaliar a resiliência cibernética, especialmente nesses sistemas não homogéneos, é proposta uma estrutura que inclui a aplicação de refinamentos de Árvores de Ataque e Redes de Petri Coloridas Temporizadas Hierárquicas para modelar comportamentos de invasores e de- fensores e avaliar o impacto de cada ação no comportamento e desempenho do sistema

    Tennessee Highway Safety Office Highway Safety Plan FY 2020

    Get PDF
    https://digitalcommons.memphis.edu/govpubs-tn-safety-homeland-security-highway-safety-office/1005/thumbnail.jp

    Strengthening Access Control in case of Compromised Accounts in Smart Home

    Get PDF
    corecore