Forecasting Issues of Wireless Communication Networks’ Cyber Resilience for An Intelligent Transportation System: An Overview of Cyber Attacks
Abstract
:1. Introduction
2. Variants of Creating Cyber-Resilient Vehicular Ad Hoc Networks/Intelligent Transportation Systems (VANET/ITS)
3. Top 10 VANET/ITS Cyber Threats
- Broadcast tampering [8];
3.1. Message Tampering/Suppression/Fabrication—Attacks to the Network Messages
3.2. Tracking—Unauthorized Access to Identification Information on a Knot
3.3. Sybil Attack—Destruction of Network Reputation by Cloning of False Identifiers
3.4. DoS (Denial of Service)
3.5. Node Impersonation—Substitution of Identification of the Participant of Traffic
3.6. Key and/or Certificate Replication—Unauthorized Identification in System
3.7. Traffic Analysis—Definition of Topology of Network, Routing
3.8. Man in the Middle—Interception and Modification of Messages between Cars and Points of Access
3.9. Routing: Blackhole, Greyhole, Wormhole, Tunneling, etc.—Violation of a Data Route
3.10. Global Positioning System (GPS) Spoofing/Hidden Vehicle (position faking)—Substitution of Coordinates of Knot Location
4. Risk Analysis
5. Synergetic Approach
5.1. Case 1: Low Power Consumption of Sensor Network Knots
5.2. Case 1: Possibility of Cloning Packages
5.3. Case 2: A Possibility of Purposeful Management of Network Traffic of a Set of Uncontrolled Devices
5.4. Case 3: Absence of Control of Network Configuration
6. Top 10 SDIoV Cyber Threats
7. Expert Forecasting Cyber Resilience of Variants of Creating VANET/ITS
8. Challenges
9. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Lu, M. Evaluation of Intelligent Road Transport Systems: Methods and Results; IET: London, UK, 2016. [Google Scholar]
- Zubedi, A.; Jianqiu, Z.; Arain, Q.A.; Memon, I.; Khan, S.; Khan, M.S.; Zhang, Y. Sustaining Low-Carbon Emission Development: An Energy Efficient Transportation Plan for CPEC. J. Inf. Process. Syst. 2018, 14, 322–345. [Google Scholar]
- Ahmad, F.; Adnane, A.; Franqueira, N.L. A Systematic Approach for Cyber Security in Vehicular Networks. J. Comput. Commun. 2016, 4, 38–62. [Google Scholar] [CrossRef]
- Wevers, K.; Lu, M. V2X Communication for ITS—From IEEE 802.11p Towards 5G. IEEE 5G Tech. Focus 2017, 1. Available online: https://5g.ieee.org/tech-focus/march-2017/v2x-communication-for-its (accessed on 31 August 2018).
- Federal Motor Vehicle Safety Standards; V2V Communications. Docket No. NHTSA-2016-0126. Proposed Rule. Federal Regist. 2017, 82, 3854–4019. Available online: https://www.gpo.gov/fdsys/pkg/FR-2017-01-12/pdf/2016-31059.pdf (accessed on 31 August 2018).
- Filippi, A.; Moerman, K.; Martinez, V.; Turley, A.; Haran, O.; Toledano, R. IEEE802.11p Ahead of LTE-V2V for Safety Applications; Autotalks: Netanya, Israel, 2017; Available online: https://www.auto-talks.com/wp-content/uploads/2017/09/Whitepaper-LTE-V2V-USletter-05.pdf (accessed on 31 August 2018).
