Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
16 views14 pages

Vardhman Jain

The document discusses the rising cyber security threats and vulnerabilities associated with wireless sensor networks (WSN) and control systems, emphasizing the need for protection against potential attacks that can compromise sensitive information and disrupt operations. It highlights various types of cyber threats such as eavesdropping, denial of service, and replay attacks that target these interconnected systems across different industries. The paper calls for proactive measures to safeguard critical infrastructures from these evolving cyber risks.

Uploaded by

11asiddhamjain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views14 pages

Vardhman Jain

The document discusses the rising cyber security threats and vulnerabilities associated with wireless sensor networks (WSN) and control systems, emphasizing the need for protection against potential attacks that can compromise sensitive information and disrupt operations. It highlights various types of cyber threats such as eavesdropping, denial of service, and replay attacks that target these interconnected systems across different industries. The paper calls for proactive measures to safeguard critical infrastructures from these evolving cyber risks.

Uploaded by

11asiddhamjain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Cyber security threats and

vulnerabilities in sensing, wireless


communication, and control systems

Abstract:
In today’s era cyber security threats are rising at a very rapid rate. Managing
and protecting against cyber-attacks is the need of the hour as many
organizations are getting breached leading to loss of sensitive information
and heavy damage to their reputation. Numerous threats endanger the
privacy of individuals to maintain confidentiality, they demand respect for
their choices. Nowadays dependency on wireless sensors and control
systems for monitoring their infrastructure and communicating them through
wireless channels that is quite vulnerable to cyber-attacks, so they need to
be protected to prevent the whole organization from being compromised.
Wireless Sensor Networks are helpful in making an interconnection between
these sensors and control systems, but the nodes of WSN, the sensors being
deployed on critical environment are susceptible to cyber threats leading to
harm for infrastructure they have been deployed for. In this paper we have
discussed various types of cyber threats and vulnerabilities in different
sectors across the globe.

Keywords:

Introduction:
In an interconnected world, the dependency on sensing, wireless
communication and control systems has reached new heights, bringing a
revolution across different industries around the globe. However, with this
increased dependency comes impending shadow of cyber security threats
and vulnerabilities. There can be destructive effects of cyber threats and
vulnerabilities on wireless sensors, communication and control systems.
There can be massive loss including economic loss, sensitive data being
compromised, disruption in operations and can even pose threat to public
safety and security.

As the integration and capabilities of sensors, wireless communications and


control systems increase, the landscape of cyber security is also evolving
rapidly. Organizations are scuffling with the complexity of protecting these
interconnected systems against a wide range of cyber threats and it
becomes crucial to understand the potential risks and take proactive
measures protecting them. The threats can arise from both internal and
external sources such as malicious attackers.

In various industries including healthcare, power industry, oil and gas


industry, the critical infrastructure makes use of multiple sensors used along
with the control system for monitoring purposes, storing data and
communicating the processed information. These wireless sensors and
control systems form a network known as Wireless Sensor Network (WSN) for
communicating information. This information is communicated via wireless
channels to the central systems. The sensors processing data are vulnerable
to various cyber-attacks. All the traffic is transmitted through wireless
channels making it vulnerable to cyber threats. An attacker can sniff through
and intercept the traffic passing by, can also modify it in such a way that it
can be later used to compromise the whole infrastructure and further
propagating and infecting other parts of the network.

There are many vulnerabilities that can exploit the wireless communication
channel. One such technique is Eavesdropping. In eavesdropping, an
attacker sniffs the traffic communicating over a network. It also involves
intercepting, modifying and deleting the data in transmission. This could also
lead to leakage of sensitive information being transmitted as attackers can
gain potential insights of critical nodes present in the network for further
exploits. Attackers can perform traffic analysis for identifying behavioral
patterns facilitating further exploits. Moreover, information and insights
gathered can lay the foundation to perform more sophisticated attacks like
spoofing legitimate sensor nodes or perform malicious code injection into the
network.

