Information Security and Privacy in Railway Transportation: a systematic Review
References 1. Guerrero-Ibáñez, J.; Zeadally, S.; Contreras-Castillo, J. Sensor Technologies for Intelligent Transportation Systems. Sensors 2018
Download 1.44 Mb. Pdf ko'rish
|
sensors-22-07698-v3
References
1. Guerrero-Ibáñez, J.; Zeadally, S.; Contreras-Castillo, J. Sensor Technologies for Intelligent Transportation Systems. Sensors 2018, 18, 1212. [ CrossRef ] 2. Butler, L.; Yigitcanlar, T.; Paz, A. Barriers and risks of Mobility-as-a-Service (MaaS) adoption in cities: A systematic review of the literature. Cities 2021, 109, 103036. [ CrossRef ] 3. Xue, M.; Yuan, C.; Wu, H.; Zhang, Y.; Liu, W. Machine learning security: Threats, countermeasures, and evaluations. IEEE Access 2020 , 8, 74720–74742. [ CrossRef ] 4. Solanas, A.; Batista, E.; Casino, F.; Papageorgiou, A.; Patsakis, C. Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach. In Security of Ubiquitous Computing Systems; Springer: Berlin, Germany, 2021; pp. 201–213. Sensors 2022, 22, 7698 23 of 25 5. Ometov, A.; Molua, O.L.; Komarov, M.; Nurmi, J. A Survey of Security in Cloud, Edge, and Fog Computing. Sensors 2022, 22, 927. [ CrossRef ] 6. Batista, E.; Moncusi, M.A.; López-Aguilar, P.; Martínez-Ballesté, A.; Solanas, A. Sensors for Context-Aware Smart Healthcare: A Security Perspective. Sensors 2021, 21, 6886. [ CrossRef ] 7. Sollins, K.R. IoT Big Data Security and Privacy vs. Innovation. IEEE Internet Things J. 2019, 6, 1628–1635. [ CrossRef ] 8. Vom Brocke, J.; Simons, A.; Niehaves, B.; Reimer, K.; Plattfaut, R.; Cleven, A. Reconstructing the Giant: On the Importance of Rigour in Documenting the Literature Search Process. In Proceedings of the 17th European Conference on Information Systems (ECIS); AISeL: Verona, Italy, 2009; pp. 2206–2217. 9. Cooper, H.M. Organizing Knowledge Syntheses: A Taxonomy of Literature Reviews. Knowl. Soc. 1988, 1, 104–126. [ CrossRef ] 10. Cherdantseva, Y.; Hilton, J. Information Security and Information Assurance: Discussion about the Meaning, Scope, and Goals. In Standards and Standardization: Concepts, Methodologies, Tools, and Applications; IGI Global: Hershey, PA, USA, 2015; pp. 1204–1235. 11. International Organization for Standardization. ISO/IEC 27000:2018(E): Information Technology—Security Techniques—Information Security Management Systems—Overview and Vocabulary; Technical Report; International Organization for Standardization: Geneva, Switzerland, 2018. 12. Jajodia, S.; Samarati, P.; Yung, M. Encyclopedia of Cryptography, Security and Privacy; Springer: Berlin, Germany, 2019. 13. Ai, B.; Guan, K.; Rupp, M.; Kurner, T.; Cheng, X.; Yin, X.F.; Wang, Q.; Ma, G.Y.; Li, Y.; Xiong, L.; et al. Future railway services-oriented mobile communications network. IEEE Commun. Mag. 2015, 53, 78–85. [ CrossRef ] 14. Alawad, H.; Kaewunruen, S. Wireless Sensor Networks: Toward Smarter Railway Stations. Infrastructures 2018, 3, 24. [ CrossRef ] 15. Bellini, E.; Marrone, S.; Marulli, F. Cyber Resilience Meta-Modelling: The Railway Communication Case Study. Electronics 2021, 10, 583. [ CrossRef ] 16. Cabalquinto, E.; Hutchins, B. “It should allow me to opt in or opt out”: Investigating smartphone use and the contending attitudes of commuters towards geolocation data collection. Telemat. Inform. 2020, 51, 101403. [ CrossRef ] 17. Chernov, A.V.; Butakova, M.A.; Karpenko, E.V. Security incident detection technique for multilevel intelligent control systems on railway transport in Russia. In Proceedings of the 2015 23rd Telecommunications Forum Telfor (TELFOR), Belgrade, Serbia, 24–26 November 2015; IEEE: Belgrade, Serbia, 2015; pp. 1–4. 