2014
DOI: 10.1007/978-3-662-45355-1_14
|View full text |Cite
|
Sign up to set email alerts
|

Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems

Abstract: This paper describes a next-generation security information and event management (SIEM) platform that performs real-time impact assessment of cyber attacks that target monitoring and control systems in interdependent critical infrastructures. To assess the effects of cyber attacks on the services provided by critical infrastructures, the platform combines security analysis with simulations produced by the Infrastructure Interdependencies Simulator (i2Sim). The approach is based on the mixed holistic reductioni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Therefore, many researchers and projects were focused on SCADA/ICS cyber protection [30][31][32], WSN protection etc. [33,34]. However, mission critical cyber physical systems and critical infrastructures can be also targeted by cyber attacks on the application layer and web services/applications.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, many researchers and projects were focused on SCADA/ICS cyber protection [30][31][32], WSN protection etc. [33,34]. However, mission critical cyber physical systems and critical infrastructures can be also targeted by cyber attacks on the application layer and web services/applications.…”
Section: Related Workmentioning
confidence: 99%
“…Agent v 2 periodically monitors the water flow rates and water levels measured by the sensors and uses them to check for security violations that could cause a turbine control malfunction. As explained in [10], two conditions hold in a generic dam under normal conditions: (C1) the difference between the water flow rates as measured by two water flow sensors located at the extremes of the penstock (W F 1 and W F 2 in the scenario) should disappear within about three seconds; and (C2) the variation in the water level in the basin of the dam (W L in the scenario) should be consistent with the variations in the incoming and outgoing water flows. Although the violation of each individual condition cannot be considered to be a consequence of a cyber attack, but rather a physical failure, violations of both conditions can increase the credibility of a cyber attack.…”
Section: Dam and Hydroelectric Power Stationmentioning
confidence: 99%
“…The frame of discernment is Ω = {a, b, c, d} where a denotes a possible physical failure, b a possible cyber intrusion or attack, c a possible physical security threat and d a normal functioning level. Figure 3 presents the case study scenario derived from [10], which involves a dam that feeds a hydroelectric power station that, in turn, feeds a power distribution substation through a transmission network (not modeled for simplicity). A base transceiver station (BTS) provides telecommunications services and receives electricity from the power distribution station.…”
Section: Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…Assume that the set of systems is geographically distributed and generically corresponds to the infrastructures of a city district. The scenario, derived from [10], incorporates a hydroelectric power station that feeds a power distribution station through a transmission network (not modeled for simplicity). A base transceiver station (BTS) provides telecommunications services required by the SCADA systems of the power distribution station and water pumping station.…”
Section: Motivationmentioning
confidence: 99%