Contactless Monitoring of Critical Infrastructure

You are here

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

Contactless Monitoring of Critical Infrastructure

By: 
Athina Petropulu, Konstantinos I. Diamantaras, Zhu Han, Dusit Niyato, Saman Zonouz
Industrial control systems (ICSs) manage and monitor critical civil or military infrastructure, such as water treatment facilities, power plants, electricity grids, transportation systems, oil and gas refineries, and health care. Because they are so important, ICSs are becoming attractive targets for malicious attacks that could lead to catastrophic failures with substantive impacts. Among such attacks was the BlackEnergy worm [1], which was used in 2015 against the Ukrainian electricity grid, resulting in widespread power outages, and the Stuxnet malware [2], which was used in 2010 and physically damaged 20% of the Iranian centrifuges controlled by programmable logic controllers (PLCs). New security concerns arise as the public adopts Internet of Things (IoT) devices, resulting in household electronics becoming computers that can be targets for malware. Over the last few years, Internet-connected appliances, home routers, webcams, and printers were used to launch distributed denial-of-service (DDoS) attacks, often without their owners' knowledge. The largest DDoS attack to target IoT devices was in 2016, when a botnet malware family named Mirai was launched [3]. IoT devices are attractive targets for malware because they lack cryptographic encryption and strong default authentication.

SPS Social Media

IEEE SPS Educational Resources

IEEE SPS Resource Center

IEEE SPS YouTube Channel