Open Access   Article Go Back

Vulnerabilities, Threats and Attacks on SCADA, Mobile Networks and in IoT

Latha. P1 , 2 , he Pallavi3

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-13 , Page no. 10-15, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si13.1015

Online published on May 14, 2019

Copyright © Latha. P, ,he Pallavi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Latha. P, ,he Pallavi, “Vulnerabilities, Threats and Attacks on SCADA, Mobile Networks and in IoT,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.13, pp.10-15, 2019.

MLA Style Citation: Latha. P, ,he Pallavi "Vulnerabilities, Threats and Attacks on SCADA, Mobile Networks and in IoT." International Journal of Computer Sciences and Engineering 07.13 (2019): 10-15.

APA Style Citation: Latha. P, ,he Pallavi, (2019). Vulnerabilities, Threats and Attacks on SCADA, Mobile Networks and in IoT. International Journal of Computer Sciences and Engineering, 07(13), 10-15.

BibTex Style Citation:
@article{P_2019,
author = {Latha. P, ,he Pallavi},
title = {Vulnerabilities, Threats and Attacks on SCADA, Mobile Networks and in IoT},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {13},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {10-15},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1070},
doi = {https://doi.org/10.26438/ijcse/v7i13.1015}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i13.1015}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1070
TI - Vulnerabilities, Threats and Attacks on SCADA, Mobile Networks and in IoT
T2 - International Journal of Computer Sciences and Engineering
AU - Latha. P, ,he Pallavi
PY - 2019
DA - 2019/05/14
PB - IJCSE, Indore, INDIA
SP - 10-15
IS - 13
VL - 07
SN - 2347-2693
ER -

           

Abstract

Ever since the emergence of 1G in mobile technology, evolution of new mobile generations have introduced various protocols and interfaces, high data transmission capacity making way for different vulnerabilities which allows for launch of attacks on network components. Performance of mobile networks and security is of a major concern. Industrial networks and automation networks were isolated in a physical sense until the emergence of Supervisory Control and Data Acquisition (SCADA). Simplicity, more productivity, reduction in downtime for system adjustments are some advantages with the industrial networks going public on internet. The result is the increase in the number of attack vectors on the SCADA system. IoT to define is a transformative approach providing numerous services over internet. Integrating the existing smart devices to the internet introduces security issues, threat of cyber attacks and crime. In this paper, we discuss the various vulnerabilities, threats and attacks on these three systems namely Mobile networks, SCADA systems, and IoT systems.

Key-Words / Index Term

Mobile networks, Mobile network security, SCADA systems, Internet of Things, security, vulnerabilities

