2017 International Caribbean Conference on Devices, Circuits and Systems (ICCDCS) 2017
DOI: 10.1109/iccdcs.2017.7959707
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things as an attack vector to critical infrastructures of cities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…An important implication of cyber-attacks that target Smart Airport infrastructure, is that reliability can be greatly affected. Critical infrastructure such as Smart Airports relies on the accurate and consistent orchestration of services from various systems, including contemporary IoT-powered systems, to improve efficiency, accelerate production, locate resources and prioritise actions such as repairs [21]. However, cyber-attackers can compromise IoT devices, and cause disruptions to occur, by either manipulating the input/output data of IoT devices, or by disabling them as a result of DoS attacks [195].…”
Section: Cyber Security Reliability Implicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…An important implication of cyber-attacks that target Smart Airport infrastructure, is that reliability can be greatly affected. Critical infrastructure such as Smart Airports relies on the accurate and consistent orchestration of services from various systems, including contemporary IoT-powered systems, to improve efficiency, accelerate production, locate resources and prioritise actions such as repairs [21]. However, cyber-attackers can compromise IoT devices, and cause disruptions to occur, by either manipulating the input/output data of IoT devices, or by disabling them as a result of DoS attacks [195].…”
Section: Cyber Security Reliability Implicationsmentioning
confidence: 99%
“…As a result, the reliability of services powered by IoT devices in Smart Airports and critical infrastructure is at risk from cyber-attacks that can tamper with data, causing sensors to report erroneous information or make devices and systems entirely unavailable through denial of service attacks [11], [20]. Besides the degradation to services that can result from IoT devices being compromised, another danger is that they can be used as an attack vector to penetrate otherwise secured networks [21], [22]. This can be a considerable cyber threat for smart airports, as cyberattacks can be launched and target critical systems, resulting in flight disruptions, tampering with automatic checking devices and baggage location systems or otherwise degrade the quality of service and the experience of passengers [23].…”
Section: Introductionmentioning
confidence: 99%
“…Such a combination is called the binomial sequence decomposition (BSD) of the sequence under consideration. 3. The linear complexity of the binomial sequence ( n i ) with i ≥ 0 is LC = i + 1, see [13] (Theorem 13).…”
Section: Binomial Coeff Binomial Sequences {(mentioning
confidence: 99%
“…Low-cost IoT devices, currently characterized by their resource constraints in processing power, memory, size and energy consumption, are also recognizable by their minimal or non-existent security. Combining this lack of security with their network dependability, they become the perfect target as a gateway to the whole network [3]. There are already some attacks where a vulnerable IoT sensor was used to gain control over the whole system (in [4], wireless sensors are used to gain access to an automotive system).…”
Section: Introductionmentioning
confidence: 99%
“…Ubiquitous devices such as IoT are characterized by their constraints on energy consumption, processing power, memory, and size, which makes harder to keep them secure. Combining their network dependability with their low security features, they became the perfect target for gaining control of the applications and systems behind them [3]. A good example where a vulnerable IoT sensor was used to gain control over the whole system can be found here [4].…”
Section: Introductionmentioning
confidence: 99%