Abstract
In modern industrial enterprises, safety always comes first. Regardless of whether it is safety against weather conditions such as fires, floods, or it is securing the building from the intrusion of unwanted person. With these sensors, these services can also provide IoT smart security devices. In the connected world of Industry 4.0, there are way too many opportunities to take control of such devices, and so with a help of a cyber attack, computer attackers would be able, in two ways, to make the device impossible to operate. The first way is to manipulate the device, disable alarm sensors, and steal the data. The second way is to misuse the device for attacking another in a reflected way. The article illustrates the possibility of how the safety sensors can be disabled, and how this safety device can be used to attack another IoT device - the thermostat. Finally, the case study demonstrates inability of IoT-based automation and control device to send alarm notifications when a threat is detected by its sensors during the DDoS attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abomhara, M., Køien, G.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mobil. 4, 65–88 (2015)
Ali, B., Awad, A.I.: Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 18(3), 817 (2018)
Zhang, C., Green, R.: Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network. In: Proceedings of the 18th Symposium on Communications & Networking, CNS ‘15, pp. 8–15 (2015)
Arukonda, S., Sinha, S.: The innocent perpetrators: reflectors and reflection attacks. ACSIJ Adv. Comput. Sci. Int. J. 4, 94–98 (2015)
O’Neill, M.: Insecurity by design: today’s IoT device security problem. In: Secure Digital Systems at the Center for Secure Information Technologies, vol. 2, pp. 48–49. Engineering (2016)
Vishwakarma, R., Jain, A.K.: A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun. Syst. 73, 3–25 (2020)
Dudáš, A., Voštinár, P., Škrinárová, J., Siláči, J.: Improved process of running tasks in the high performance computing system. In: 16th International Conference on Emerging eLearning Technologies and Applications (ICETA), pp. 133–140. IEEE (November 2018)
Wang, X., Qi, Y., Zhang, Ch., et al.: SecretSafe: a lightweight approach against Heap Buffer Over-Read Attack. In: IEEE 41st Annual Computer Software and Applications Conference, pp. 628–636 (2017)
Kilic, F., Kittel, T., Eckert, C.: Blind format string attacks. In: Tian, J., Jing, J., Srivatsa, M. (eds.) SecureComm 2014. LNICST, vol. 153, pp. 301–314. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-23802-9_23
Ahmed, M.E., Ullah, S., Kim, H.: Statistical application fingerprinting for DDoS attack mitigation. IEEE Trans. Inf. Forensics Secur. 14, 1471–1484 (2019)
Bijalwan, A., Wazid, M., et al.: Forensics of Random-UDP Flooding Attacks. J. Netw. 10, 287–293 (2015)
Bogdanoski, M., Suminoski, T., Risteski, A.: Analysis of the SYN flood DoS attack. Int. J. Comput. Netw. Inf. Secur. 5(8), 1–11 (2013)
Acknowledgements
The work was supported by the grant VEGA1/0272/18 Holistic approach of knowledge discovery from production data in compliance with Industry 4.0 concept.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Horák, T., Šimon, M., Huraj, L., Budjač, R. (2020). Vulnerability of Smart IoT-Based Automation and Control Devices to Cyber Attacks. In: Silhavy, R. (eds) Applied Informatics and Cybernetics in Intelligent Systems. CSOC 2020. Advances in Intelligent Systems and Computing, vol 1226. Springer, Cham. https://doi.org/10.1007/978-3-030-51974-2_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-51974-2_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-51973-5
Online ISBN: 978-3-030-51974-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)