- Festag, A. Standards for Vehicular Communication—From IEEE 802.11p to 5G. Elektrotech. Inftech. 2015, 132, 409–416. [Google Scholar] [CrossRef]
- Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A. VANet Security Challenges and Solutions: A Survey. Veh. Commun. 2017, 7, 7–20. [Google Scholar] [CrossRef]
- Karagiannis, G.; Altintas, O.; Ekici, E.; Heijenk, G.; Jarupan, B.; Lin, K.; Weil, T. Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions. IEEE Commun. Surv. Tutor. 2011, 13, 584–616. [Google Scholar] [CrossRef]
- Raw, R.S.; Kumar, M.; Singh, N. Security Challenges, Issues and Their Solutions for VANET. Int. J. Netw. Secur. Its Appl. 2013, 5, 95–105. [Google Scholar] [CrossRef]
- He, L.; Zhu, W.T. Mitigating DoS Attacks Against Signature-Based Authentication in VANETs. In Proceedings of the 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), Zhangjiajie, China, 25–27 May 2012; Volume 3, pp. 261–265. [Google Scholar] [CrossRef]
- Raya, M.; Hubaux, J.P. The Security of Vehicular Ad Hoc Networks. In Proceedings of the 3rd ACM workshop on Security of Ad Hoc and Sensor Networks (SASN’05), Alexandria, VA, USA, 7–10 November 2005; pp. 11–21. [Google Scholar] [CrossRef]
- Hasrouny, H.; Bassil, C.; Samhat, A.; Laouiti, A. Security Risk Analysis of a Trust model for Secure Group Leader-based communication in VANET. Adv. Intell. Syst. Comput. 2017, 548, 71–83. [Google Scholar] [CrossRef]
- Chuang, M.C.; Lee, J.F. TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks. IEEE Syst. J. 2014, 8, 749–758. [Google Scholar] [CrossRef]
- Macaulay, T. The 7 Deadly Threats to 4G; McAfee: Santa Clara, CA, USA, 2013. [Google Scholar]
- Mpitziopoulos, A.; Gavalas, D.; Konstantopoulos, C.; Pantziou, G. A Survey on Jamming Attacks and Countermeasures in WSNs. IEEE Commun. Surv. Tutor. 2009, 11, 42–56. [Google Scholar] [CrossRef]
- Ma, D.; Tsudik, G. Security and Privacy in Emerging Wireless Networks. IEEE Wirel. Commun. 2010, 17, 12–21. [Google Scholar] [CrossRef]
- Samara, G.; Al-Salihy, W.A.H.; Sures, R. Security Analysis of Vehicular Ad Hoc Networks (VANET). In Proceedings of the Second International Conference on Network Applications Protocols and Services (NETAPPS), Kedah, Malaysia, 22–23 September 2010; pp. 55–60. [Google Scholar] [CrossRef]
- Whyte, W.; Weimerskirch, A.; Kumar, V.; Hehn, T. A Security credential management system for V2V communications. In Proceedings of the IEEE Vehicular Networking Conference (VNC), Boston, MA, USA, 16–18 December 2013; pp. 1–8. [Google Scholar] [CrossRef]
- Intelligent Transport Systems (ITS); Security. Threat, Vulnerability and Risk Analysis (TVRA); ETSI TR 102 893 V1.1.1 (2010-03); ETSI: Sophia Antipolis, France, 2010. [Google Scholar]
- Guo, J.; Baugh, J.P.; Wang, S. A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework. In Proceedings of the 2007 Mobile Networking for Vehicular Environments, Anchorage, AK, USA, 11 May 2007; pp. 103–108. [Google Scholar] [CrossRef]
- Salem, F.M.; Ibrahim, M.H.; Ibrahim, I.I. Non-Interactive Authentication Scheme Providing Privacy among Drivers in Vehicle-to-Vehicle Networks. In Proceedings of the 2010 Sixth International Conference on Networking and Services, Cancun, Mexico, 7–13 March 2010; pp. 156–161. [Google Scholar] [CrossRef]
- Intelligent Transport Systems (ITS); Security. Trust and Privacy Management; ETSI TS 102 941 V1.1.1 (2012-06); ETSI: Sophia Antipolis, France, 2012. [Google Scholar]
- Engoulou, R.G.; Bellaïche, M.; Pierre, S.; Quintero, A. VANET Security Surveys. Comput. Commun. 2014, 44, 1–13. [Google Scholar] [CrossRef]
- Calandriello, G.; Papadimitratos, P.; Hubaux, J.P.; Lioy, A. Efficient and Robust Pseudonymous Authentication in VANET. In Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks (VANET ’07), Montreal, QC, Canada, 10 September 2007; pp. 19–28. [Google Scholar] [CrossRef]
- Raya, M.; Papadimitratos, P.; Hubaux, J.P. Securing Vehicular Communications. IEEE Wirel. Commun. 2006, 13, 8–15. [Google Scholar] [CrossRef]
- Xiao, B.; Yu, B.; Gao, C. Detection and Localization of Sybil Nodes in VANETs. In Proceedings of the Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS ’06), Los Angeles, CA, USA, 26 September 2006; pp. 1–8. [Google Scholar] [CrossRef]