Another threat exploiting WSN sensor is DoS (Denial of Service) attack. In a


DoS attack, an attacker aims to flood the target device with traffic so that it
crashes and is unavailable to the network leading to interruption in a
network and disturbing the normal operations. Jamming a sensor can stop
sensor nodes from communicating critical information, silencing their data
and control actions. Flooding WSN nodes can also lead to depletion of
computational resources and battery life, ultimately leading to loss in
connectivity. Attackers can use compromised nodes to stop forwarding the
information or modify the routing tables leading to interruption in network.

Replay attacks are also a major threat to WSN. In a replay attack, an


attacker captures the traffic and retransmits it to impersonate as a
legitimate node and injects the false data into the network stream. Sinkhole
attacks pose a great threat in which an attacker directs the traffic towards a
compromised node leading to eavesdropping. Selective forwarding attack
can also lead to disruption of network. In this attack, the attacker
compromises intermediate nodes leading to dropping packets or forwarding
only selected packets leading to data loss or manipulation of data.

Literature Review:
[1] WSN (Wireless Sensor Networks) are a small, embedded device used to
monitor and control a specific phenomenon which communicates wirelessly.
WSN is a very vulnerable attack surface that could lead to spread of the
cyber-attack to other components as well.

[2] As the dependency on Real Time Distributed Control System is increasing


in industry for autonomous supervision, it is making it more vulnerable to
cyber attacks as it increases the threat. RTDCS can be an easy attack
surface for a cybercriminal to take over the main system.

[3] Wireless Sensors that are connected to IoT are the main cause of threat
and are vulnerable to a cyber attack. The communication standards and
protocols used in the wireless communications are the primary cause of
vulnerability and their vulnerabilities can be found using practical examples
of past cyber attacks

[4] Industrial Control Systems are the most common type of Cyber Physical
Systems, and these are widely used in critical infrastructure like power grids,
healthcare sector etc. So, it’s security should be the top priority to protect
these infrastructure

[5] Wireless Sensor Networks which are based on real-time have replaced
the traditional monitoring sensors, since they are deployed in critical
infrastructures like power grids, they are vulnerable to cyber attacks and
they need to be protected, these monitoring systems use various types of
wireless communication channels which are more vulnerable to cyber
security risks

[6] A cyber physical sensor system consists of Wireless Access Point, sensor
and actuators which collects data regularly in real time, processes it and
then performs certain actions based on the algorithm, Also the collected data
is transferred through wireless medium which can be compromised

[7] Dependency on Cyber Physical systems is increasing day by day, but


their development faces a major challenge of cyber threats and
vulnerabilities. The architecture of CPS is divided into three layers - Physical,
Network and Application Layer. The CPS may be vulnerable to cyber risks
from three aspects - management and policy, platform and finally the
network.

[8] As hardware and software are evolving day by day, the use of WSN is
also increasing for monitoring and control purposes. The sensors in WSN
collect a large amount of sensitive information which is vulnerable to cyber
attacks and needs to be protected. This can be done by encrypting the data
sent over wireless channels or using the new technology such as blockchain

[9] Industrial use of wireless sensors and control systems is increasing, with
an increasing threat to the data being transmitted by these sensors via
wireless channels making it vulnerable to cyber attacks. A proper risk
assessment should be done of the standards of wireless channels to find
vulnerabilities and fix them before being exploited by the attacker.

[10] As the author states the use of Cyber Physical Systems is increasing
with an increase in its importance in critical infrastructure and in daily life.
But there may be some security issues due to the presence of embedded
computers and networks which may result in economic loss.

[11] According to the author the security of APCS and SCADA (supervisory
Controls and Data Acquisition Systems) depends upon the applied protection
technologies of transport environment data transmission components and
detecting attacks in WSN (Wireless Sensor Networks) of SCADA systems.
Although the encryption in WSN has been resolved but key management
problems still exist.

[12] As the author narrates, control systems have become an important part
in critical infrastructures, mostly in the industrial sector. Many
communication standards are being used for the transmission of data like
Zigbee, WirelessHART and ISA100.11a that ensures security but there are
some flaws in routing protocols

[13] As the author states, the main purpose of cyber security for IT
(Information Technology) is the protection of IP (Internet Protocol) based
networks from malicious attacks and unintentional incidents. But cyber
security for control systems is different due to use of several low-level
communication protocols

[14] According to the author the concept of smart cities also known as digital
cities or connected cities is evolving. But since everything will be
interconnected, it will pose a major security threat to the infrastructure.
Major steps need to be taken in the direction of security of these
interconnected components in the infrastructure

[15] As the author narrates that WSN (Wireless Sensor networks) are
deployed without any predefined infrastructure and then left unattended,
posing a security threat to the infrastructure. The data is transmitted via air
medium making the traffic to be tampered easily. They need to be protected,
respecting their specific constraints of power and memory.

[16] As the author states WSN (Wireless Sensor Networks) has a wide
application in different industries like defense, medical, industrial etc. WSNs
are widely used for communication between different sensor nodes for
monitoring purposes. The medium of data transfer makes the infrastructure
vulnerable to various kinds of cyber threats.

[17] According to author in recent times the application of IoMT (Internet of


Medical Things) has rapidly increased. The embedded systems and wireless
networks involved in this are vulnerable to major cyber attacks including DoS
(Denial of Service) and Eavesdropping. Use of blockchain can make it more
secure.

[18] According to the author the use of WSN (Wireless Sensor Network) is
increasing in the agricultural sector. It is used for collecting various kinds of
data including humidity levels and temperature monitoring. Data security is
a major threat that needs to be addressed in communication of collected
data.

[19] As the author states, the field of robotics had evolved drastically,
serving, facilitating and enhancing human life. Moreover, they are vulnerable
to cyber attacks as they can be hijacked and controlled by attacker causing
unintended accidents
[20] As the author narrates the most significant application of IoT is Smart
Girds developed using information and communication technologies. They
are used in critical infrastructures and due to their complex architecture,
they include critical devices which are vulnerable and if exploited may
disrupt public order and economic loss too.

[21] According to the author Industrial Control system (ICS) includes SCADA
(Supervisory Control and Data Acquisition) system, DCS (Distributed Control
System) are used in critical infrastructures like nuclear plants, thermal
plants, power plants, heavy industries are becoming an easy target for
attackers due their vulnerable state.

[22] As the author narrates WSN (Wireless Senor Network) is becoming a


critical part in Big Data, Cloud Computing and IoT as well. Since sensor nodes
are resource constrained, they are becoming an easy target for attackers.

[23] According to the author WSN (Wireless Sensor Network) has been widely
used in various industrial applications for monitoring and control purposes
increasing the efficiency of their infrastructure, lowering the failures. The
protocols and wireless communication channels being used should be
protected.

[24] As the author narrates Smart Grid Cyber Physical systems are replacing
the traditional power grids. The SCADA (supervisory control and data
acquisition) systems, ADMS (Advanced Distribution Management Systems)
and AMI (Advanced Metering Infrastructure) frameworks make use of certain
standards and protocols for data protection.

[25] As the author states the use of SCADA system along with WSN has
increased the efficiency of these systems. It has made these systems
interconnected from being isolated. But this interconnection has exposed the
SCADA network to outside world making it vulnerable to cyber threats

[26] According to the author transmitting and storing processed information


by IoT devices is the main concern as wireless channels are used for
transmission of data and these channels are very vulnerable to cyber
attacks. These channels being compromised can lead to leakage of sensitive
personal information and even trade secrets.

[27] According to the author, the use of WSN (Wireless Sensor Networks) is
increasing rapidly, with the support of IoT. WSN has the capability of
delivering information without any restriction of time and space. We need to
protect its nodes due to their deployment in harsh environments.
[28] As the author states, the usage of WSN (Wireless Sensor Network) has
increased in almost all parts of human life, which is also exposing them to
various cyber threats. It is also used as a remote monitoring system in
industries and these need to be protected to maintain data confidentiality,
integrity and availability.

