Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities

被引:85
作者
Liu, Xing [1 ]
Qian, Cheng [1 ]
Hatcher, William Grant [1 ]
Xu, Hansong [1 ]
Liao, Weixian [1 ]
Yu, Wei [1 ]
机构
[1] Towson Univ, Dept Comp & Informat Sci, Towson, MD 21252 USA
基金
美国国家科学基金会;
关键词
Cyber-physical systems; Internet of Things; security; critical infrastructure; case study; computing infrastructure; DATA INTEGRITY ATTACKS; FALSE DATA-INJECTION; REAL-TIME DETECTION; INDUSTRIAL INTERNET; STATE ESTIMATION; ROUTE GUIDANCE; SYSTEM; PRIVACY; DEFENSE; SCHEME;
D O I
10.1109/ACCESS.2019.2920763
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread adoption of the Internet of Things (IoT) technologies has drastically increased the breadth and depth of attack surfaces in networked systems, providing new mechanisms for the intrusion. In the context of smart-world critical infrastructures and cyber-physical systems, the rapid adoption of the IoT systems and infrastructures without thorough consideration for the risks and vulnerabilities has the potential for catastrophic damage to the privacy, safety, and security of individuals and corporations. While the IoT systems have the potential to increase productivity, accountability, traceability, and efficiency, their potential weaknesses are also more abundant. In this paper, we provide critical consideration of the security of the IoT systems as applied to smart-world critical infrastructures. Particularly, we carry out a detailed assessment of vulnerabilities in IoT-based critical infrastructures from the perspectives of applications, networking, operating systems, software, firmware, and hardware. In addition, we highlight the three key critical infrastructure IoT-based cyber-physical systems, namely the smart transportation, smart manufacturing, and smart grid. Moreover, we provide a broad collection of attack examples upon each of the key applications. Furthermore, we introduce a case study, in which we assess the impacts of potential attacks on critical IoT-based systems, using the smart transportation system as an example. Finally, we provide a set of best practices and address the necessary steps to enact countermeasures for any generic IoT-based critical infrastructure system.
引用
收藏
页码:79523 / 79544
页数:22
相关论文
共 173 条
[1]  
Abdulkader Z.A., 2018, J COMPUT, V29, P1, DOI [10.3966/199115992018042902001, DOI 10.3966/199115992018042902001]
[2]   IoT-enabled smart grid via SM: An overview [J].
Al-Turjman, Fadi ;
Abujubbeh, Mohammad .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :579-590
[3]   Toward Social Internet of Vehicles: Concept, Architecture, and Applications [J].
Alam, Kazi Masudul ;
Saini, Mukesh ;
El Saddik, Abdulmotaleb .
IEEE ACCESS, 2015, 3 :343-357
[4]  
Alqassem I, 2014, IN C IND ENG ENG MAN, P1244, DOI 10.1109/IEEM.2014.7058837
[5]   SODA: Strategy-Proof Online Double Auction Scheme for Multimicrogrids Bidding [J].
An, Dou ;
Yang, Qingyu ;
Yu, Wei ;
Yang, Xinyu ;
Fu, Xinwen ;
Zhao, Wei .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (07) :1177-1190
[6]  
[Anonymous], ZIGBEES WIRELESS SEC
[7]  
[Anonymous], MED DATA SECURITY BI
[8]  
[Anonymous], TECH REP
[9]  
[Anonymous], 2015, 2015 24 INT C COMP C
[10]  
[Anonymous], IEEE T DEPENDABLE SE