- Ohigashi, T.; Morii, M. A practical message falsification attack on WPA. In Proceedings of the Fourth Joint Workshop on Information Security (JWIS 2009), Kaohsiung, Taiwan, 6–7 August 2009. [Google Scholar]
- Christof, P.; Pelzl, J.; Preneel, B. Understanding Cryptography: A Textbook for Students and Practitioners; Springer: Berlin, Germany, 2010. [Google Scholar]
- Rawat, A.; Sharma, S.; Sushil, R. VANET: Security Attacks and Its Possible Solutions. J. Inf. Oper. Manag. 2012, 3, 301–304. [Google Scholar]
- Vinh, H.L.; Cavalli, A.R. Security Attacks and Solutions in Vehicular Ad Hoc Networks: A Survey. Int. J. Ad Hoc Netw. Syst. 2014, 4, 1–20. [Google Scholar] [CrossRef]
- Patel, N.; Jhaveri, R.H. Trust Based Approaches for Secure Routing in VANET: A Survey. Procedia Comput. Sci. 2015, 45, 592–601. [Google Scholar] [CrossRef] [Green Version]
- Van der Heijden, R. Security Architectures in V2V and V2I Communication. In Proceedings of the 13th Twente Student Conference on IT, Enschede, The Netherlands, 21 June 2010. [Google Scholar]
- Al-Kahtani, M.S. Survey on Security Attacks in Vehicular Ad Hoc Networks (VANETs). In Proceedings of the 6th International Conference on Signal Processing and Communication Systems (ICSPCS), Gold Coast, QLD, Australia, 12–14 December 2012; pp. 1–9. [Google Scholar] [CrossRef]
- Rao, A.; Sangwan, A.; Kherani, A.A.; Varghese, A.; Bellur, B.; Shorey, R. Secure V2V Communication with Certificate Revocations. In Proceedings of the Mobile Networking for Vehicular Environments, Anchorage, AK, USA, 11 May 2007; pp. 127–132. [Google Scholar] [CrossRef]
- Singelee, D.; Preneel, B. Location verification using secure distance bounding protocols. In Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, Washington, DC, USA, 7–10 November 2005; pp. 834–840. [Google Scholar] [CrossRef]
- Zhou, T.; Choudhury, R.R.; Ning, P.; Chakrabarty, K. P2DAP—Sybil Attacks Detection in Vehicular Ad Hoc Networks. IEEE J. Sel. Areas Commun. 2011, 29, 582–594. [Google Scholar] [CrossRef]
- Yan, G.; Olaruis, S.; Weigle, M. Use of Infrastructure in VANETs. Comput. Commun. 2008, 31, 2883–2897. [Google Scholar] [CrossRef]
- Kushwaha, D.; Shukla, P.K.; Baraskar, R. A Survey on Sybil Attack in Vehicular Ad-hoc Network. Int. J. Comput. Appl. 2014, 98, 31–36. [Google Scholar] [CrossRef]
- Ploößl, K.; Federrath, H. A Privacy Aware and Efficient Security Infrastructure for Vehicular Ad Hoc Networks. Comput. Stand. Interfaces 2008, 30, 390–397. [Google Scholar] [CrossRef]
- Abuelela, M.; Olariu, S.; Ibrahim, K. A Secure and Privacy Aware Data Dissemination for the Notification of Traffic Incidents. In Proceedings of the VTC Spring 2009—IEEE 69th Vehicular Technology Conference, Barcelona, Spain, 26–29 April 2009; pp. 1–5. [Google Scholar] [CrossRef]
- Raya, M.; Aziz, A.; Hubaux, J.P. Efficient Secure Aggregation in VANETs. In Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks (VANET ’06), Los Angeles, CA, USA, 24–29 September 2006; pp. 67–75. [Google Scholar] [CrossRef]
- Mousumi, P.; Gautam, S. Traffic Analysis of Vehicular Ad-Hoc Networks of V2I Communication. Procedia Comput. Sci. 2015, 54, 215–223. [Google Scholar] [CrossRef] [Green Version]
- Perrig, A.; Stankovic, J.; Wagner, D. Security in wireless sensor networks. Commun. ACM 2004, 47, 53–57. [Google Scholar] [CrossRef]
- Malla, A.M.; Sahu, R.K. Security Attacks with an Effective Solution for Dos Attacks in VANET. Int. J. Comput. Appl. 2013, 66, 45–49. [Google Scholar]
- Song, L.; Han, Q.; Liu, J. Investigate Key Management and Authentication Models in VANETs. In Proceedings of the 2011 International Conference on Electronics, Communications and Control (ICECC), Ningbo, China, 9–11 September 2011; pp. 1516–1519. [Google Scholar] [CrossRef]
- Memon, I.; Arain, Q.A.; Memon, M.H.; Mangi, F.A.; Akhtar, R. Search me if you can: Multiple mix zones with location privacy protection for mapping services. Int. J. Commun. Syst. 2017, 30, e3312. [Google Scholar] [CrossRef]
- Memon, I.; Ali, Q.; Zubedi, A.; Mangi, F.A. DPMM: Dynamic Pseudonym-based Multiple Mix-zones Generation for Mobile Traveler. Multimed. Tools Appl. 2017, 76, 24359–24388. [Google Scholar] [CrossRef]
- Arain, Q.A.; Uqaili, M.A.; Deng, Z.; Memon, I.; Jiao, J.; Shaikh, M.A.; Zubedi, A.; Ashraf, A.; Arain, U.A. Clustering Based Energy Efficient and Communication Protocol for Multiple Mix-zones over Road Networks. Wirel. Pers. Commun. 2018, 95, 411–428. [Google Scholar] [CrossRef]
- Memon, I.; Arain, Q.A. Dynamic Path Privacy Protection Framework for Continuous Query Service over Road Networks. World Wide Web 2017, 20, 639–672. [Google Scholar] [CrossRef]
- Memon, I. A Secure and Efficient Communication Scheme with Authenticated Key Establishment Protocol for Road Networks. Wirel. Pers. Commun. 2015, 85, 1167–1191. [Google Scholar] [CrossRef]
- Domenic, M.K.; Wang, Y.; Zhang, F.; Memon, I.; Gustav, Y.H. Preserving Users’ Privacy for Continuous Query Services in Road Networks. In Proceedings of the 2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering, Xi’an, China, 23–24 November 2013; Volume 1, pp. 352–355. [Google Scholar] [CrossRef]
- Gustav, Y.H.; Wang, Y.; Domenic, M.K.; Zhang, F.; Memon, I. Velocity Similarity Anonymization for Continuous Query Location Based Services. In Proceedings of the 2013 International Conference on Computational Problem-Solving (ICCP), Jiuzhai, China, 26–28 October 2013; pp. 433–436. [Google Scholar] [CrossRef]
- Dahiya, A.; Sharma, V. A Survey on Securing User Authentication Vehicular Ad Hoc Networks. Int. J. Inf. Secur. 2001, 1, 164–171. [Google Scholar]
- Raiya, R.; Gandhi, S. Survey of Various Security Techniques in VANET. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2014, 4, 431–433. [Google Scholar]
- Caballero-Gil, P. Security Issues in Vehicular Ad Hoc Networks. In Book Mobile Ad-Hoc Networks: Applications; Wang, X., Ed.; IntechOpen: London, UK, 2011; pp. 67–88. [Google Scholar]
- Jayalakshmi, N.; Rajadurai, R.; Indumathi, K. Vehicular Network: Properties, Structure, Challenges, Attacks, Solution for Improving Scalability and Security. Int. J. Sci. Eng. Res. 2013, 4, 152–159. [Google Scholar]
- Blum, J.; Eskandarian, A. The Threat of Intelligent Collisions. IT Prof. 2004, 6, 24–29. [Google Scholar] [CrossRef]
- Schuba, C.L.; Krsul, I.V.; Kuhn, M.G.; Spafford, E.H.; Sundaram, A.; Zamboni, D. Analysis of a denial of service attack on TCP. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 4–7 May 1997; pp. 208–223. [Google Scholar] [CrossRef] [Green Version]
- Kuzmanovic, A.; Knightly, E.W. Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE ACM Trans. Netw. 2006, 14, 683–696. [Google Scholar] [CrossRef]
- Romero-Zurita, N.; Ghogho, M.; McLernon, D. Outage probability based power distribution between data and artificial noise for physical layer security. IEEE Signal Process. Lett. 2012, 19, 71–74. [Google Scholar] [CrossRef]
- Jung, C.D.; Sur, C.; Park, Y.; Rhee, K.H. A Robust Conditional Privacy-Preserving Authentication Protocol in VANET. In Book Security and Privacy in Mobile Information and Communication Systems. MobiSec 2009; Schmidt, A.U., Lian, S., Eds.; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Springer: Berlin, Germany, 2009; Volume 17, pp. 35–45. [Google Scholar]
- Zhou, W.; Marshall, A.; Gu, Q. A Novel Classification Scheme for 802.11 WLAN Active Attacking Traffic Patterns. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2006), Las Vegas, NV, USA, 3–6 April 2006; Volume 2, pp. 623–628. [Google Scholar] [CrossRef]
- Wang, H.; Yin, Q.; Xia, X. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks. IEEE Trans. Signal Process. 2012, 60, 3532–3545. [Google Scholar] [CrossRef]
- Zeadally, S.; Hunt, R.; Chen, Y.S.; Irwin, A.; Hassan, A. Vehicular Ad Hoc Networks (VANETs): Status, Results, and Challenges. Telecommun. Syst. 2012, 50, 217–241. [Google Scholar] [CrossRef]
- CA-1995.01: IP spoofing Attacks and Hijacked Terminal Connections. In Book 1995 CERT Advisories; Carnegie Mellon University: Pittsburgh, PA, USA, 2017; pp. 2–14. Available online: https://resources.sei.cmu.edu/asset_files/WhitePaper/1995_019_001_496168.pdf (accessed on 31 August 2018).
- Elliott, C. Quantum cryptography. IEEE Secur. Priv. 2004, 2, 57–61. [Google Scholar] [CrossRef]
- Chang, R.K.C. Defending against flooding-based distributed denial-of-service attacks: A tutorial. IEEE Commun. Mag. 2002, 40, 42–51. [Google Scholar] [CrossRef]
- Aslam, B.; Zou, C.C. Distributed certificate and application architecture for VANETs. In Proceedings of the MILCOM 2009—2009 IEEE Military Communications Conference, Boston, MA, USA, 18–21 October 2009; pp. 1–7. [Google Scholar] [CrossRef]
- He, X.; Khisti, A.; Yener, A. MIMO broadcast channel with arbitrarily varying eavesdropper channel: Secrecy degrees of freedom. In Proceedings of the 2011 IEEE Global Telecommunications Conference—GLOBECOM 2011, Kathmandu, Nepal, 5–9 December 2011; pp. 1–5. [Google Scholar] [CrossRef]
- Wei, Y.; Zengy, K.; Mohapatra, P. Adaptive Wireless channel probing for shared key generation. In Proceedings of the IEEE INFOCOM, Shanghai, China, 10–15 April 2011; pp. 2165–2173. [Google Scholar] [CrossRef]
- Araujo, A.; Blesa, J.; Romero, E.; Nieto-Taladriz, O. Artificial noise scheme to ensure secure communications in CWSN. In Proceedings of the 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), Limassol, Cyprus, 27–31 August 2012; pp. 1023–1027. [Google Scholar] [CrossRef]
- Park, J.; Kasera, S. Securing Ad Hoc wireless networks against data injection attacks using firewalls. In Proceedings of the IEEE Wireless Communications and Networking Conference, Kowloon, China, 11–15 March 2007; pp. 2843–2848. [Google Scholar] [CrossRef]
- Stolyarova, E.S.; Shiryaev, D.M.; Vladyko, A.G.; Buinevich, M.V. VANET/ITS Cybersecurity Threats: Analysis, Categorization and Forecasting. In Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Moscow, Russia, 29 January–1 February 2018; pp. 136–141. [Google Scholar] [CrossRef]
- Sumra, I.A.; Ahmad, I.; Hasbullah, H.; Manan, J. Classes of attacks in VANET. In Proceedings of the 2011 Saudi International Electronics, Communications and Photonics Conference (SIECPC), Riyadh, Saudi Arabia, 24–26 April 2011; pp. 1–5. [Google Scholar] [CrossRef]
- Sumra, I.A.; Hasbullah, H.B.; Manan, J.; Ahmad, I.; Alghazzawi, D.M. Classification of Attacks in Vehicular Ad hoc Network (VANET). Inf. Int. Interdiscip. J. 2013, 16, 2995–3004. [Google Scholar]
- Nema, M.; Stalin, S.; Lokhande, V. Analysis of Attacks and Challenges in VANET. Int. J. Emerg. Technol. Adv. Eng. 2014, 4, 831–835. [Google Scholar]
- Mostovich, D.; Fabrikantov, P.; Vladyko, A.; Buinevich, M. High-Level Vulnerabilities of Software-Defined Networking in the Context of Telecommunication Network Evolution. In Proceedings of the 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg, Russia, 29 January–1 February 2017; pp. 184–186. [Google Scholar] [CrossRef]
- Chiasson, G.; Hays, D.; Nalinakshan, H.; Ranganna, S. Are Wi-Fi and 4G LTE on a collision course. PwC Commun. Rev. 2015. Available online: https://www.pwc.com/id/en/publications/assets/ticepublications/pwc-communications-review-wi-fi-4g-lte_final.pdf (accessed on 2 January 2019).
- Said, S.B.H.; Guillouard, K.; Bonnin, J.M. A Comparative Study on Security implementation in EPS/LTE and WLAN/802.11. In Book Wireless Networks and Security; Khan, S., Pathan, A.K., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 457–489. [Google Scholar]
- Volkov, A.; Khakimov, A.; Muthanna, A.; Kirichek, R.; Vladyko, A.; Koucheryavy, A. Interaction of the IoT Traffic Generated by a Smart City Segment with SDN Core Network. Lect. Notes Comput. Sci. 2017, 10372, 115–126. [Google Scholar] [CrossRef] [Green Version]
- Di Maio, A.; Palattella, M.R.; Soua, R.; Lamorte, L.; Vilajosana, X.; Alonso-Zarate, J.; Engel, T. Enabling SDN in VANETs: What is the Impact on Security? Sensors 2016, 16, 2077. [Google Scholar] [CrossRef]
- The OWASP Foundation. Available online: https://www.owasp.org (accessed on 31 August 2018).
- Shila, D.M.; Cao, X.; Cheng, Y.; Yang, Z.; Zhou, Y.; Chen, J. Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee. arXiv 2014, arXiv:1410.1613. [Google Scholar]
- Kirichek, R.; Kulik, V.; Koucheryavy, A. False Clouds for Internet of Things and Methods of Protection. In Proceedings of the 2016 18th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, South Korea, 31 January–3 February 2016; pp. 201–205. [Google Scholar] [CrossRef]
- Buinevich, M.; Izrailov, K.; Vladyko, A. The Life Cycle of Vulnerabilities in the Representations of Software for Telecommunication Devices. In Proceedings of the 2016 18th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea, 31 January–3 February 2016; pp. 430–435. [Google Scholar] [CrossRef]
- Ahmad, I.; Namal, S.; Ylianttila, M.; Gurtov, A. Security in Software Defined Networks: A Survey. IEEE Commun. Surv. Tutor. 2015, 17, 2317–2346. [Google Scholar] [CrossRef]
- Scott-Hayward, S.; Natarajan, S.; Sezer, S. A Survey of Security in Software Defined Networks. IEEE Commun. Surv. Tutor. 2016, 18, 623–654. [Google Scholar] [CrossRef]
- Ahmed, U.; Raza, I.; Hussain, S.A.; Ali, A.; Iqbal, M.; Wang, X. Modelling Cyber Security for Software-Defined Networks Those Grow Strong when Exposed to Threats. J. Reliab. Intell. Environ. 2015, 1, 123–146. [Google Scholar] [CrossRef]
- Yan, Z.; Zhang, P.; Vasilakos, A.V. A Security and Trust Framework for Virtualized Networks and Software-Defined Networking. Secur. Commun. Netw. 2016, 9, 3059–3069. [Google Scholar] [CrossRef]
- Dotcenko, S.; Vladyko, A.; Letenko, I. A Fuzzy Logic-Based Information Security Management for Software-Defined Networks. In Proceedings of the 16th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Korea, 16–19 February 2014; pp. 167–171. [Google Scholar] [CrossRef]
- Weber, R.H. Internet of Things—New Security and Privacy Challenges. Comput. Law Secur. Rev. 2010, 26, 23–30. [Google Scholar] [CrossRef]
- Suo, H.; Wan, J.; Zou, C.; Liu, J. Security in the Internet of Things: A Review. In Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), Hangzhou, China, 23–25 March 2012; pp. 648–651. [Google Scholar]
- Roman, R.; Najera, P.; Lopez, J. Securing the Internet of Things. Computer 2011, 44, 51–58. [Google Scholar] [CrossRef]
- Zhou, L.; Chao, H.C. Multimedia Traffic Security Architecture for the Internet of Things. IEEE Netw. 2011, 25, 35–40. [Google Scholar] [CrossRef]
- Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
- Saaty, T.L. How to make a decision: The analytic hierarchy process. Eur. J. Oper. Res. 1990, 48, 9–26. [Google Scholar] [CrossRef]
- Saaty, T.L. Decision-making with the AHP: Why is the principal eigenvector necessary. Eur. J. Oper. Res. 2003, 145, 85–91. [Google Scholar] [CrossRef]
- Buinevich, M.; Fabrikantov, P.; Stolyarova, E.; Izrailov, K.; Vladyko, A. Software Defined Internet of Things: Cyber Antifragility and Vulnerability Forecast. In Proceedings of the 2017 IEEE 11th International Conference on Application of Information and Communication Technologies (AICT), Moscow, Russia, 20–22 September 2017. [Google Scholar]
- Kazmi, A.; Khan, M.A.; Akram, M.U. DeVANET: Decentralized Software-Defined VANET Architecture. In Proceedings of the IEEE International Conference on Cloud Engineering Workshop (IC2EW), Berlin, Germany, 4–8 April 2016; pp. 42–47. [Google Scholar] [CrossRef]
- European Commission. European Strategy on Cooperative Intelligent Transport Systems, a Milestone Initiative Towards Cooperative, Connected and Automated Mobility; Named Data Networking’s Intrinsic Cyber-Resilience for Vehicular CPS; European Commission: Brussels, Belgium, 2016. [Google Scholar]
- Bouk, S.H.; Ahmed, S.H.; Hussain, R.; Eun, Y. Named Data Networking’s Intrinsic Cyber-Resilience for Vehicular CPS. IEEE Access 2018, 6, 60570–60585. [Google Scholar] [CrossRef]
Attack | Violation of Information Security: Immediate (mediate) | Target Object: Direct (indirect) | Wi-Fi | Cellular Communication |
---|---|---|---|---|
DoS (Denial of Service) | A | WN | [9,10,11,12,13,14] | [15,16,17] |
Tracking | C | V | [10,12,18,19,20,21,22,23,24,25,26,27] | [28,29] |
Routing | I | V, TI, WN | [10,30,31,32] | [15] |
Tampering Hardware | C, I, A | V, TI | [8] | [15] |
Sybil attack | (C), I, A | TI | [18,26,27,31,33,34,35,36,37,38,39] | |
Traffic analysis | C | (V), (TI), WN | [10,19,25,40,41,42,43] | [15,44] |
Jamming | A | V | [45] | [16] |
Global Positioning System (GPS) spoofing/position faking | I | V | [11,20,31,46,47,48,49,50,51,52,53] | |
Timing attack | C | WN | [12,14,31] | |
Message tampering/suppression/fabrication | C, I | WN | [9,20,21,38,39,42,46,54,55,56,57,58] | [59,60,61] |
Man in the middle | C, I | V, TI | [14,31,46,55,62] | [63,64] |
Brute force | C | (V), (TI), WN | [26,32,65] | |
Broadcast tampering | A | WN | [8] | |
Nodeimpersonation | C, I | V, TI | [10,20,24,26,34,36,55] | [15,66,67] |
Replay | C | WN | [10,20,38] | [68] |
Illusion attack | I | V, TI | [11,20,46] | |
Key and/or certificatereplication | C, I | V, TI | [12,18,35,26,54,69] | [37,70,71,72] |
Malware Spamming | C, I | WN | [36] | [15,73] |
Loss of event traceability | I, A | TI | [31,36,54] |
Direct Target Object | Immediate Violation of Information Security | ||
---|---|---|---|
Confidentiality (C) | Integrity (I) | Availability (A) | |
Vehicle (V) |
|
|
|
Transport Infrastructure (TI) |
|
|
|
Wireless Network (WN) |
|
|
|
SDN threat | SDN vulnerability | Synergetic impact of IoV |
---|---|---|
SDN_01: Using unauthorized controllers | Architectural feature of SDN is allocation of the module of management in a separate element of system—the controller. Therefore, unauthorized access to the controller will lead to the violation of functioning of the network or to complete malefactor control. | None |
SDN_02: Using unauthorized applications | The logic of operation of the SDN controller is adjusted at a higher level, exactly in applications. Thus, unauthorized access to the application will lead to a threat that is similar to SDN_01 consequences. | None |
SDN_03: Account) data leak | Interception of the packages by the malefactor that are sent to the controller will allow their analysis, that can subsequently be used for the intentional generation of wrong packages. Certificates and keys (account data) can also be intercepted by the malefactor, which is inadmissible. | Formation of I-effect with IoV_02 is possible (see Table 4). |
SDN_04: Data modification | The scheme of the wireless network built on the principles of SDN is vulnerable to “man in the middle” type attacks. | Formation of N-effect is possible: The development of special protocols of exchange for IoV devices will allow the reduction of the risk of modification of data or finding the fact of such modification. |
SDN_05: Denial of service | Features of processing of new streams in SDN can potentially lead to denial of service (DoS) attack implementation. | Formation of N-effect is possible: Protocols for IoV devices can be adjusted in such a way to minimize traffic and to reduce the risk of implementation of a DoS attack. |
SDN_06: Misconfiguration and human factor | The wrong configuration of devices influencing safety of all SDN levels represents a typical and rather serious threat for any network. The possibility of manual control of a configuration on the part of the client automatically leads to the threat of a so-called “human factor”. | Formation of I-effect with IoV_10 is possible (see Table 4); it is considered above (see Case 3). |
SDN_07: Creation of unencrypted network channels | The lack of the mandatory requirement to use transport layer security (TLS) in the OpenFlow protocol is going to be threat of cyber security of SDN, being a consequence of its architecture. | None |
SDN_08: Inner protocol network elements | The SDN model allows short-term interruptions of network connections. The detection of the loss of connections by the controller at the same time will not be instant, which will finally lead to a loss of data. | Formation of I-effect with IoV_04 is possible (see Table 4). |
