366 research outputs found

    Cybersecurity of Industrial Cyber-Physical Systems: A Review

    Get PDF
    Industrial cyber-physical systems (ICPSs) manage critical infrastructures by controlling the processes based on the "physics" data gathered by edge sensor networks. Recent innovations in ubiquitous computing and communication technologies have prompted the rapid integration of highly interconnected systems to ICPSs. Hence, the "security by obscurity" principle provided by air-gapping is no longer followed. As the interconnectivity in ICPSs increases, so does the attack surface. Industrial vulnerability assessment reports have shown that a variety of new vulnerabilities have occurred due to this transition while the most common ones are related to weak boundary protection. Although there are existing surveys in this context, very little is mentioned regarding these reports. This paper bridges this gap by defining and reviewing ICPSs from a cybersecurity perspective. In particular, multi-dimensional adaptive attack taxonomy is presented and utilized for evaluating real-life ICPS cyber incidents. We also identify the general shortcomings and highlight the points that cause a gap in existing literature while defining future research directions.Comment: 32 pages, 10 figure

    A Cognitive Framework to Secure Smart Cities

    Get PDF
    The advancement in technology has transformed Cyber Physical Systems and their interface with IoT into a more sophisticated and challenging paradigm. As a result, vulnerabilities and potential attacks manifest themselves considerably more than before, forcing researchers to rethink the conventional strategies that are currently in place to secure such physical systems. This manuscript studies the complex interweaving of sensor networks and physical systems and suggests a foundational innovation in the field. In sharp contrast with the existing IDS and IPS solutions, in this paper, a preventive and proactive method is employed to stay ahead of attacks by constantly monitoring network data patterns and identifying threats that are imminent. Here, by capitalizing on the significant progress in processing power (e.g. petascale computing) and storage capacity of computer systems, we propose a deep learning approach to predict and identify various security breaches that are about to occur. The learning process takes place by collecting a large number of files of different types and running tests on them to classify them as benign or malicious. The prediction model obtained as such can then be used to identify attacks. Our project articulates a new framework for interactions between physical systems and sensor networks, where malicious packets are repeatedly learned over time while the system continually operates with respect to imperfect security mechanisms

    The 2004 election in Spain : terrorism, accountability, and voting

    Get PDF
    In this paper the electoral consequences of the Islamist terrorist attacks on March 11, 2004 are analysed. According to a quantitative analysis based on a post-electoral survey, we show the causal mechanisms that transform voters' reactions to the bombings into a particular electoral behaviour and estimate their relevance in the electoral results on March 14, 200

    SoK: Security of Programmable Logic Controllers

    Full text link
    Billions of people rely on essential utility and manufacturing infrastructures such as water treatment plants, energy management, and food production. Our dependence on reliable infrastructures makes them valuable targets for cyberattacks. One of the prime targets for adversaries attacking physical infrastructures are Programmable Logic Controllers (PLCs) because they connect the cyber and physical worlds. In this study, we conduct the first comprehensive systematization of knowledge that explores the security of PLCs: We present an in-depth analysis of PLC attacks and defenses and discover trends in the security of PLCs from the last 17 years of research. We introduce a novel threat taxonomy for PLCs and Industrial Control Systems (ICS). Finally, we identify and point out research gaps that, if left ignored, could lead to new catastrophic attacks against critical infrastructures.Comment: 25 pages, 13 figures, Extended version February 2024, A shortened version is to be published in the 33rd USENIX Security Symposium, for more information, see https://efrenlopez.org

    Cybersecurity of industrial cyber-physical systems: a review

    Get PDF
    Industrial cyber-physical systems (ICPSs) manage critical infrastructures by controlling the processes based on the “physics” data gathered by edge sensor networks. Recent innovations in ubiquitous computing and communication technologies have prompted the rapid integration of highly interconnected systems to ICPSs. Hence, the “security by obscurity” principle provided by air-gapping is no longer followed. As the interconnectivity in ICPSs increases, so does the attack surface. Industrial vulnerability assessment reports have shown that a variety of new vulnerabilities have occurred due to this transition. Although there are existing surveys in this context, very little is mentioned regarding the outputs of these reports. While these reports show that the most exploited vulnerabilities occur due to weak boundary protection, these vulnerabilities also occur due to limited or ill defined security policies. However, current literature focuses on intrusion detection systems (IDS), network traffic analysis (NTA) methods, or anomaly detection techniques. Hence, finding a solution for the problems mentioned in these reports is relatively hard. We bridge this gap by defining and reviewing ICPSs from a cybersecurity perspective. In particular, multi-dimensional adaptive attack taxonomy is presented and utilized for evaluating real-life ICPS cyber incidents. Finally, we identify the general shortcomings and highlight the points that cause a gap in existing literature while defining future research directions

