Short Communication - (2022) Volume 15, Issue 10
Received: 07-Oct-2022, Manuscript No. jcsb-22-84877;
Editor assigned: 08-Oct-2022, Pre QC No. P-84877;
Reviewed: 21-Oct-2022, QC No. Q-84877;
Revised: 26-Oct-2022, Manuscript No. R-84877;
Published:
03-Nov-2022
, DOI: 10.37421/0974-7230.2022.15.439
Citation: Hausman, John. “A Strategy to Evaluating Cybersecurity Risk in Internet of Things-Enabled Transport Networks.” J Comput Sci Syst Biol
15 (2022):439.
Copyright: © 2022 Hausman J. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
A critical transportation infrastructure integrated with a wireless sensor network based on the Internet of Things functions as a cyber-physical system. However, due to inherent cyber vulnerabilities of IoT devices and a lack of control barriers that could protect it, the new form of IoT enabled transportation infrastructure is vulnerable to cyber-physical attacks in the sensing area. Traditional risk assessment processes treat the physical and cyber spaces as separate environments, resulting in stakeholders (i.e., operators, civil and security engineers) failing to assess IoT enabled transportation infrastructure for cyber-physical attacks. This paper proposes a new risk assessment approach for cyber-physical attacks on IoT-based wireless sensor networks.
Until recently, critical infrastructure was thought to exist in a separate cyber or physical environment. However, critical infrastructure's increasing reliance on advanced technologies (e.g., the Internet of Things (IoT)) has enabled the integration of the physical world with computational facilities and the operation of critical infrastructure as a cyber-physical system. A significant number of IoT applications have recently been introduced in the domain of critical transportation infrastructure, providing reliable services with less human intervention. These services include, but are not limited to, an early warning system against hazards (e.g., scour) and a smart management system in the life cycle assessment of a bridge.
The approach is based on the identification and proposal of novel cyberphysical characteristics, such as threat source (e.g., motives), vulnerability (e.g., lack of authentication mechanisms), and physical impact types (e.g., casualties). The level and importance of these characteristics are used to calculate cyber-physical risk [1-3]. To evaluate the results of an IoT enabled bridge subjected to cyber-physical attack scenarios, Monte Carlo simulations and sensitivity analysis are used. According to the findings, 76.6% of simulated cases are high-risk, and control barriers operating in physical and cyber space can reduce cyber-physical risk by 71.8%. Furthermore, cyber-physical risk differs when the significance of the characteristics considered during risk assessment is overlooked.
Advances in IoT technology have revealed the potential for several applications in the field of structural health monitoring and damage assessment (e.g., monitoring through image processing). These Internet of Things applications improve the ability to automate processes, allowing civil engineering professionals to make informed decisions about the structural health of their systems. Such IoT applications would be impossible to realise without the use of an IoT-based wireless sensors network (WSN) as a key technology that enables connectivity with the physical environment within their layered architecture. The fundamental three-layer IoT architecture consists of the sensing, network, and application layers, each defined by its functions and devices. IoT devices (e.g., sensors, gateways) located in physical space (e.g., the deck of a bridge) as part of the sensing layer, detect, collect, and process data collaboratively [4,5]. The network layer enables wireless data transmission by leveraging recent advances in wireless network protocols (e.g., ZigBee, Bluetooth). Through the application layer, this data is sent to the end-user for data analytics and processing.
Quantitative scores are used to evaluate the level and significance of cyber-physical characteristics. To demonstrate the application and utility of the approach, an illustrative, yet realistic, case study of an IoT enabled bridge being subjected to a cyber-physical attack (i.e., energy depletion attack) against its IoT based WSN is used. The cyber-physical attack is divided into four scenarios based on the use of various control barriers that can prevent and detect cyber-physical attacks. Control barriers can operate separately or concurrently in cyberspace (e.g., intrusion detection systems) and physical space (e.g., motion detectors) (i.e., integrated control barriers).
None.
Authors declare no conflict of interest.
Google Scholar, Crossref, Indexed at
Google Scholar, Crossref, Indexed at
Google Scholar, Crossref, Indexed at
Google Scholar, Crossref, Indexed at
Journal of Computer Science & Systems Biology received 2279 citations as per Google Scholar report