References

[1] SILVÈRE MAVOUNGOU1, GEORGES KADDOUM1, (Member, IEEE), MOSTAFA TAHA2, (Member, IEEE), AND GEORGES MATAR1 “Survey on Threats and Attacks on Mobile Networks” IEEE Access, Year: 2016 , Volume: 4, Page s: 4543 – 4572,IEEE Journals & Magazines
[2] A. Kumar, Y. Liu, J. Sengupta, and Divya. (Dec. 2010). “Evolution of Mobile Wireless Communication Networks: 1G to 4G.” [Online]. Available: http://www.iject.org/pdf/amit.pdf
[3] M. O§ul and S. Bakt_r, ``Practical attacks on mobile cellular networks and possible counter measures,`` Future Internet, vol. 5, no. 4, pp.474_489, 2013. [Online]. Available: http://www.mdpi.com/1999- 5903/5/4/474
[4] Y. Zheng, D. He, X. Tang, and H.Wang, ``AKA and authorization scheme for 4G mobile networks based on trusted mobile platform,`` in Proc. 5th Int. Conf. Inf. Commun. Signal Process., 2005, pp. 976_980.
[5] X. Li and Y. Wang, ``Security enhanced authentication and key agreement protocol for LTE/SAE network,`` in Proc. 7th Int. Conf. Wireless
[6] Commun., Netw. Mobile Comput. (WiCOM), Sep. 2011, pp. 1_4.
[7] M. Liyanage and A. Gurtov, ``Secured VPN models for LTE backhaul networks,`` in Proc. IEEE Veh. Technol. Conf. (VTC Fall), Sep. 2012,pp. 1_5.
[8] C.-K. Han and H.-K. Choi, ``Security analysis of handover key management in 4G LTE/SAE networks,`` IEEE Trans. Mobile Comput., vol. 13, no. 2, pp. 457_468, Feb. 2014.
[9] D. Yu and W. Wen, ``Non-access-stratum request attack in E- UTRAN,`` in Proc. Comput., Commun. Appl. Conf. (ComComAp), Jan.2012, pp. 48_53.
[10] R. Bassil, I. H. Elhajj, A. Chehab, and A. Kayssi, ``Effects of signaling attacks on LTE networks,`` in Proc. 27th Int. Conf. Adv. Inf. Netw. Appl.Workshops (WAINA), Mar. 2013, pp. 499_504.
[11] R. Bassil, I. H. Elhajj, A. Chehab, and A. kayssi, ``A resource reservation attack against LTE networks,`` in Proc. 3rd Int. Conf. Commun. Inf. Technol. (ICCIT), Jun. 2013, pp. 262_268.
[12] S. Park, S. Kim, J. Oh, M. Noh, and C. Im, ``Threats and countermeasures on a 4G mobile network,`` in Proc. 8th Int. Conf. Innov. Mobile Internet Services Ubiquitous Comput. (IMIS), Jul. 2014, pp. 538_541.
[13] R. P. Jover, J. Lackey, and A. Raghavan, ``Enhancing the security of LTE networks against jamming attacks,`` EURASIP J. Inf. Secur., vol. 2014, no. 1, pp. 1_14, Dec. 2014. [Online]. Available: http://dx.doi.org/10.1186/1687-417X-2014-7 C. Shahriar et al., ``PHY- layer resiliency in OFDM communications: A tutorial`` IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 292_314,1st Quart., 2015
[14] Y. Park and T. Park, ``A survey of security threats on 4G networks,`` in Proc. IEEE Globecom Workshops, Nov. 2007, pp. 1_6.
[15] B. Matt and C. Li, ``A survey of the security and threats of the IMTadvanced requirements for 4G standards,`` in Proc. IEEE Conf. Anthol., Jan. 2013, pp. 1_5.
[16] M. Lichtman, T. Czauski, S. Ha, P. David, and J. H. Reed, ``Detection and mitigation of uplink control channel jamming in LTE,`` in Proc. IEEE Military Commun. Conf., Oct. 2014, pp. 1187_1194.
[17] Y. Zou, J. Zhu, X. Wang, and L. Hanzo. (May 2015). “A survey on wireless security: Technical challenges, recent advances and future trends.`` [Online]. Available: https://arxiv.org/pdf/1505.07919.pdf
[18] M. Lichtman, R. P. Jover, M. Labib, R. Rao, V. Marojevic, and J. H. Reed, ``LTE/LTE-A jamming, spoo_ng, and snif_ng: Threat assessment and mitigation,`` IEEE Commun. Mag., vol. 54, no. 4, pp. 54_61, Apr. 2016.
[19] M. Becher, F. C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, and C. Wolf, ``Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices,`` in Proc. IEEE Symp. Secur. Privacy, May 2011, pp. 96_111.
[20] M. La Polla, F. Martinelli, and D. Sgandurra, ``A survey on security for mobile devices,`` IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 446_471, 1st Quart., 2013.
[21] R. Muraleedharan and L. A. Osadciw, ``Increasing QoS and security in 4G networks using cognitive intelligence,`` in Proc. IEEE Globecom Workshops, Nov. 2007, pp. 1_6.
[22] C. B. Sankaran, ``Network access security in next-generation 3GPP systems: A tutorial,`` IEEE Commun. Mag., vol. 47, no. 2, pp. 84_91, Feb. 2009.
[23] Simon Duque Ant´on, Daniel Fraunholz, Christoph Lipps, Frederic Pohl, Marc Zimmermann and Hans D. Schotten, “Two Decades of SCADA Exploitation: A Brief History”, 2017 IEEE Conference on Application, Information and Network Security (AINS), 978-1-5386- 0725-1/17
[24] V. M. Igure, S. A. Laughter, and R. D. Williams, “Security issues in scada networks,” Computers & Security, vol. 25, pp. 498–506, 2006.
[25] B. Zhu, A. Joseph, and S. Sastry, “A taxonomy of cyber attacks on scada systems,” 2011 International Conference on Internet of Things and 4thInternational Conference on Cyber, Physical and Social Computing, pp. 380–388, 2011.
[26] P. S. Motta Pires and Oliveira, Luiz Affonso H. G., “Security aspects of scada and corporate network interconnection: An overview,” 2006, International Conference on Dependability of Computer Systems, pp.127–134, 2006.
[27] J. Caswell, “A survey of industrial control systems security,” 2011. [Online]. Available: https://www.cse.wustl.edu/∼jain/cse571- 11/ftp/ics/
[28] B. Meixell and E. Forner, “Out of control: Demonstrating scada exploitation,” Las Vegas, July 2013. [Online]. Available: https://www.blackhat.com/us-13/
[29] MODICON Inc., 1996. [Online]. Available: http://www.modbus.org/docs/PI MBUS 300.pdf
[30]FlexRay Consortium, “Flexray communications system protocol specification version 3.0.1,” 2010. [Online]. Available: https://svn.ipd.kit.edu/nlrp/public/FlexRay/FlexRay%E2%84%A2%20Proto col%20Specification%20Version%203.0.1.pdf
[29] PROFIBUS, “Profinet specification,” 2017. [Online]. Available: http://www.profibus.com/nc/download/specifications-standards/downloads/profinet-io-secification/display
[30] Bluetooth SIG, “Specification of the bluetooth system,” 2010. [Online]. Available: https://www.google.de/url?sa=t&rct=j&q=&esrc= s&source=web&cd=1&ved=0ahUKEwiY76 but3UAhWDWBoKHXnARUQFggpMAA&url=https%3A%2F%2Fwww.bl uetooth.org%2Fdocman%2Fhandlers%2Fdownloaddoc.ashx%3Fdoc id%3D229737&usg=AFQjCNFY1IFeFAAWwimnoaWMsIRZQvPDSw& cad=rja [31] ZigBee Alliance, “Zigbee specification,” 2004. [Online].
[32] Arsalan Mosenia ; Niraj K. Jha, “A Comprehensive Study of ”, IEEE Transactions on Emerging Topics in Computing, year: 2017 , Volume: 5 , Issue: 4, Page s: 586 – 602, IEEE Journals & Magazines