[29] As the author narrates, WSN (Wireless Sensor Network) are used to
gather different types of data in various sectors including military, traffic
monitoring, power management, healthcare and so on. Due to their limited
resources less storage capacity and low power they are vulnerable to DoS
(Denial of Service) Attacks

[30] As the author states, IoT (Internet of Things) has a variety of


applications. IoT is a network of various smart devices such as Smart TVs,
actuators and sensors. WSN (Wireless Sensor Network) plays a crucial role in
this technology, but their wireless communication channels are vulnerable to
cyber attacks

[31] As the author says, email communication has become a necessary


medium for information exchange. It is also considered as a crucial part of
various sectors including government institutions, education, commerce,
business and various other fields across the globe, but spam or junk emails
have become a headache as they are unwanted and can be dangerous too.

[32] According to the author, security and privacy are very important aspects
required to work upon in various applications. Cyber-physical system is the
most widely used infrastructure for tackling different types of challenges. In
today’s era IoT (Internet of Things) and CPS have made decision making very
fast by helping in many industrial fields and taking them to another level.

[33] As the author narrates, from small household devices to large industrial
machines have faced a transformation and become smart interacting with
each other and with the physical world forming a network. This has led them
to become the center of attention for the attackers. Smart devices contain
sensors including accelerometer, gyroscope, microphone etc. are vulnerable
to cyber threats as they can be used to trigger malicious activity.

[34] According to the author, nowadays data security is the major concern on
every field including banking sector, Data is now being stored on cloud
servers as attackers can attack the data and hack into user’s details leading
to leakage of sensitive user data and causing harm to reputation of the
organization.
[35] As the author says, the traditional power grids has evolved into smart
grids. The areas of privacy, connection and security management needs to
be addressed from cyber perspective to ensure smooth operations. If their
vulnerabilities are exploited it can be disastrous resulting in inconsistent
operations.

[36] According to the author, IoT (Internet of Things) has changed our way of
living. IoT has impacted different domains like transportation, health-care,
education and many others. But it also opens up various risks that need to
be addressed to protect sensitive information.

[37] As the author states, the revolution in IoT has impacted the agriculture
sector to a great extent. Various methodologies have been revolutionized
but this also brings a threat of cyber attacks disrupting the services and
normal operations of the sector. These threats need to be addressed and
should be prevented for smooth workflow of agriculture sector.

[38] As the author narrates, rigorous research has been conducted in the
field of cyber security, to support various applications and avoid the
emerging cyber threats. There are a lot of vulnerabilities that have been
addressed, but still there is a need to create mitigation techniques to
safeguard from future threats and vulnerabilities.

[39] As the author says, Cyber Physical Systems has revolutionized the
automobile industry. Various kinds of sensors and control systems have been
deployed in vehicles nowadays enabling them to interact with the physical
world. Cyber attacks in communications channels need to be prevented to
avoid the infrastructure from being compromised

[40] According to the author, use of Bluetooth technology for communication


between IoT (Internet of Things) devices has increased significantly. From
smart wearables to ultra-low energy consumption devices, Bluetooth is used
to transmit data, but it has a constant cyber threat, if exploited may prove
disastrous and need to be prevented.
References:
[1] L. Chhaya, P. Sharma, G. Bhagwatikar, and A. Kumar, “Wireless Sensor Network
Based Smart Grid Communications: Cyber Attacks, Intrusion Detection System and
Topology Control,” Electronics, vol. 6, no. 1, p. 5, Jan. 2017, doi:
https://doi.org/10.3390/electronics6010005.

[2] R. Kisner et al., “Cybersecurity through Real-Time Distributed Control Systems


Prepared by,” 2010. Accessed: Apr. 21, 2024. [Online]. Available:
https://citeseerx.ist.psu.edu/document?
repid=rep1&type=pdf&doi=a538e9a2be9e06ede9238ad48d956d9cd64bf3e
a#page=2.17

[3] A. Burg, A. Chattopadhyay, and K.-Y. Lam, “Wireless Communication and Security
Issues for Cyber–Physical Systems and the Internet-of-Things,” Proceedings of the
IEEE, vol. 106, no. 1, pp. 38–60, Jan. 2018, doi:
https://doi.org/10.1109/jproc.2017.2780172.

