3-Dimensional Analysis of Cyber-physical Systems Attacks

Wireless Sensor Networks (WSNs) collect data through sensors and send it to the Cyberspace in the Cyber Physical system (CPS). With the growth of CPSs, researchers and system engineers need new means and measures to face the unexpected WSN security challenges. In this paper, we propose a 3-D taxonomy of WSN attacks, where each attack may be classified based on its Accessibility, Position and Type (APT). Accessibility represents the number of nodes under attack, whereas position and type represent the physical location of the node under attack and the type of attack, respectively. Our proposed classification helps network engineers better understand and identify the threats to their networks and systems. Through this taxonomy, 27 attack-scenarios are studied and quantified for further analysis. This paper proposes a novel quantification scheme, which can be used to understand the attacks’ severity. We present five case studies to show how to use the proposed quantification scheme to evaluate the severity level of attacks across different application domains.

[1]  Fayez Gebali,et al.  Hardware attack risk assessment , 2015, 2015 Tenth International Conference on Computer Engineering & Systems (ICCES).

[2]  Fengjun Li,et al.  Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.

[3]  Gerhard P. Hancke,et al.  Denial of Service Defence for Resource Availability in Wireless Sensor Networks , 2018, IEEE Access.

[4]  Rosli Salleh,et al.  Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[5]  Bharat Bhushan,et al.  Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).

[6]  Ong Bi Lynn,et al.  Internet of Things (IoT): Taxonomy of security attacks , 2016, 2016 3rd International Conference on Electronic Design (ICED).

[7]  Yang Xiaomei,et al.  Evolution of wireless sensor network security , 2016, 2016 World Automation Congress (WAC).

[8]  Annie Mathew,et al.  A survey on various detection techniques of sinkhole attacks in WSN , 2017, 2017 International Conference on Communication and Signal Processing (ICCSP).

[9]  Xu Ji,et al.  Location Privacy against Traffic Analysis Attacks in Wireless Sensor Networks , 2010, 2010 International Conference on Information Science and Applications.

[10]  Fayez Gebali,et al.  Hardware Covert Attacks and Countermeasures , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[11]  Jie Chen,et al.  A survey on the security of cyber-physical systems , 2016 .

[12]  Asad Waqar Malik,et al.  Detection and prevention of Black Hole Attacks in IOT & WSN , 2018, 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC).

[13]  Klaus D. McDonald-Maier,et al.  An Assessment of Recent Attacks on Specific Embedded Systems , 2014, 2014 Fifth International Conference on Emerging Security Technologies.

[14]  Shiyan Hu,et al.  Design Automation of Cyber-Physical Systems: Challenges, Advances, and Opportunities , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[15]  Sherali Zeadally,et al.  Enabling Cyber Physical Systems with Wireless Sensor Networking Technologies, Multiagent System Paradigm, and Natural Ecosystems , 2015, Mob. Inf. Syst..

[16]  Neetesh Gupta,et al.  Vulnerabilities, attack effect and different security scheme in WSN: A survey , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).

[17]  Camilius Sanga,et al.  Attacks in Wireless Sensor Networks , 2016 .

[18]  Maruf Pasha,et al.  A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures , 2017, ArXiv.

[19]  Aron Laszka,et al.  Resilient wireless sensor networks for cyber-physical systems , 2016 .

[20]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[21]  Yogesh Sharma,et al.  Countermeasures for selective forwarding and wormhole attack in WSN , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).

[22]  Youping Fan,et al.  A Method for Identifying Critical Elements of a Cyber-Physical System Under Data Attack , 2018, IEEE Access.

[23]  Benfilali Mostefa,et al.  A survey of wireless sensor network security in the context of Internet of Things , 2017, 2017 4th International Conference on Information and Communication Technologies for Disaster Management (ICT-DM).

[24]  Qusay H. Mahmoud,et al.  Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..

[25]  Mohammad Abdus Salam,et al.  PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK , 2016 .

[26]  Sanjeet Kumar,et al.  A survey of security in wireless sensor networks , 2015, 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT).