Skip to main content

Vulnerability of Smart IoT-Based Automation and Control Devices to Cyber Attacks

  • Conference paper
  • First Online:
Applied Informatics and Cybernetics in Intelligent Systems (CSOC 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1226))

Included in the following conference series:

Abstract

In modern industrial enterprises, safety always comes first. Regardless of whether it is safety against weather conditions such as fires, floods, or it is securing the building from the intrusion of unwanted person. With these sensors, these services can also provide IoT smart security devices. In the connected world of Industry 4.0, there are way too many opportunities to take control of such devices, and so with a help of a cyber attack, computer attackers would be able, in two ways, to make the device impossible to operate. The first way is to manipulate the device, disable alarm sensors, and steal the data. The second way is to misuse the device for attacking another in a reflected way. The article illustrates the possibility of how the safety sensors can be disabled, and how this safety device can be used to attack another IoT device - the thermostat. Finally, the case study demonstrates inability of IoT-based automation and control device to send alarm notifications when a threat is detected by its sensors during the DDoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abomhara, M., Køien, G.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mobil. 4, 65–88 (2015)

    Article  Google Scholar 

  2. Ali, B., Awad, A.I.: Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 18(3), 817 (2018)

    Article  Google Scholar 

  3. Zhang, C., Green, R.: Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network. In: Proceedings of the 18th Symposium on Communications & Networking, CNS ‘15, pp. 8–15 (2015)

    Google Scholar 

  4. Arukonda, S., Sinha, S.: The innocent perpetrators: reflectors and reflection attacks. ACSIJ Adv. Comput. Sci. Int. J. 4, 94–98 (2015)

    Google Scholar 

  5. O’Neill, M.: Insecurity by design: today’s IoT device security problem. In: Secure Digital Systems at the Center for Secure Information Technologies, vol. 2, pp. 48–49. Engineering (2016)

    Google Scholar 

  6. Vishwakarma, R., Jain, A.K.: A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun. Syst. 73, 3–25 (2020)

    Article  Google Scholar 

  7. Dudáš, A., Voštinár, P., Škrinárová, J., Siláči, J.: Improved process of running tasks in the high performance computing system. In: 16th International Conference on Emerging eLearning Technologies and Applications (ICETA), pp. 133–140. IEEE (November 2018)

    Google Scholar 

  8. Wang, X., Qi, Y., Zhang, Ch., et al.: SecretSafe: a lightweight approach against Heap Buffer Over-Read Attack. In: IEEE 41st Annual Computer Software and Applications Conference, pp. 628–636 (2017)

    Google Scholar 

  9. Kilic, F., Kittel, T., Eckert, C.: Blind format string attacks. In: Tian, J., Jing, J., Srivatsa, M. (eds.) SecureComm 2014. LNICST, vol. 153, pp. 301–314. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-23802-9_23

    Chapter  Google Scholar 

  10. Ahmed, M.E., Ullah, S., Kim, H.: Statistical application fingerprinting for DDoS attack mitigation. IEEE Trans. Inf. Forensics Secur. 14, 1471–1484 (2019)

    Article  Google Scholar 

  11. Bijalwan, A., Wazid, M., et al.: Forensics of Random-UDP Flooding Attacks. J. Netw. 10, 287–293 (2015)

    Google Scholar 

  12. Bogdanoski, M., Suminoski, T., Risteski, A.: Analysis of the SYN flood DoS attack. Int. J. Comput. Netw. Inf. Secur. 5(8), 1–11 (2013)

    Google Scholar 

Download references

Acknowledgements

The work was supported by the grant VEGA1/0272/18 Holistic approach of knowledge discovery from production data in compliance with Industry 4.0 concept.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ladislav Huraj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Horák, T., Šimon, M., Huraj, L., Budjač, R. (2020). Vulnerability of Smart IoT-Based Automation and Control Devices to Cyber Attacks. In: Silhavy, R. (eds) Applied Informatics and Cybernetics in Intelligent Systems. CSOC 2020. Advances in Intelligent Systems and Computing, vol 1226. Springer, Cham. https://doi.org/10.1007/978-3-030-51974-2_27

Download citation

Publish with us

Policies and ethics