Assignment 7
docx
keyboard_arrow_up
School
Kennesaw State University *
*We aren’t endorsed by this school
Course
4833
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
2
Uploaded by MagistrateScience5019
Asg7 – CPS and Wireless Security
Total points: 100
Part 1: CPS Security [45 points]
Read the article titled “Cyber-Physical Systems: A Security Perspective” (a copy is in d2l module). Then answer the following questions. Define each of the following, provide an example and describe challenges and Security Countermeasures for each – 15 points each.
(i)
Smart Grid
Definition: is an electricity network based on digital technology that is used to
supply electricity to consumers via two-way digital communication
Example: U.S. smart grid
Challenges: integrated control devices are running OS with published bugs and vulnerabilities like buffer overflows, making them vulnerable to attacks. Devices lack authentication support, allowing unauthorized users to gain access and operate system settings and operations. Malware might be installed
on devices prior the shipment to the target location or devices might be infiltrated inside the trusted perimeter, deliberately or not, by personnel.
Countermeasures: Implementation of remote access VPN and Network Intrusion Prevention System (IPS) and Network Intrusion Detection System (IDS) technologies.
(ii)
Smart Home
Definition: a convenient home setup where appliances and devices can be automatically controlled remotely from anywhere with an internet connection using a mobile or other networked device
Example: Amazon Echo, Google Home
Challenges:
An attacker breaches, interrupts, or spoofs communications between two systems.
Countermeasures: Device Identification and Access Control, Authentication, Encryption.
(iii)
Health Care System.
Definition: is the organization of people, institutions, and resources that deliver health care services to meet the health needs of target populations.
Example: Wearable and implantable medical devices
Challenges: Vulnerable to network attacks and may be compromised at a device level. Computers that aren’t in restricted areas can easily be accessed by unauthorized users. If these open computers are connected to sensitive patient information, unauthorized staff or others in the area could have access to sensitive information.
Countermeasures: Fault recovery mechanism, better attack detection to take preventive actions, physically unclonable function use for authentication.
Feel free to use additional references but you need to cite any additional sources.
Part 2: Wireless Security [55 points]
Read the article titled “A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends” (a copy is in d2l module). Then answer the following questions. (i)
List and define the security requirements in wireless networks
. (15 points)
Maintaining confidentiality: limiting data access to intended uses, while making sure to prevent unauthorized users from getting access to sensitive information. Authenticity: this refers to differentiating authorized users from unauthorized users. Integrity: Specified to guarantee the accuracy of the trans- mitted information without
any falsification Availability: Specified to make sure that the authorized users can access wireless network resources anytime and anywhere upon request (ii)
List and describe the attacks at the PHY and MAC layers. (20 points)
PHY layers:
Eavesdropping: refers to the interception of confidential information
Jamming: refers to the interruption of legitimate transmission.
MAC layers: MAC spoofing: Falsification of MAC address
Identity theft: Stealing of a legitimate user's MAC identity MITM attack: Impersonation of a pair of communicating nodes Network injection: refers to the injection of forged network commands and packets (iii)
Provide an example of a PHY attack (10 points)
Traffic analysis: an attacker can judge the base station position
according to the changes of network traffic in wireless sensor
networks. The attacker interferes with or captures the base station,
which leads to paralysis of the entire wireless sensor networks.
(iv)
Provide an example of a MAC attack (10 points)
An attacker changes the MAC address of their station to enter a target network as an authorized user taking over a computer's identity that is authorized to function on the network
.
For examples of (ii) you may need additional references. You need to cite any additional sources if used.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help