[4] T. Lu et al., “Cyberphysical Security for Industrial Control Systems Based on


Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol.
10, no. 6, pp. 438350–438350, Jun. 2014, doi:
https://doi.org/10.1155/2014/438350.

[5] D. He, S. Chan, and M. Guizani, “Cyber Security Analysis and Protection of
Wireless Sensor Networks for Smart Grid Monitoring,” IEEE Wireless
Communications, vol. 24, no. 6, pp. 98–103, Dec. 2017, doi:
https://doi.org/10.1109/mwc.2017.1600283wc.

[6] A. Essa, T. Al-Shoura, A. Al Nabulsi, A. R. Al-Ali, and F. Aloul, “Cyber Physical


Sensors System Security: Threats, Vulnerabilities, and Solutions,” IEEE Xplore, Aug.
01, 2018. https://ieeexplore.ieee.org/abstract/document/8541316?
casa_token=sPV0XwWsIcoAAAAA:KQjrHXneS3yQiVmIlxs8SrxDiXOn43nxT7ZV-
amNmJpGzsXvlxTTxeavNvD8MqJysHo0woJu9syb (accessed Mar. 27, 2022).

[7] Y. Gao et al., “Analysis of security threats and vulnerability for cyber-physical
systems,” Proceedings of 2013 3rd International Conference on Computer Science
and Network Technology, Oct. 2013, doi:
https://doi.org/10.1109/iccsnt.2013.6967062.

[8] Bhanu chander and Kumaravelan Gopalakrishnan, “Security Vulnerabilities and


Issues of Traditional Wireless Sensors Networks in IoT,” Intelligent Systems
Reference Library, pp. 519–549, Nov. 2019, doi: https://doi.org/10.1007/978-3-
030-33596-0_21.

[9] Sandor Plosz, Arsham Farshad, M. Tauber, C. Lesjak, T. Ruprechter, and N.


Pereira, “Security vulnerabilities and risks in industrial usage of wireless
communication,” Sep. 2014, doi: https://doi.org/10.1109/etfa.2014.7005129.

[10] D. Ding, Q.-L. Han, Y. Xiang, X. Ge, and X.-M. Zhang, “A survey on security control
and attack detection for industrial cyber-physical systems,” Neurocomputing, vol.
275, pp. 1674–1683, Jan. 2018, doi:
https://doi.org/10.1016/j.neucom.2017.10.009.

[11] A. G. Finogeev and A. A. Finogeev, “Information attacks and security in wireless


sensor networks of industrial SCADA systems,” Journal of Industrial Information
Integration, vol. 5, pp. 6–16, Mar. 2017, doi:
https://doi.org/10.1016/j.jii.2017.02.002.

[12] C. Alcaraz and J. Lopez, “A Security Analysis for Wireless Sensor Mesh Networks
in Highly Critical Systems,” IEEE Transactions on Systems, Man, and Cybernetics, Part
C (Applications and Reviews), vol. 40, no. 4, pp. 419–428, Jul. 2010, doi:
https://doi.org/10.1109/tsmcc.2010.2045373.

[13] J. Weiss, “Control System Cyber Security,” Journal of Critical Infrastructure


Policy, vol. 1, no. 2, 2020, doi: https://doi.org/10.18278/jcip.1.2.7.

[14] M. A. Obaidat, “Threats and vulnerabilities of wireless sensor networks in smart


cities,” Elsevier eBooks, pp. 463–491, Jan. 2022, doi: https://doi.org/10.1016/b978-
0-12-817784-6.00024-2.

