CYBER SECURITY OF WIRELESS SMART SYSTEMS: CHANNELS OF INTRUSIONS AND RADIO FREQUENCY VULNERABILITIES
Abstract
Keywords
Full Text:
PDF (Українська)References
802.XX And The IoE. Available at: https://semiengineering.com/802-xx-for-the-ioe. (accessed 3.07.2020).
Humayed A., Lin, J., Li, F. and Luo, B. Cyber-Physical Systems Security – A Survey. IEEE Internet of Things Journal, 2017, vol. 4, no. 6, pp. 1802-1831. DOI: 10.1109/JIOT.2017.2703172.
Abdulmunem Al-Sudani Mustafa Qahtan, Al-Khafaji Ahmed Waleed, Kharchenko, V. S. The Method Of IMECA-Based Security Assessment: Case Study For Building Automation System. Systemy obrobky informatsiyi – Systems of information processing, 2016, vol. 1 (138), pp. 138-144.
Kharchenko, V., Torianyk, V. Cybersecurity of the Internet of Drones: Vulnerabilities analysis and IMECA based assessment. Conference Proceedings of 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2018, pp. 372-377. DOI: 10.1109/DESSERT.2018.8409160.
New Type Of GPS Spoofing Attack In China Creates "Crop Circles" Of False Location Data. Available at: https://www.thedrive.com/the-war-zone/31092/new-type-of-gps-spoofing-attack-in-china-creates-crop-circles-of-false-location-data. (accessed 3.07.2020).
IKAO - Strategija v oblasti aviacionnoj bezopasnosti, oktjabr' 2019 [ICAO - Aviation Security Strategy, October 2019]. Available at: https://www.icao.int/cybersecurity/Pages/Cybersecurity-Strategy.aspx. (accessed 13.06.2020).
EUROCONTROL - Cyber Security in aviation, October 2019. Available at: https://www.eurocontrol.int /sites/default/files/2020-01/eurocontrol-think-paper-3-cybersecurity-aviation.pdf. (accessed 13.06.2020).
Kacem, T., Wijesekera, D., Costa, P., Barreto, A. Security Requirements Analysis of ADS-B Networks. Available at: http://ceur-ws.org/Vol-1304/STIDS2014_T06_KacemEtAl.pdf. (accessed 13.06.2020).
Sylla, I. T. The ISM Revolution: The Next Big Thing. Available at: https://www.eetimes.com/the-ism-revolution-the-next-big-thing. (accessed 13.06.2020).
ISM diapason. Available at: https://ru.qwe.wiki/wiki/ISM_band. (accessed 3.07.2020).
Rishennya NKRZI #18 vid 12.01.2012 Pro sxvalennya uzagal`neny`x umov zastosuvannya radioelektronny`x zasobiv ta vy`prominyuval`ny`x pry`stroyiv. [Decision of the NCRCI №18 of 12.01.2012 On approval of generalized conditions for the use of radio-electronic means and radiating devices]. Available at: https://nkrzi.gov.ua/index.php?r=site/index&pg=38&id=805&language=uk. (accessed 3.07.2020).
Short range devices. Available at: https://www.etsi.org/technologies/short-range-devices?jjj=1598607192016. (accessed 3.07.2020).
Bluetooth. Available at: https://www.sciencedirect.com/topics/engineering/bluetooth. (accessed 3.07.2020)
Z-Wave. Available at: https://uk.wikipedia.org/wiki/Z-wave. (accessed 3.07.2020).
Near Field Communication Technology Standards. http://nearfieldcommunication.org/technology.html. (accessed 3.07.2020).
Torianyk, V. V. Urazlyvist' suchasnykh tekhnolohiy radiochastotnoyi identyfikatsiyi [Vulnerability of modern technologies of radio frequency identification]. Zastosuvannya informatsiynykh tekhnolohiy u pravookhoronniy diyal'nosti. Materialy nauk.-prakt. seminaru. Kharkiv, KhNUVS Publ., 2015, pp. 66-68. (In Ukrainian).
LPD433. Available at: https://uk.wikipedia.org/wiki/LPD433. (accessed 3.07.2020).
PRM446. Available at: https://uk.wikipedia.org/wiki/PRM446. (accessed 3.07.2020).
L-band. Available at: https://en.wikipedia.org/wiki/L-band. (accessed 3.07.2020).
Global Positioning System Standard Positioning Service Performance Standard. Available at: https://www.gps.gov/technical/ps/2020-SPS-performance-standard.pdf. (accessed 5.07.2020).
Steigenberger, P., Thoelert, S., Montenbruck, O. GPS and GLONASS Satellite Transmit Power: Update for IGS repro3. Available at: https://elib.dlr.de/129734/1/TX_Power_20191021.pdf. (accessed 5.07.2020).
