2015
DOI: 10.1007/978-3-319-18802-7_13
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Impact of Denial of Service Attacks on Centralized Control in Smart Cities

Abstract: The increasing threat of Denial of Service (DoS) attacks targeting Smart City systems impose unprecedented challenges in terms of service availability, especially against centralized control platforms due to their single point of failure issue. The European ARTEMIS co-funded project ACCUS (Adaptive Cooperative Control in Urban (sub)Systems) is focused on a centralized Integration and Coordination Platform (ICP) for urban subsystems to enable real-time collaborative applications across them and optimize their c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…The source data were the results of measuring the parameters of the received incoming streams in the SM. The simulation and the analytical calculation [3,4,[21][22][23]25, 26] of the bandwidth used in the CIS or MCIS were conducted for different sets of heterogeneous implementations of the streams k 1 and k 3 . Table 1 shows the data obtained during the simulation experiment -the time of the delay and the probability of the query loss, as well as the comparative parameters of the expected features.…”
Section: The Results Of a Simulation Modelling Of Cyberattacks For Hementioning
confidence: 99%
See 3 more Smart Citations
“…The source data were the results of measuring the parameters of the received incoming streams in the SM. The simulation and the analytical calculation [3,4,[21][22][23]25, 26] of the bandwidth used in the CIS or MCIS were conducted for different sets of heterogeneous implementations of the streams k 1 and k 3 . Table 1 shows the data obtained during the simulation experiment -the time of the delay and the probability of the query loss, as well as the comparative parameters of the expected features.…”
Section: The Results Of a Simulation Modelling Of Cyberattacks For Hementioning
confidence: 99%
“…There are studies on models and algorithms for detection of cyberattacks that take into account queries in modules of "client-bank" systems, electronic invoices and communication systems [4,5], the flow rate of requirements [6,7], the interval between the requirements [8,9], and the types of queries [10][11][12]. However, these studies do not consider the use of information systems of a variable structure, including the ones equipped with multiple servers and cyberdefence components, that are able to deal with a complex behaviour of query queues in terms of their heterogeneity (conflict).…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 2 more Smart Citations
“…The most important part for policymakers is to understand that 'smart' can be taken in many ways [67]. As the smart city contains different types of sensors and computers are embedded in the system that is prone to deceive, deviation, malicious nodes, and outside attack [68][69][70][71].…”
Section: Safety and Functional Impacts Vs Monetary Impactsmentioning
confidence: 99%