[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology

Published: 01 December 2022 Publication History

Abstract

Abstract

This work is devoted to the study and systematization of cyber threats to large-scale cyber-physical systems (CPSs) with a dynamic network infrastructure. The proposed systematization provides a one-time view of the specifics of such systems in terms of security, attacker’s goals, and levels of the TCP/IP network stack. In general, the systematization is the basis for creating a new technology for protecting complex dynamic systems, allowing one to gain knowledge about what network interaction parameters need to be controlled to protect against certain cyber threats.

References

[1]
Narasimhan, V.L., Arvind, A.A., and Bever, K., Greenhouse asset management using wireless sensor-actuator networks, Int. Conf. on Mobile Ubiquitous Computing, Systems, Services and Technologies, Papeete, France, 2007, IEEE, 2007, pp. 9–14.  
[2]
Jovanov E., Milenkovic A., Otto C., and de Groen P.C. A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation J. Neuroeng. Rehab. 2005 2 6
[3]
Poon C.C.Y. and Zhang Yu.-T. IEEE Commun. Mag. 2006 44 73-81
[4]
Kalinin, M., Krundyshev, V., Zegzhda, P., and Belenko, V., Network security architectures for VANET, SIN ’17: Proc. 10th Int. Conf. on Security of Information and Networks, Jaipur, India, 2017, New York: Association for Computing Machinery, 2017, pp. 73–79.  
[5]
Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, 2018 IEEE Int. Black Sea Conf. on Communications and Networking (BlackSeaCom), Batumi, Georgia, 2018, IEEE, 2018, pp. 4–7.  
[6]
Tseng Yu-Ch Pan, M.-Sh., and Tsai, Yu.-Yu., Wireless sensor networks for emergency navigation IEEE Comput. 2006 39 55-62
[7]
Pan M-Sh., Tsai Ch.-H., and Tseng Yu-Ch. Emergency guiding and monitoring applications in indoor 3D environments by wireless sensor networks Int. J. Sensor Networks 2006 1 2-10
[8]
Li, Mo, Liu, Yu., Wang, J., and Yang, Zh., Sensor network navigation without locations, IEEE INFOCOM 2009, Rio de Janeiro, 2009, IEEE, 2009, pp. 2419–2427.  
[9]
Lo, Ch.-H., Peng, W.-Ch., Chen, Ch.-W., Lin, T.-Yu, and Lin, Ch.-Sh., CarWeb: A traffic data collection platform, The Ninth Int. Conf. on Mobile Data Management (mdm 2008), Beijing, 2008, IEEE, 2008, pp. 221–222.  
[10]
Kalinin, M., Krundyshev, V., and Zegzhda, P., Artificial swarm algorithm for VANET protection against routing attacks, 2018 IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, 2018, IEEE, 2018, pp. 795–800.  
[11]
Thiagarajan, A., Ravindranath, L., LaCurts, K., Madden, S., Balakrishnan, H., Toledo, S., and Eriksson, J., VTrack: Accurate, energy-aware road traffic delay estimation using mobile phones, SenSys ’09: Proc. 7th ACM Conf. on Embedded Networked Sensor Systems, Berkeley, Calif.: 2009, New York: Association for Computing Machinery, 2009, pp. 85–98.  
[12]
Mathur, S., Jin. T., Kasturirangan, N., Chandrashekharan, J., Xue, W., Gruteser, M., and Trappe, W., ParkNet: Drive-by sensing of road-side parking statistics, MobiSys ’10: Proc. 8th Int. Conf. on Mobile Systems, Applications, and Services, San Francisco, 2010, New York: Association for Computing Machinery, 2010, pp. 123–136.  
[13]
Rani V. and Dhir R. A study of ad-hoc network: A review Int. J. Adv. Res. Comput. Sci. Software Eng. 2013 3 135-138
[14]
Amulya, V.V., Cyber physical systems by using wireless sensor networks, 2018.
[15]
Upadhyayula, S., Annamalai, V., and Gupta, S.K.S., A low-latency and energy-efficient algorithm for convergecast in wireless sensor networks, GLOBECOM ’03: IEEE Global Telecommunications Conf., San Francisco, 2003, IEEE, 2003, pp. 3525–3530.  
[16]
Intanagonwiwat, C., Govindan, R., and Estrin, D., Directed diffusion: a scalable and robust communication paradigm for sensor networks, MobiCom ’00: Proc. 6th Annu. Int. Conf. on Mobile Computing and Networking, Boston, 2000, New York: Association for Computing Machinery, 2000, pp. 56–67.  
[17]
Lee H.-Ch. and Banerjee A. Fang, Yao-M., Lee, B.-J., and King, Ch.-Ta, Design of a multifunctional wireless sensor for in-situ monitoring of debris flows IEEE Trans. Instrum. Meas. 2010 59 2958-2967
[18]
Wang, X., Xing, G., Zhang, Yu., Lu, Ch., Pless, R., and Gill, C., Integrated coverage and connectivity configuration in wireless sensor networks, SenSys ’03: Proc. 1st Int. Conf. on Embedded Networked Sensor Systems, 2003, New York: Association for Computing Machinery, Los Angeles, 2003, pp. 28–39.  
[19]
Giraldo J., Sarkar E., Cardenas A.A., Maniatakos M., and Kantarcioglu M. Security and privacy in cyber-physical systems: A survey of surveys IEEE Des. Test 2017 34 7-17
[20]
Nazarenko A.A. and Safdar G.A. Survey on security and privacy issues in cyber physical systems AIMS Electron. Electr. Eng. 2019 3 111-143
[21]
Swetha M.S., Thungamani M., and Krishnan K. A Survey on different types of MANET attacks in OSI model Int. J. Innovative Res. Sci. Technol. 2018 4 18-23
[22]
Attawy R. and Youssef A.M. Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices IEEE Access 2016 4 959-979
[23]
Wu, B., Chen, J., Wu, J., and Cardei, M., A survey of attacks and countermeasures in mobile ad hoc networks, Wireless Network Security, Xiao, Y., Shen, X.S., and Du, D.Z., Eds., Signals and Communication Technology, Boston: Springer, 2007, pp. 103–135.  
[24]
Yang H., Luo H., Ye F., Lu S., and Zhang L. Security in mobile ad hoc networks: challenges and solutions IEEE Wireless Commun. 2004 11 38-47
[25]
Lacharité, Y., Wang, M., and Lamont, L., Findings on a semantically-based intrusion detection approach for olsr manet protocol, 3rd OLSR Interop Workshop, 2006, pp. 2–6.
[26]
Jenniefer, A. and Jose, J., Techniques for identifying denial of service attack in wireless sensor network: A survey, Int. J. Adv. Res. Comput. Commun. Eng., 2014, vol. 3.
[27]
Saluja K.K. and Kakkar P. The DDOS attacks in MANET-a review J. Inf. Syst. Commun. 2012 3 310

Cited By

View all
  • (2023)Graph-Based Self-Regulation for Different Types of Networks with Adaptive TopologyAutomatic Control and Computer Sciences10.3103/S014641162308021757:8(1055-1062)Online publication date: 1-Dec-2023
  • (2023)Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their ConnectivityAutomatic Control and Computer Sciences10.3103/S014641162308015157:8(1103-1115)Online publication date: 1-Dec-2023

Index Terms

  1. Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Automatic Control and Computer Sciences
        Automatic Control and Computer Sciences  Volume 56, Issue 8
        Dec 2022
        220 pages

        Publisher

        Allerton Press, Inc.

        United States

        Publication History

        Published: 01 December 2022
        Accepted: 18 July 2022
        Revision received: 12 July 2022
        Received: 01 July 2022

        Author Tags

        1. ad hoc networks
        2. MANET
        3. wireless sensor networks
        4. cyber threat
        5. TCP/IP stack

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 14 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)Graph-Based Self-Regulation for Different Types of Networks with Adaptive TopologyAutomatic Control and Computer Sciences10.3103/S014641162308021757:8(1055-1062)Online publication date: 1-Dec-2023
        • (2023)Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their ConnectivityAutomatic Control and Computer Sciences10.3103/S014641162308015157:8(1103-1115)Online publication date: 1-Dec-2023

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media