Automatic Dependent Surveillance Broadcast (ADS-B). Available at: https://www.skybrary.aero/index.php/Automatic_Dependent_Surveillance_Broadcast_(ADS-B). (accessed 5.07.2020).
Postanova KMU vid 19 chervnya 2019 r. # 518 «Pro zatverdzhennya Zahal'nykh vymoh do kiberzakhystu ob"yektiv krytychnoyi infrastruktury» [Resolution of the Cabinet of Ministers of Ukraine of June 19, 2019 № 518 "On approval of the General requirements for cyber-protection of critical infrastructure"]. Available at: https://zakon.rada.gov.ua/laws/show/518-2019-%D0%BF#top. (accessed 7.07.2020).
IoT and Smart Infrastructures. Available at: https://www.enisa.europa.eu/topics/iot-and-smart-infrastructures/smart-infrastructure?tab=details. (accessed 8.07.2020).
Kiberbezopasnost' 2019-2020. Trendy i prognozy [Cybersecurity 2019-2020. Trends and forecasts]. Available at: https://www.ptsecurity.com/ru-ru/research/analytics/cybersecurity-2019-2020. (accessed 8.07.2020).
Alguliev, R., Imamerdiev, Ja., Suhostat, L. Obespechenie informacionnoj bezopasnosti kiberfizicheskih system [Ensuring of information security of cyber-physical systems]. Available at: https://www.researchgate.net/publication/317634995. (accessed 8.07.2020). DOI: 10.25045/NCSoftEng.2017.07.
Cyber-Physical Attacks are Finally for Real. Available at: https://symantec-enterprise-blogs.security.com/blogs/feature-stories/cyber-physical-attacks-are-finally-real. (accessed 8.07.2020).
Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025. Available at: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide. (accessed 8.07.2020).
Cyberattacks On IOT Devices Surge 300% In 2019. Available at: https://www.forbes.com/sites/zakdoffman/2019/09/14/dangerous-cyberattacks-on-iot-devices-up-300-in-2019-now-rampant-report-claims/#56aff7955892. (accessed 8.07.2020).
Warning: Your IoT devices are at risk of cyber-attack. Available at: https://wire19.com/warning-iot-devices-at-risk. (accessed 8.07.2020).
The 2020 Spotlight Report on Healthcare. Available at: https://www.vectra.ai/resources/2020-spotlight-report-on-healthcare. (accessed 8.07.2020).
Strategic Principles for Securing the IoT. Available at: https://us-cert.cisa.gov/ncas/current-activity/2016/11/15/Strategic-Principles-Securing-IoT. (accessed 8.07.2020).
7 Connected Car Trends Fueling the Future. Available at: https://medium.com/iotforall/7-connected-car-trends-fueling-the-future-946b05325531. (accessed 10.07.2020).
Can your flight be hacked? Available at: https://www.ft.com/content/2e416eca-4e3d-11e8-ac41-759eee1efb74. (accessed 10.07.2020).
Strohmeier, M., Lenders, V., Martinovic, I. On the Security of the Automatic Dependent Surveillance-Broadcast Protocol. Available at: https://www.cs.ox.ac.uk/files/7239/1307.3664v2.pdf. (accessed 10.07.2020).
Kim, Y., Jo, Ju-Y., Lee, S. ADS-B vulnerabilities and a security solution with a timestamp. Available at: https://www.researchgate.net/publication/321736587. (accessed 10.07.2020).
Zegzhda, D. P. Issledovanie kiberbezopasnosti bortovogo oborudovanija vozdushnogo sudna [Study of the cybersecurity of aircraft on-board equipment]. Available at: http://www.modern-avionics.ru/Files/14-SPbPU-Zegzhda-29.08.2019.pdf. (accessed 10.07.2020).
Zybin, E. Ju. Koncepcija obespechenija informacionnoj bezopasnosti bortovogo oborudovanija vozdushnogo sudna [The concept of ensuring of information security of aircraft onboard equipment]. Available at: https://www.gosniias.ru/pages/d/akb-2018-1-zybin.pdf. (accessed 10.07.2020).
Johnson, P. New research LAB leads to unique radio receiver. E-Systems Team, 1985, vol. 5, no. 4, pp. 6-8.
Picod, J.-M., Lebrun, A., Demay, J.-C. Bringing Software Defined Radio to the Penetration Testing Community. Available at: http://lib.21h.io/library/N6I45ECV. (accessed 10.07.2020).
Kharchenko, V., Kor, A.-L., Rucinski, A. (editors). Dependable IoT for Human and Industry: Modeling, Architecting, Implementation. River Publishers, Series in Information Science and Technology, Denmark. 2018. 450 p.
DOI: https://doi.org/10.32620/reks.2020.4.07
Refbacks
- There are currently no refbacks.