2018
DOI: 10.1109/jiot.2018.2822842
|View full text |Cite
|
Sign up to set email alerts
|

IIoT Cybersecurity Risk Modeling for SCADA Systems

Abstract: Urban critical infrastructure such as electric grids, water networks, and transportation systems are prime targets for cyberattacks. These systems are composed of connected devices which we call the Industrial Internet of Things (IIoT). An attack on urban critical infrastructure IIoT would cause considerable disruption to society. Supervisory control and data acquisition (SCADA) systems are typically used to control IIoT for urban critical infrastructure. Despite the clear need to understand the cyber risk to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
47
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 109 publications
(47 citation statements)
references
References 14 publications
0
47
0
Order By: Relevance
“…There are a large number of alreadydeployed devices that are difficult to upgrade or patch, making critical infrastructures inflexible for efficient handling of potential faults and attacks. In contrast, the new IoT devices are connected to the Internet, and therefore, they are vulnerable to cyberattacks and can be easily compromised [6], [36]. • Communication infrastructure.…”
Section: Critical Infrastructures In Industry 40mentioning
confidence: 99%
“…There are a large number of alreadydeployed devices that are difficult to upgrade or patch, making critical infrastructures inflexible for efficient handling of potential faults and attacks. In contrast, the new IoT devices are connected to the Internet, and therefore, they are vulnerable to cyberattacks and can be easily compromised [6], [36]. • Communication infrastructure.…”
Section: Critical Infrastructures In Industry 40mentioning
confidence: 99%
“…The attacker may be able to enter wrong values that can make the system unstable. Moreover, since these systems are not checked regularly due to their deterministic nature, this attack might stay undetected for a long time [12].…”
Section: A Prevalent Attacksmentioning
confidence: 99%
“…To ensure the security of a SCADA system, several techniques can be used. Some of these techniques include a security technique focused on the communication channel or network as discussed in [27][28][29], a technique focused on protecting the hardware components as in [30], and a data-driven technique focused on protecting the cloud server as discussed in [6,25,31,32], or a combination of two or more of these techniques [27,33]. The SCADA system proposed in this work considers a combination of some of these security techniques, including the private network management and the data-driven private cloud server management techniques.…”
Section: Literature Reviewmentioning
confidence: 99%