Abstract
Modern embedded systems control sensitive data and information depending where these systems are installed to accomplish required tasks. Due to this aspect, cyber criminals or hackers are motivated and determined to rob intellectual property of these systems through more and more sophisticated attacks . A huge problem in defending against these massive and various types of attacks is that in the last years attacks increased their complexity while the knowledge of an attacker decreased significantly because of the tools and devices they can find in the online world and free market. The most important challenges to defend against an attack are represented by these factors: speed of the attack, complexity of the attack and the simplicity of the tools that attackers used. A very often question that most of designers and developers of embedded systems ask is: Why cyber criminals commit attacks and what motivates them? Is it money? Is it celebrity? The answer starts with simple entertainment and extends to material benefits and finding, very often, valuable sensitive information that can cause serious damages to a system and its dependencies or even terrorism acts. Best case scenario is when the attacker is exactly the owner/the developer of the system or when he is demanding various attacks in order to figure out how defense mechanisms resist when facing attacks, how these can be improved and what are the challenges in building new ones. Therefore, this chapter is focused on two main ideas considering modern embedded systems based on Field Programmable Gate Array (FPGA) technology such as communication networks or cryptographic systems. The first idea refers to malicious and deliberate attacks performed against embedded systems starting with risks , threats and vulnerabilities that motivated hackers find and exploit and the second idea is about power system resilience and how attacked systems respond and decide what to do next. This chapter is organized in six parts as follows. The first part of this chapter is an introduction about attacks on embedded systems and a background that provides all the necessary information of how attackers and attacks evolved in the last years. The second part is focused on who performs these attacks and how systems are attacked. The third part refers to the main attacks on embedded systems and how these are classified depending on different criteria such as interlinking features, integration level or programmability level. The fourth part of this chapter is about power system resilience and how actual systems react or how they should react in case of malicious attacks . The fifth part refers, with examples, to the vulnerabilities existing in modern equipment that surrounds us and how these are or can be attacked such as mobile and communication systems and social apps that we use every day. The last part concludes the chapter and draws some goals for future research directions. The main purposes of this chapter are: to review and categorize all types of attacks against embedded systems based on FPGA , to show how attacks evolved from their beginnings until present, to bring to light who are the attackers as well as what motivates these hackers and to picture how “resiliency” feature should operate or operates during life-cycle of embedded systems when someone wants to perform an attack or succeeds one. Another important goal that this chapter aims for is to find and show others vulnerabilities existing in modern systems, especially communications , that most of us can not live without them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
F. Birleanu, N. Bizon, Reconfigurable computing in hardware security—a brief review and application. J. Electr. Eng. Electron. Control Comput. Sci. (JEEECCS) 2(3), 1–12 (2016)
M. Ciampa, Security Awareness: Applying Practical Security in Your World. IEEE Design & Test of Computers (2010)
P. Gregory, CISSP Guide to Security Essentials (Course Technology, Cengage Learning, Boston, 2010)
http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.prd29-genc-009492c/ch01s03s04.html
M. Chowdhury, A. Apon, K. Dey, Data Analytics for Intelligent Transportation Systems (Elsevier, UK, 2017)
http://web.cse.ohio-state.edu/~champion.17/4471/4471_lecture_2.pdf
http://sourcedaddy.com/networking/threats-vulnerabilities-and-attacks.html
J. Chirillo, Hack Attacks Revealed (Wiley Computer Publishing, New York, 2001)
D.G. Abraham, G.M. Dolan, G.P. Double, J.V. Stevens, Transaction security system. IBM Syst. J. 30(2), 206–229 (1991)
http://fortune.com/2017/06/22/cybersecurity-business-fights-back/
S.J. Stolfo, S.M. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, S.W. Smith, Insider Attack and Cyber Security: Beyond the Hacker (Springer, New York, 2008)
C.W. Probst, J. Hunker, D. Gollman, M. Bishop, Insider Threats in Cyber Security (Springer, New York, 2010)
http://www.makeuseof.com/tag/5-of-the-worlds-most-famous-hackers-what-happened-to-them/
http://www.telegraph.co.uk/technology/6670127/Top-10-most-famous-hackers.html
