Abstract
Sensor Networks are becoming ubiquitous as they are deployed in many applications, from the consumer electronics, home appliances, and modern vehicles to critical infrastructures and industrial control systems. With the promise of improved user experience, maintainability and automation, these sensor networks interconnect and communicate over the Internet by employing Internet-aware embedded systems: IoT devices. With such capabilities, not only can management and control systems better manage the sensor network’s efficiency and capabilities, so too can the attackers gain insight and leverage these networks and devices for malicious intent. This paper provides an overview of the evolving threats and technology trends to help address them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Khaitan, S.K., McCalley, J.D.: Design techniques and applications of cyberphysical systems: a survey. IEEE Syst. J. 9(2), 350–365
Daily, J., Peterson, J.: Predictive maintenance: how big data analysis can improve maintenance. In: Richter, K., Walther, J. (eds.) Supply Chain Integration Challenges in Commercial Aerospace. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46155-7_18
Munirathinam, S., Ramadoss, B.: Big data predictive analtyics for proactive semiconductor equipment maintenance. IEEE International Conference on Big Data 2014
Karagiannidis, K.: Big data analytics for dynamic energy management in smart grids. Big Data Res. 2(3), 94–101 (2015)
Sun, Y., Song, H., Jara, A., Bie, R.: Internet of things and big data analytics for smart and connected communities. IEEE Access 4, 766–773 (2016)
Theguardian. https://www.theguardian.com/technology/2017/jun/28/notpetya-ransomware-attack-ukraine-russia
Computerworld. https://www.computerworld.com/article/2519574/security0/stuxnet-renews-power-grid-security-concerns.html
Hernandez, G., Arias, O., Buentello, D., Jin, Y.: Smart nest thermostat: a smart spay in your home. In: Black Hat USA (2014)
Illera, A.G., Vidal, J.V.: Lights off! The darkness of the smart meters. In: Black Hat Europe (2014)
Manadhata, P., Wing, J.: An attack surface metric. IEEE Trans. Software Eng. Arch. 37(3), 371–386 (2011)
Struckman, J., Purtilo, J.: Comparing and applying attack surface metrics. In: MetriSec 2012 Proceedings of the 4th international workshop on Security, pp. 3–6 (2012)
Modbus. http://www.modbus.org
1815-2010: IEEE Standard for Electric Power Systems Communications – Distributed network Protocol (DNP3). 2010. ISBN 978-0-7381-6312-3
KrebsonSecurity. https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos
Wired. https://www.wired.com/story/reaper-iot-botnet-infected-million-networks
KrebsonSecurity. https://krebsonsecurity.com/2017/10/reaper-calm-before-the-iot-security-storm/
Dragos Inc. https://dragos.com/blog/crashoverride/CrashOverride-01.pdf
Trusted Computing Group (TCG), https://trustedcomputinggroup.org/
Costin, A., Zaddach, J., Francillon, A., Balzarotti, D.: A large-scale analysis of the security of embedded firmwares. In: USENIX Conference on Security Symposium. USENIX Association (2014)
Cui, A., Stolfo, S.J.: A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. In: Annual Computer Security Applications Conference (ACSAC). ACM (2010)
Sabt, M., Achemial, M., Bouabdallah, A.: Trusted Execution Environment: What It is, and What It is Not. IEEE Trustcom/BigDataSE/ISPA (2015)
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. https://tools.ietf.org/html/rfc5246
International Electrotechnical Commision: IEC 62443 International Standard
ODVA CIP Security Standard. https://www.odva.org/Technology-Standards/Common-Industrial-Protocol-CIP/CIP-Security
NIST Cybersecurity Framework. https://www.nist.gov/cyberframework
Computerworld. https://www.computerworld.com/article/2571072/malware-vulnerabilities/blaster-worm-spreading–experts-warn-of-attack.html
The Internet Engineering Task Force (IETF). https://ietf.org/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Cam-Winget, N. (2019). Sensor Networks: Enlarging the Attack Surface. In: Benavente-Peces, C., Cam-Winget, N., Fleury, E., Ahrens, A. (eds) Sensor Networks. SENSORNETS SENSORNETS 2018 2017. Communications in Computer and Information Science, vol 1074. Springer, Cham. https://doi.org/10.1007/978-3-030-30110-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-30110-1_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30109-5
Online ISBN: 978-3-030-30110-1
eBook Packages: Computer ScienceComputer Science (R0)