The security of IoT systems in railway transport
DOI:
https://doi.org/10.32703/2617-9059-2024-43-7Keywords:
The Internet of Things (IoT), cybersecurity, cyberattacks, data protection, security of IoT systems, threats, vulnerabilities, unauthorised access, railway transportAbstract
The widespread adoption of Internet of Things (IoT) devices in the railway industry is creating new cybersecurity challenges. These devices, which collect and transmit data on train movements, infrastructure and passengers, can be vulnerable to cyberattacks, which can lead to disruption of operations, security threats or compromise of sensitive data. A wide range of potential threats have been described, such as unauthorised access, data misuse and denial of service (DoS) attacks. These threats can have serious consequences, such as train accidents, data theft, or disruption of supply chains. The article is devoted to the study of the cybersecurity aspects of IoT systems in railway transport and the identification of the necessary measures to ensure the safety and reliability of these systems. Potential threats to IoT on the railway, including vulnerabilities of network devices and insufficient protection of network traffic, are considered. Simple and effective cybersecurity measures are proposed, including authentication and authorisation of IoT devices, network connection protection, and monitoring of potential threats. Threat modeling using the Microsoft Threat Modeling Tool allowed us to identify the main security issues and propose solutions. The conclusions of the article emphasise the importance of investing additional resources in ensuring the cybersecurity of IoT systems in railway transport and recommend active cooperation with experts in this field for the successful implementation of digital transformation in the railway industry.
References
Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A survey on the security of IoT frameworks /Journal of Information Security and Applications, 38, 8-27. https://doi.org/10.1016/j.jisa.2017.11.002.
Opirskyy, I., Holovchak, R., Moisiichuk, I., Balianda T., & Haraniuk, S. (2021). Problemy ta zahrozy bezpetsi IoT prystroiv/ Elektronne fakhove naukove vydannia «Kiberbezpeka: osvita, nauka, tekhnika», 3(11), 31–42. https://doi.org/10.28925/2663-4023.2021.11.3142. [in Ukrainian].
Dongre, N., Atique, M., Shaik, Z. A., & Raut, A. D. (2022, January). A survey on security issues and secure frameworks in internet of things (iot). In 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 173-181). IEEE. https://doi.org/10.1109/ICSSIT53264.2022.9716413.
Jaiswal, S., & Gupta, D. (2017). Security requirements for internet of things (IoT). In Proceedings of International Conference on Communication and Networks: ComNet 2016 (pp. 419-427). Springer Singapore.. https://doi.org/10.1007/978-981-10-2750-5_44.
Shancang Li, & Li Da Xu (2020). Securing the Internet of Things. Syngress.
Serajuddin, M., Hasan, Z., Khan, A., & Akhtar, A. (2023). Impact of IoT on Security and Data Protection. Journal of Informatics Education and Research, 3(2). https://doi.org/10.52783/jier.v3i2.367.
Singh, P., Elmi, Z., Meriga, V. K., Pasha, J., & Dulebenets, M. A. (2022). Internet of Things for sustainable railway transportation: Past, present, and future. Cleaner Logistics and Supply Chain, 4, 100065.. https://doi.org/10.1016/j.clscn.2022.100065.
Stellios, I., Kotzanikolaou, P., Psarakis, M., & Alcaraz, C. (2021). Risk assessment for IoT-enabled cyber-physical systems. Advances in Core Computer Science-Based Technologies: Papers in Honor of Professor Nikolaos Alexandris, 157-173. https://doi.org/10.1007/978-3-030-41196-1_8
Miloslavskaya, N., & Tolstoy, A. (2019). Internet of Things: information security challenges and solutions. Cluster Computing, 22, 103-119. https://doi.org/10.1007/s10586-018-2823-6.
Shandilya, S.K., Chun, S.A., & Shandilya, S. (Eds.) (2018) Internet of Things Security: Fundamentals, Techniques, and Applications (1st ed.). River Publishers, 162. https://doi.org/10.1201/9781003338642.
Anderson, R. (2020). Security engineering: a guide to building dependable distributed systems. John Wiley & Sons.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013) Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions / Future Generation Computer Systems, 29, 1645-1660. http://dx.doi.org/10.1016/j.future.2013.01.010.
Kour, R. (2020). Cybersecurity in railway: a framework for improvement of digital asset security (Doctoral dissertation, Luleå University of Technology). URL: https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-78488.
Voronko I.O. (2020) Osoblyvosti nadiinosti ta informatsiinoi bezpeky system monitorynhu ta diahnostyky. Informatsiino-keruiuchi systemy na zaliznychnomu transporti: naukovo-tekhnichnyi zhurnal. Kharkiv: UkrDUZT, 3, 49-50. [in Ukrainian].
Voronko I.O.(2021) Dyferentsialno-ihrova model zakhystu informatsii dlia kompiuternykh system transportnoi infrastruktury. «Transportni systemy i tekhnolohii», 38, 201-213. https://doi.org/10.32703/2617-9040-2021-38-198-19 [in Ukrainian].
Yash Madwanna. (2018) IoT based Railway system using ICN: Chapter 1 Problem Definition. College of Engineering and Technology. URL: https://www.academia.edu/35158284/IOT_based_Railway_system_using_ ICN_CHAPTER_1_Problem_Definition
Gupta, B. B., & Quamara, M. (2020). Internet of Things Security: Principles, Applications, Attacks, and Countermeasures. CRC Press. https://doi.org/10.1201/9780429353529.
Microsoft Threat Modeling Tool (2022). URL: https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright: This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.