SDN_09: OpenFlow usage | The absence in OpenFlow of “clever switching” together with sending the special teams by the malefactor to devices supporting OpenFlow can lead to the violation of work of stand-alone programs (applications) or of the whole network. | None |
SDN_10: API layer interaction | One more weak point in the architecture of SDN is the interface of the interaction of applications, controllers and routers, leading to corresponding threats. | None |
IoV threat | IoV vulnerability | Synergetic impact of SDN |
---|---|---|
IoV _01: Public IP hacking | Presence of open and insecure IP; this applies to the majority of IoV devices, and allows the implementation of the corresponding attacks, which causes the system to break. | Formation of N-effect is possible: The correct organization of SDN streams minimizes or limits access for the malefactor to IoV devices with public IP. |
IoV _02: WLAN link interception | Interception of open traffic of IoV devices by WLAN allows the malefactor to obtain confidential information, using which they are able to carry out subsequent attacks. | Formation of I-effect with SDN_03 is possible (see Table 3). |
IoV _03: “Brute-force” attack | Access to control of IoV devices can be provided by brute force attack on an account’s password, because of the lack of a serious system of authentication in the case of their weak computing power. | None |
IoV _04: Cloud connection halting | Even short-term failure of the exchange of traffic of IoV devices with a cloud can lead to the full infrastructure‘s refusal. | Formation of I-effect with SDN_08 is possible (see Table 3). |
IoV _05: Destructive electromagnetic influence | Weak signals from IoV devices can be lost in the case of influence by a close or purposeful electromagnetic impulse. | None |
IoV _06: Fake connecting | The IPv6 mechanism, used for IoV network scaling, allows the malefactor to create fake IoV devices, redirecting necessary traffic on itself. | Formation of N-effect is possible: The SDN controller can partially operate streams at the time of addition of the new IoV device; this means “false” knots cannot connect to a network (including to “clouds”). This is considered above (see Case 1*). |
IoV _07: Physical access | The main feature of IoV devices is their very small size, and the possibility of embedding in household objects is a serious threat in the case of a malefactor’s physical access to them. | None |
IoV _08: Energy depletion | The very small sizes of IoV devices require them to use batteries (because of the lack of a strict main power feed) with a limited validity period. This period of time can be considerably reduced by the malefactor by the creation of operating conditions of the IoV device with excessively high loading. | Formation of N-effect is possible: The ability of SDN and algorithms of operation of its controller to trace network loading allow the prevention of the exhaustion of energy of IoV devices; it is considered above (see Case 1). |
IoV _09: Buggs | The vulnerabilities that are present at any difficult software can often be destructive for IoV networks. | None |
IoV _10: Error clone | Mass setup of the same IoV devices leads to the duplication of a wrong configuration. | Formation of I-effect with SDN_06 is possible (see Table 3); it is considered above (see Case 3). |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Buinevich, M.; Vladyko, A. Forecasting Issues of Wireless Communication Networks’ Cyber Resilience for An Intelligent Transportation System: An Overview of Cyber Attacks. Information 2019, 10, 27. https://doi.org/10.3390/info10010027
Buinevich M, Vladyko A. Forecasting Issues of Wireless Communication Networks’ Cyber Resilience for An Intelligent Transportation System: An Overview of Cyber Attacks. Information. 2019; 10(1):27. https://doi.org/10.3390/info10010027
Chicago/Turabian StyleBuinevich, Mikhail, and Andrei Vladyko. 2019. "Forecasting Issues of Wireless Communication Networks’ Cyber Resilience for An Intelligent Transportation System: An Overview of Cyber Attacks" Information 10, no. 1: 27. https://doi.org/10.3390/info10010027
APA StyleBuinevich, M., & Vladyko, A. (2019). Forecasting Issues of Wireless Communication Networks’ Cyber Resilience for An Intelligent Transportation System: An Overview of Cyber Attacks. Information, 10(1), 27. https://doi.org/10.3390/info10010027