scispace - formally typeset
Open AccessJournal ArticleDOI

A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports

Reads0
Chats0
TLDR
A holistic review of existing smart airport applications and services enabled by IoT sensors and systems is presented, and several types of cyber defence tools including AI and data mining techniques are investigated, and their strengths and weaknesses are analysed in the context of smart airports.
Abstract
Advances in the Internet of Things (IoT) and aviation sector have resulted in the emergence of smart airports. Services and systems powered by the IoT enable smart airports to have enhanced robustness, efficiency and control, governed by real-time monitoring and analytics. Smart sensors control the environmental conditions inside the airport, automate passenger-related actions and support airport security. However, these augmentations and automation introduce security threats to network systems of smart airports. Cyber-attackers demonstrated the susceptibility of IoT systems and networks to Advanced Persistent Threats (APT), due to hardware constraints, software flaws or IoT misconfigurations. With the increasing complexity of attacks, it is imperative to safeguard IoT networks of smart airports and ensure reliability of services, as cyber-attacks can have tremendous consequences such as disrupting networks, cancelling travel, or stealing sensitive information. There is a need to adopt and develop new Artificial Intelligence (AI)-enabled cyber-defence techniques for smart airports, which will address the challenges brought about by the incorporation of IoT systems to the airport business processes, and the constantly evolving nature of contemporary cyber-attacks. In this study, we present a holistic review of existing smart airport applications and services enabled by IoT sensors and systems. Additionally, we investigate several types of cyber defence tools including AI and data mining techniques, and analyse their strengths and weaknesses in the context of smart airports. Furthermore, we provide a classification of smart airport sub-systems based on their purpose and criticality and address cyber threats that can affect the security of smart airport’s networks.

read more

Content maybe subject to copyright    Report

Citations
More filters

Computer And Information Security Handbook

Diana Bohm
TL;DR: The computer and information security handbook is universally compatible with any devices to read, and will help you to get the most less latency time to download any of the authors' books like this one.
Journal ArticleDOI

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis

TL;DR: In this article, the authors present a comprehensive study with an experimental analysis of federated deep learning approaches for cyber security in the Internet of Things (IoT) applications, and provide important information on federated learning-based security and privacy systems.
Journal ArticleDOI

Application of IoT in Healthcare: Keys to Implementation of the Sustainable Development Goals.

TL;DR: In this article, a literature review and an analysis of the impact of the sustainable development goals on the applications of the Internet of Things and smart systems is carried out according to a mixed approach.
Journal ArticleDOI

An Efficient Framework for Detection and Classification of IoT Botnet Traffic

TL;DR: The experimental testbed has been devised for the generation of a real-time dataset using the IoT botnet traffic in which each of the bots consists of several possible attacks.
References
More filters
Book

Reinforcement Learning: An Introduction

TL;DR: This book provides a clear and simple account of the key ideas and algorithms of reinforcement learning, which ranges from the history of the field's intellectual foundations to the most recent developments and applications.
BookDOI

Statistical Learning with Sparsity: The Lasso and Generalizations

TL;DR: Statistical Learning with Sparsity: The Lasso and Generalizations presents methods that exploit sparsity to help recover the underlying signal in a set of data and extract useful and reproducible patterns from big datasets.
Journal ArticleDOI

IoT security: Review, blockchain solutions, and open challenges

TL;DR: It is discussed, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems.
Journal ArticleDOI

Understanding the Limits of LoRaWAN

TL;DR: An impartial and fair overview of the capabilities and limitations of LoRaWAN is provided, which are discussed in the context of use cases, and list open research and development questions.
Journal ArticleDOI

A comparative study of LPWAN technologies for large-scale IoT deployment

TL;DR: It is shown that Sigfox and LoRa are advantageous in terms of battery lifetime, capacity, and cost, and NB-IoT offers benefits interms of latency and quality of service.
Related Papers (5)