[15] D. E. Boubiche, S. Athmani, S. Boubiche, and H. Toral-Cruz, “Cybersecurity Issues


in Wireless Sensor Networks: Current Challenges and Solutions,” Wireless Personal
Communications, Mar. 2020, doi: https://doi.org/10.1007/s11277-020-07213-5.
[16] K. M and S. D, “Wireless Sensor Networks: Active and Passive attacks
Vulnerabilities and Countermeasures,” Global Transitions Proceedings, vol. 2, no. 2,
Aug. 2021, doi: https://doi.org/10.1016/j.gltp.2021.08.045.

[17] M. K. Hasan et al., “A Review on Security threats, vulnerabilities, and Counter


Measures of 5G Enabled Internet‐of‐Medical‐Things,” IET Communications, vol. 16,
no. 5, Nov. 2021, doi: https://doi.org/10.1049/cmu2.12301.

[18] R. Prodanović et al., “Wireless Sensor Network in Agriculture: Model of Cyber


Security,” Sensors, vol. 20, no. 23, p. 6747, Nov. 2020, doi:
https://doi.org/10.3390/s20236747.

[19] J.-P. A. Yaacoub, H. N. Noura, O. Salman, and A. Chehab, “Robotics Cyber


security: vulnerabilities, attacks, countermeasures, and Recommendations,”
International Journal of Information Security, vol. 21, no. 21, Mar. 2021, doi:
https://doi.org/10.1007/s10207-021-00545-8.

[20] M. Z. Gunduz and R. Das, “Cyber-security on smart grid: Threats and potential
solutions,” Computer Networks, vol. 169, no. 107094, p. 107094, Mar. 2020, doi:
https://doi.org/10.1016/j.comnet.2019.107094.

[21] D. Bhamare, M. Zolanvari, A. Erbad, R. Jain, K. Khan, and N. Meskin,


“Cybersecurity for industrial control systems: A survey,” Computers & Security, vol.
89, p. 101677, Feb. 2020, doi: https://doi.org/10.1016/j.cose.2019.101677.

[22] W. Fang, W. Zhang, W. Chen, T. Pan, Y. Ni, and Y. Yang, “Trust-Based Attack and
Defense in Wireless Sensor Networks: A Survey,” Wireless Communications and
Mobile Computing, vol. 2020, pp. 1–20, Sep. 2020, doi:
https://doi.org/10.1155/2020/2643546.

[23] B. Bhushan and G. Sahoo, “Requirements, Protocols, and Security Challenges in


Wireless Sensor Networks: An Industrial Perspective,” Handbook of Computer
Networks and Cyber Security, pp. 683–713, 2020, doi: https://doi.org/10.1007/978-
3-030-22277-2_27.

[24] M. K. Hasan, A. A. Habib, Z. Shukur, F. Ibrahim, S. Islam, and M. A. Razzaque,


“Review on cyber-physical and cyber-security system in smart grid: Standards,
protocols, constraints, and recommendations,” Journal of Network and Computer
Applications, vol. 209, p.103540, Jan. 2023, doi:
https://doi.org/10.1016/j.jnca.2022.103540.

[25] D. Upadhyay and S. Sampalli, “SCADA (Supervisory Control and Data Acquisition)
systems: Vulnerability assessment and security recommendations,” Computers &
Security, vol. 89, p. 101666, Feb. 2020, doi:
https://doi.org/10.1016/j.cose.2019.101666.

[26] P. V. Nekrasov, A. M. Zharikov, and D. A. Kozin, “Managing wireless


communication security for smart home cyber-physical systems,” Bezopasnostʹ
informacionnyh tehnologij, vol. 31, no. 1, pp. 54–62, Mar. 2024, doi:
https://doi.org/10.26583/bit.2024.1.02.

[27] Z. Huanan, X. Suping, and W. Jiannan, “Security and application of wireless


sensor network,” Procedia Computer Science, vol. 183, pp. 486–492, 2021, doi:
https://doi.org/10.1016/j.procs.2021.02.088.

[28] A. John, Ismail Fauzi Isnin, and Syed, “Current Security Threats in Applications of
Wireless Sensor Network,” International journal on engineering, science and
technology, vol. 5, no. 3, pp. 255–272, Sep. 2023, doi:
https://doi.org/10.46328/ijonest.174.