    Wildland Firefighter Smoke Exposure Study

    Get PDF
    This report addresses exposure to smoke from wildland and prescribed fires encountered by wildland firefighters. Smoke from vegetation as well as off-gasses from equipment such as chain saws, pumps, and drip torches are accounted for. Section II provides an overview of industrial hygiene science and techniques. Section III is a discussion and literature review of the components in wildland smoke, and section IV identifies the health concerns associated with smoke inhalation and a review of the current literature on exposure to inhalation irritants. Section V covers research that has been done on wildland firefighter smoke exposure. Section VI is an overview of the Wildland Firefighter Smoke Exposure Study, a project I have managed since 2009. This final section describes the objectives, methods, data collection, and analysis of the study. In its entirety, this report can be used to identify locations, times, and firefighter activities that have a high probability of causing high exposures as well as to identify management actions that can mitigate these exposures. Wildland firefighters work in a dynamic environment and are often faced with a variety of hazards from fire to fire and shift to shift. One of the most common, but often overlooked, hazards is exposure to potentially harmful levels of contaminants in wildland smoke. This may also be one of the least understood risks of wildland firefighting (Reisen et al., 2009). With a growing body of information regarding the potential health effects of vegetative smoke to respiratory and cardiovascular systems, it became apparent to United States Forest Service (USFS) fire management officials that more research needed to be done. The USFS realized the need for current, valid data to accurately assess the exposure wildland firefighters and personnel at fire camps experience during their work shift. Unlike municipal firefighters, wildland firefighters do not wear respiratory protection equipment such as a self-contained breathing apparatus (SCBA). Without SCBA, wildland firefighters are subject to exposure from a variety of inhalation irritants ranging from carbon monoxide, aldehydes, particulate matter, crystalline silica, and polycyclic aromatic hydrocarbons. Some of the compounds in wildland fire smoke are known or suspected carcinogens. Health effects include short-term conditions such as headaches, fatigue, and nausea, while long-term health effects may include an increased risk of cardio-vascular disease. In order to assess the long-term risks associated with wildland firefighting, a comprehensive study of exposure was necessary. By identifying the conditions and activities that lead to high exposure, firefighters and fire managers can be better prepared to reduce these exposures. This study focused on wildland firefighters engaged in the suppression of wildland fires and working on prescribed fires primarily on federally-managed lands (forests and rangelands) throughout the United States. Study subjects included any firefighter employed by the following federal land management agencies: US Forest Service, National Park Service, Fish and Wildlife Service, Bureau of Indian Affairs, and the Bureau of Land Management, as well as employees contracted by these federal agencies. Firefighters employed by various states are also included in the study, as well as those engaged in initial attack and project fires. Study subjects also included fire support personnel who work at incident command posts (ICPs) and spike camps. Fire suppression and management of prescribed fires involves many different activities. In order to successfully account for differences in exposure among firefighters, these activities were monitored and recorded during the data collection phase

    Continuous variable direct secure quantum communication using Gaussian states

    Full text link
    Continuous variable one-way and controlled-two-way secure direct quantum communication schemes have been designed using Gaussian states. Specifically, a scheme for continuous variable quantum secure direct communication and another scheme for continuous variable controlled quantum dialogue are proposed using single-mode squeezed coherent states. The security of the proposed schemes against a set of attacks (e.g., Gaussian quantum cloning machine and intercept resend attacks) has been proved. Further, it is established that the proposed schemes do not require two-mode squeezed states which are essential for a set of existing proposals. The controlled two-way communication scheme is shown to be very general in nature as it can be reduced to schemes for various relatively simpler cryptographic tasks like controlled deterministic secure communication, quantum dialogue, quantum key distribution. In addition, it is briefly discussed that the proposed schemes can provide us tools to design quantum cryptographic solutions for several socioeconomic problems.Comment: Continuous Variable protocols are designed for one-way and controlled-two-way secure direct quantum communication using single-mode squeezed coherent state
    corecore