Secure Internet of Things (IoT)-based smart-world critical infrastructures: Survey, case study and research opportunities

X Liu, C Qian, WG Hatcher, H Xu, W Liao, W Yu - IEEE Access, 2019 - ieeexplore.ieee.org
X Liu, C Qian, WG Hatcher, H Xu, W Liao, W Yu
IEEE Access, 2019ieeexplore.ieee.org
The widespread adoption of the Internet of Things (IoT) technologies has drastically
increased the breadth and depth of attack surfaces in networked systems, providing new
mechanisms for the intrusion. In the context of smart-world critical infrastructures and cyber-
physical systems, the rapid adoption of the IoT systems and infrastructures without thorough
consideration for the risks and vulnerabilities has the potential for catastrophic damage to
the privacy, safety, and security of individuals and corporations. While the IoT systems have …
The widespread adoption of the Internet of Things (IoT) technologies has drastically increased the breadth and depth of attack surfaces in networked systems, providing new mechanisms for the intrusion. In the context of smart-world critical infrastructures and cyber-physical systems, the rapid adoption of the IoT systems and infrastructures without thorough consideration for the risks and vulnerabilities has the potential for catastrophic damage to the privacy, safety, and security of individuals and corporations. While the IoT systems have the potential to increase productivity, accountability, traceability, and efficiency, their potential weaknesses are also more abundant. In this paper, we provide critical consideration of the security of the IoT systems as applied to smart-world critical infrastructures. Particularly, we carry out a detailed assessment of vulnerabilities in IoT-based critical infrastructures from the perspectives of applications, networking, operating systems, software, firmware, and hardware. In addition, we highlight the three key critical infrastructure IoT-based cyber-physical systems, namely the smart transportation, smart manufacturing, and smart grid. Moreover, we provide a broad collection of attack examples upon each of the key applications. Furthermore, we introduce a case study, in which we assess the impacts of potential attacks on critical IoT-based systems, using the smart transportation system as an example. Finally, we provide a set of best practices and address the necessary steps to enact countermeasures for any generic IoT-based critical infrastructure system.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果