Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure

Amir Djenna, Saad Harous, Djamel Eddine Saidouni

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

As a new area of technology, the Internet of Things (IoT) is a flagship and promising paradigm for innovating society. However, IoT-based critical infrastructures are an appealing target for cybercriminals. Such distinctive infrastructures are increasingly sensitive to cyber vulnerabilities and subject to many cyberattacks. Thus, protecting these infrastructures is a significant issue for organizations and nations. In this context, raising the cybersecurity posture of critical cyber infrastructures is an extremely urgent international issue. In addition, with the rapid development of adversarial techniques, current cyber threats have become more sophisticated, complicated, advanced and persistent. Thus, given these factors, prior to implementing efficient and resilient cybersecurity countermeasures, identification and in-depth mapping of cyber threats is an important step that is generally overlooked. Therefore, to solve cybersecurity challenges, this study presents a critical analysis of the most recent cybersecurity issues for IoT-based critical infrastructures. We then discuss potential cyber threats and cyber vulnerabilities and the main exploitation strategies adopted by cybercriminals. Further, we provide a taxonomy of cyberattacks that may affect critical cyber infras-tructures. Finally, we present security requirements and some realistic recommendations to enhance cybersecurity solutions.

Original languageEnglish
Article number4580
JournalApplied Sciences (Switzerland)
Volume11
Issue number10
DOIs
Publication statusPublished - May 2 2021

Keywords

  • Critical cyber infrastructure
  • Cyber attacks
  • Cyber security
  • Internet of Things (IoT)

ASJC Scopus subject areas

  • Materials Science(all)
  • Instrumentation
  • Engineering(all)
  • Process Chemistry and Technology
  • Computer Science Applications
  • Fluid Flow and Transfer Processes

Fingerprint

Dive into the research topics of 'Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure'. Together they form a unique fingerprint.

Cite this