Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey

With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens...

Full description

Bibliographic Details
Main Authors: Edward Staddon, Valeria Loscri, Nathalie Mitton
Format: Article
Language:English
Published: MDPI AG 2021-08-01
Series:Applied Sciences
Subjects:
IoT
Online Access:https://www.mdpi.com/2076-3417/11/16/7228
id doaj-3fbfc55f295741eaa033526e41cbd8af
record_format Article
spelling doaj-3fbfc55f295741eaa033526e41cbd8af2021-08-26T13:29:14ZengMDPI AGApplied Sciences2076-34172021-08-01117228722810.3390/app11167228Attack Categorisation for IoT Applications in Critical Infrastructures, a SurveyEdward Staddon0Valeria Loscri1Nathalie Mitton2Inria Lille-Nord Europe/FUN, 59650 Villeneuve-d’Ascq, FranceInria Lille-Nord Europe/FUN, 59650 Villeneuve-d’Ascq, FranceInria Lille-Nord Europe/FUN, 59650 Villeneuve-d’Ascq, FranceWith the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical Infrastructure applications. We believe this can be a guide to aid further researchers in their choice of adapted categorisation approaches. Indeed, adapting appropriated categorisation leads to a quicker attack detection, identification, and recovery. It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.https://www.mdpi.com/2076-3417/11/16/7228cyber attackattack categorisationcyber securityIoTcritical infrastructureschallenges
collection DOAJ
language English
format Article
sources DOAJ
author Edward Staddon
Valeria Loscri
Nathalie Mitton
spellingShingle Edward Staddon
Valeria Loscri
Nathalie Mitton
Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey
Applied Sciences
cyber attack
attack categorisation
cyber security
IoT
critical infrastructures
challenges
author_facet Edward Staddon
Valeria Loscri
Nathalie Mitton
author_sort Edward Staddon
title Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey
title_short Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey
title_full Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey
title_fullStr Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey
title_full_unstemmed Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey
title_sort attack categorisation for iot applications in critical infrastructures, a survey
publisher MDPI AG
series Applied Sciences
issn 2076-3417
publishDate 2021-08-01
description With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical Infrastructure applications. We believe this can be a guide to aid further researchers in their choice of adapted categorisation approaches. Indeed, adapting appropriated categorisation leads to a quicker attack detection, identification, and recovery. It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.
topic cyber attack
attack categorisation
cyber security
IoT
critical infrastructures
challenges
url https://www.mdpi.com/2076-3417/11/16/7228
work_keys_str_mv AT edwardstaddon attackcategorisationforiotapplicationsincriticalinfrastructuresasurvey
AT valerialoscri attackcategorisationforiotapplicationsincriticalinfrastructuresasurvey
AT nathaliemitton attackcategorisationforiotapplicationsincriticalinfrastructuresasurvey
_version_ 1721195116636405760