A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services

被引:232
作者
Stellios, Ioannis [1 ]
Kotzanikolaou, Panayiotis [1 ]
Psarakis, Mihalis [1 ]
Alcaraz, Cristina [2 ]
Lopez, Javier [2 ]
机构
[1] Univ Piraeus, Dept Informat, Piraeus 18534, Greece
[2] Univ Malaga, Dept Comp Sci, E-29071 Malaga, Spain
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2018年 / 20卷 / 04期
关键词
Internet of Things; cyber attacks; smart grids; SCADA; intelligent transportation systems; smart medical systems; smart home; critical infrastructures; IMPLANTABLE CARDIAC DEFIBRILLATORS; WIRELESS SENSOR NETWORKS; HOME AUTOMATION NETWORKS; SECURITY CHALLENGES; ELECTRIC VEHICLES; INTERNET; THINGS; INFORMATION; PROTOCOL; PERFORMANCE;
D O I
10.1109/COMST.2018.2855563
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the deployment of Internet of Things (IoT) is experiencing an exponential growth, it is no surprise that many recent cyber attacks are IoT-enabled: the attacker initially exploits some vulnerable IoT technology as a first step toward compromising a critical system that is connected, in some way, with the IoT. For some sectors, like industry, smart grids, transportation, and medical services, the significance of such attacks is obvious, since IoT technologies are part of critical back-end systems. However, in sectors where IoT is usually at the end-user side, like smart homes, such attacks can be underestimated, since not all possible attack paths are examined. In this paper, we survey IoT-enabled cyber attacks, found in all application domains since 2010. For each sector, we emphasize on the latest, verified IoT-enabled attacks, based on known real-world incidents and published proof-of-concept attacks. We methodologically analyze representative attacks that demonstrate direct, indirect, and subliminal attack paths against critical targets. Our goal is threefold: 1) to assess IoT-enabled cyber attacks in a risk-like approach, in order to demonstrate their current threat landscape; 2) to identify hidden and subliminal IoT-enabled attack paths against critical infrastructures and services; and 3) to examine mitigation strategies for all application domains.
引用
收藏
页码:3453 / 3495
页数:43
相关论文
共 262 条
[1]   Secure routing for internet of things: A survey [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :198-213
[2]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[3]   A comprehensive survey on vehicular Ad Hoc network [J].
Al-Sultan, Saif ;
Al-Doori, Moath M. ;
Al-Bayatti, Ali H. ;
Zedan, Hussien .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 37 :380-392
[4]  
Alcaraz Cristina, 2012, Critical Infrastructure Protection. Information Infrastructure Models, Analysis, and Defense: LNCS 7130, P120, DOI 10.1007/978-3-642-28920-0_7
[5]  
Alcaraz C., 2010, 1 INT WORKSH SEC INT, P1
[6]  
Alcaraz C, 2017, ADV INF SECUR PRIV, P137, DOI 10.4018/978-1-5225-1829-7.ch008
[7]   OCPP Protocol: Security Threats and Challenges [J].
Alcaraz, Cristina ;
Lopez, Javier ;
Wolthusen, Stephen .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) :2452-2459
[8]   Critical infrastructure protection: Requirements and challenges for the 21st century [J].
Alcaraz, Cristina ;
Zeadally, Sherali .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 8 :53-66
[9]   Critical Control System Protection in the 21st Century [J].
Alcaraz, Cristina ;
Zeadally, Sherali .
COMPUTER, 2013, 46 (10) :74-83
[10]   Security of industrial sensor network-based remote substations in the context of the Internet of Things [J].
Alcaraz, Cristina ;
Roman, Rodrigo ;
Najera, Pablo ;
Lopez, Javier .
AD HOC NETWORKS, 2013, 11 (03) :1091-1104