[29] M. N. U. Islam, A. Fahmin, Md. S. Hossain, and M. Atiquzzaman, “Denial-of-


Service Attacks on Wireless Sensor Network and Defense Techniques,” Wireless
Personal Communications, vol. 116, no. 3, pp. 1993–2021, Sep. 2020, doi:
https://doi.org/10.1007/s11277-020-07776-3.

[30] S. W. Nourildean, M. D. Hassib, and Y. A. Mohammed, “Internet of things based


wireless sensor network: a review,” Indonesian Journal of Electrical Engineering and
Computer Science, vol. 27, no. 1, pp. 246–261, Jul. 2022, doi:
https://doi.org/10.11591/ijeecs.v27.i1.pp246-261.

[31] S. Joshi, None Japanpreet, L. Rani, Pradeepta Kumar Sarangi, and Ved Prakash
Dubey, “Strengthening Cybersecurity: A Comparative Study of KNN and Random
Forest for Spam Detection,” Lecture notes in networks and systems, pp. 337–350,
Jan. 2024, doi: https://doi.org/10.1007/978-981-99-9811-1_27.
[32] None Ankita, Atef Zaguia, S. Rani, and Ali Kashif Bashir, “Analysis of Machine
Learning and Deep Learning in Cyber-Physical System Security,” Lecture notes in
networks and systems, pp. 355–363, Jan. 2022, doi: https://doi.org/10.1007/978-
981-19-0604-6_30.

[33] A. K. Sikder, G. Petracca, H. Aksu, T. Jaeger, and A. S. Uluagac, “A survey on


sensor-based threats and attacks to smart devices and applications,” IEEE
Communications Surveys & Tutorials, vol. 23, no. 2, pp. 1125–1159, 2021, doi:
https://doi.org/10.1109/comst.2021.3064507.

[34] D. Ghelani, T. K. Hua, and S. K. R. Koduru, “Cyber Security Threats,


Vulnerabilities, and Security Solutions Models in Banking,” Cyber Security Threats,
Vulnerabilities, and Security Solutions Models in Banking, Sep. 2022, doi:
https://doi.org/10.22541/au.166385206.63311335/v1.

[35] D. Ghelani, “Cyber Security in Smart Grids, Threats, and Possible Solutions,” Sep.
2022, doi: https://doi.org/10.22541/au.166385207.71655799/v1.

[36] B. Hammi, S. Zeadally, R. Khatoun, and J. Nebhen, “Survey on Smart Homes:


Vulnerabilities, Risks, and Countermeasures,” Computers & Security, vol. 117, p.
102677, Mar. 2022, doi: https://doi.org/10.1016/j.cose.2022.102677.

[37] K. Demestichas, N. Peppes, and T. Alexakis, “Survey on Security Threats in


Agricultural IoT and Smart Farming,” Sensors, vol. 20, no. 22, p. 6458, Nov. 2020, doi:
https://doi.org/10.3390/s20226458.

[38] M. Humayun, M. Niazi, N. Jhanjhi, M. Alshayeb, and S. Mahmood, “Cyber


Security Threats and Vulnerabilities: A Systematic Mapping Study,” Arabian Journal
for Science and Engineering, vol. 45, no. 1, Jan. 2020, doi:
https://doi.org/10.1007/s13369-019-04319-2.

[39] Z. El-Rewini, K. Sadatsharan, N. Sugunaraj, D. F. Selvaraj, S. J. Plathottam, and P.


Ranganathan, “Cybersecurity Attacks in Vehicular Sensors,” IEEE Sensors Journal, vol.
20, no. 22, pp. 13752–13767, Nov. 2020, doi:
https://doi.org/10.1109/JSEN.2020.3004275.

[40] A. Barua, M. A. Al Alamin, Md. S. Hossain, and E. Hossain, “Security and Privacy
Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive
Survey,” IEEE Open Journal of the Communications Society, vol. 3, pp. 251–281, 2022,
doi: https://doi.org/10.1109/ojcoms.2022.3149732.

You might also like