J. Graham, R. Howard, R. Olson, Cyber Security Essentials (CRC Press, Boca Raton, 2011)
J. Andress, S. Winterfeld, Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (Amsterdam, Syngress, 2011)
P. Anghelescu, S. Ionita, G. Iana, High-speed PCA encryption algorithm using reconfigurable computing. J. Cybern. Syst. (Taylor & Francis) 44(4), 285–304 (2013)
P. Anghelescu, FPGA implementation of programmable cellular automata encryption algorithm for network communications. Int. J. Comput. Syst. Sci. Eng. (CSSE) 31(5) Sept (2016)
H. Elmiligi, F. Gebali, M.W. El-Kharashi, Multi-dimensional analysis of embedded systems security. Microprocess. Microsyst. 41, 29–36 (2016)
M. Erbschloe, Trojans, Worms, and Spyware (Elsevier, Amsterdam, 2005)
A. Singhal, Data Warehousing and Data Mining Techniques for Cyber Security (Springer, New York, 2007)
P. Eder-Neuhauser, T. Zseby, J. Fabini, G. Vormayr, Cyber attack model for smart grid environments. Sustain. Energy Grids Netw. 12, 10–29 (2017)
https://blog.finjan.com/9-common-hacking-techniques-and-how-to-deal-with-them/
P. Anghelescu, E. Sofron, S. Ionita, L. Ionescu, in FPGA Implementations of Cellular Automata for Pseudo-Random Number Generation. The 29th International Semiconductor Conference, CAS 2006, Sinaia, Romania, 27–29 Sept 2006, pp. 371–374
E. Zio, Challenges in the vulnerability and risk analysis of critical infrastructures. J. Reliab. Eng. Syst. Saf. 152, 137–150 (2016)
N. Nezamoddini, S. Mousavian, M.E. Kantarci, A risk optimization model for enhanced power grid resilience against physical attacks. J. Electr. Power Syst. Res. 143, 329–338 (2017)
M. Donohoe, B. Jennings, S. Balasubramaniam, Context-awareness and the smart grid: requirements and challenges. J. Comput. Netw. 79, 263–282 (2015)
N.M. Tabatabaei, N. Bizon, A.J. Aghbolaghi, F. Blaabjerg (eds.), Fundamentals and Contemporary Issues of Reactive Power Control in AC Power Systems (Springer Verlag London Limited, London, 2017)
Counterfeit-Proof Chips, Fraunhofer Magazine, vol. 1.12 (Fraunhofer-Gesellschaft, Munchen, 2012)
J.H. Saltzer, M.D. Schroeder, The protection of information in computer systems. Proc. IEEE 63(9), 1278–1308 (1975)
F. Birleanu, N. Bizon, Principles, architectures and challenges for ensuring the integrity, internal control and security of embedded systems. J. Electr. Eng. Electron. Control Comput. Sci. (JEEECCS) 3(7), 37–45 (2017)
H. Orojloo, M.A. Azgomi, A game-theoretic approach to model and quantify the security of cyber-physical systems. J. Comput. Ind. 88, 44–57 (2017)
Y. Ashibani, Q.H. Mahmoud, Cyber physical systems security: analysis, challenges and solutions. J. Comput. Secur. 68, 81–97 (2017)
A.V. Gheorghe, M. Masera, M. Weijnen, L. De Vries, Critical Infrastructures at Risk—Securing the European Electric Power System (Springer, Dordrecht, 2006)
E.G. Amoroso, Cyber Attacks—Protecting National Infrastructure (Elsevier, Amsterdam, 2011)
W. Wang, Z. Lu, Cyber security in the smart grid: survey and challenges. Comput. Netw. 57, 1344–1371 (2013)
K. Pipyros, C. Thraskias, L. Mitrou, D. Gritzalis, T. Apostolopoulus, A new strategy for improving cyber-attacks evaluation in the context of Tallinn manual. J. Comput. Secur. (2017)
C. Tu, X. He, Z. Shuai, F. Jiang, Big data issues in smart grid—a review. J. Renew. Sustain. Energy Rev. 79, 1099–1107 (2017)
M. Ficco, M. Chora, R. Kozik, Simulation platform for cyber-security and vulnerability analysis of critical infrastructures. J. Comput. Sci. (2017). https://doi.org/10.1016/j.jocs.2017.03.025
https://www.networkworld.com/article/3217664/internet-of-things/how-to-improve-iot-security.html
Z.A. Baig, P. Szewczyk, C. Valli, P. Rabadia, P. Hannay, M. Chernyshev, M. Johnstone, P. Kerai, A. Ibrahim, K. Sansurooah, N. Syed, M. Peacock, Future challenges for smart cities: cyber-security and digital forensics. J. Digit. Investig. 22, 3–13 (2017)
D. Jin, C. Hannon, Z. Li, P. Cortes, S. Ramaraju, P. Burgess, N. Buch, M. Shahidehpour, Smart street lighting system: a platform for innovative smart city applications and a new frontier for cyber-security. Electr. J. 29, 28–35 (2016)
http://www.energy.ca.gov/2012publications/CEC-500-2012-047/CEC-500-2012-047.pdf
C. Bekara, Security issues and challenges for the IoT-based smart grid. J. Procedia Comput. Sci. 34, 532–837 (2014)
H. Yoo, T. Shon, Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: vulnerabilities, security requirements, and security architecture. J. Future Gener. Comput. Syst. 61, 128–136 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Birleanu, F.G., Anghelescu, P., Bizon, N. (2019). Malicious and Deliberate Attacks and Power System Resiliency. In: Mahdavi Tabatabaei, N., Najafi Ravadanegh, S., Bizon, N. (eds) Power Systems Resilience. Power Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-94442-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-94442-5_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-94441-8
Online ISBN: 978-3-319-94442-5
eBook Packages: EnergyEnergy (R0)