Home > Research > Publications & Outputs > IoT Enabled Highways Maintenance

Electronic data

  • Highways Maintenance Security - IEEE Pervasive

    Rights statement: ©2018 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

    Accepted author manuscript, 2.43 MB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

IoT Enabled Highways Maintenance: Towards an Understanding of Emerging Cyber Security Threats

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published
<mark>Journal publication date</mark>07/2018
<mark>Journal</mark>IEEE Pervasive Computing
Issue number3
Volume17
Number of pages12
Pages (from-to)23-34
Publication StatusPublished
<mark>Original language</mark>English

Abstract

IoT technologies are increasingly being deployed to support the operation and maintenance of complex highways infrastructure assets. However, the use of interconnected cyber-physical systems in such critical infrastructure raises important privacy, safety and security issues. While security issues in IoT transport systems and autonomous vehicles are well studied, there is minimal research relating to cyber security in the field of highways maintenance. In this paper, we introduce the problem domain, evidence the lack of existing research and provide example threats to IoT highways maintenance systems based on a real-world case study.

Bibliographic note

©2018 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.