18. Daly, A.; Hess, S.; Patruni, B.; Potoglou, D.; Rohr, C. Using ordered attitudinal indicators in a latent variable choice model: A study of the impact of security on rail travel behaviour. Transportation 2012, 39, 267–297. [ CrossRef ] 19. Dong, P.; Zheng, T.; Du, X.; Zhang, H.; Guizani, M. SVCC-HSR: Providing Secure Vehicular Cloud Computing for Intelligent High-Speed Rail. IEEE Netw. 2018, 32, 64–71. [ CrossRef ] 20. Duan, Q.; Quynh, N.V.; Abdullah, H.M.; Almalaq, A.; Duc Do, T.; Abdelkader, S.M.; Mohamed, M.A. Optimal Scheduling and Management of a Smart City Within the Safe Framework. IEEE Access 2020, 8, 161847–161861. [ CrossRef ] 21. Falahati, A.; Shafiee, E. Improve Safety and Security of Intelligent Railway Transportation System Based on Balise Using Machine Learning Algorithm and Fuzzy System. Int. J. Intell. Transp. Syst. Res. 2022, 20, 117–131. [ CrossRef ] 22. Farooq, J.; Soler, J. Radio Communication for Communications-Based Train Control (CBTC): A Tutorial and Survey. IEEE Commun. Surv. Tutor. 2017, 19, 1377–1402. [ CrossRef ] 23. Figueroa-Lorenzo, S.; Goya, J.; Añorga, J.; Adin, I.n.; Mendizabal, J.; Arrizabalaga, S. Alarm Collector in Smart Train Based on Ethereum Blockchain Events-Log. IEEE Internet Things J. 2021, 8, 13306–13315. [ CrossRef ] 24. Fraga-Lamas, P.; Fernández-Caramés, T.M.; Castedo, L. Towards the Internet of Smart Trains: A Review on Industrial IoT- Connected Railways. Sensors 2017, 17, 1457. [ CrossRef ] 25. Hatzivasilis, G.; Fysarakis, K.; Ioannidis, S.; Hatzakis, I.; Vardakis, G.; Papadakis, N.; Spanoudakis, G. SPD-Safe: Secure Administration of Railway Intelligent Transportation Systems. Electronics 2021, 10, 92. [ CrossRef ] 26. Hodge, V.J.; O’Keefe, S.; Weeks, M.; Moulds, A. Wireless Sensor Networks for Condition Monitoring in the Railway Industry: A Survey. IEEE Trans. Intell. Transp. Syst. 2015, 16, 1088–1106. [ CrossRef ] 27. Jang, H.S.; Lim, H.; Jeon, J.Y. Control of interior surface materials for speech privacy in high-speed train cabins. Indoor Air 2017, 27, 670–679. [ CrossRef ] 28. Kim, S.; Won, Y.; Park, I.H.; Eun, Y.; Park, K.J. Cyber-Physical Vulnerability Analysis of Communication-Based Train Control. IEEE Internet Things J. 2019, 6, 6353–6362. [ CrossRef ] 29. Kour, R.; Aljumaili, M.; Karim, R.; Tretten, P. eMaintenance in railways: Issues and challenges in cybersecurity. Proc. Inst. Mech. Eng. Part F J. Rail Rapid Transit 2019, 233, 1012–1022. [ CrossRef ] 30. Kour, R.; Karim, R. Cybersecurity workforce in railway: Its maturity and awareness. J. Qual. Maint. Eng. 2021, 27, 453–464. [ CrossRef ] 31. Lazarescu, M.T.; Poolad, P. Asynchronous Resilient Wireless Sensor Network for Train Integrity Monitoring. IEEE Internet Things J. 2021, 8, 3939–3954. [ CrossRef ] 32. Lopez, I.; Aguado, M. Cyber security analysis of the European train control system. IEEE Commun. Mag. 2015, 53, 110–116. [ CrossRef ] 33. Ma, Z.; Chen, X.; Xiao, M.; Karagiannidis, G.K.; Fan, P. Interference Control for Railway Wireless Communication Systems: Techniques, Challenges, and Trends. IEEE Veh. Technol. Mag. 2020, 15, 51–58. [ CrossRef ] 34. Mcmahon, P.; Zhang, T.; Dwight, R. Requirements for Big Data Adoption for Railway Asset Management. IEEE Access 2020, 8, 15543–15564. [ CrossRef ] Sensors 2022, 22, 7698 24 of 25 35. Moreno, J.; Riera, J.M.; Haro, L.d.; Rodriguez, C. A survey on future railway radio communications services: Challenges and opportunities. IEEE Commun. Mag. 2015, 53, 62–68. [ CrossRef ] 36. Mu, Y.; Rezaeibagha, F.; Huang, K. Policy-Driven Blockchain and Its Applications for Transport Systems. IEEE Trans. Serv. Comput. 2020, 13, 230–240. [ CrossRef ] 37. Patil, S.; Patruni, B.; Potoglou, D.; Robinson, N. Public preference for data privacy—A pan-European study on metro/train surveillance. Transp. Res. Part A Policy Pract. 2016, 92, 145–161. [ CrossRef ] 38. Potoglou, D.; Robinson, N.; Kim, C.W.; Burge, P.; Warnes, R. Quantifying individuals’ trade-offs between privacy, liberty and security: The case of rail travel in UK. Transp. Res. Part A Policy Pract. 2010, 44, 169–181. [ CrossRef ] 39. Pouw, C.A.S.; Toschi, F.; van Schadewijk, F.; Corbetta, A. Monitoring physical distancing for crowd management: Real-time trajectory and group analysis. PLoS ONE 2020, 15, e0240963. [ CrossRef ] 40. Rao, J.; Gao, S.; Li, M.; Huang, Q. A privacy-preserving framework for location recommendation using decentralized collaborative machine learning. Trans. GIS 2021, 25, 1153–1175. [ CrossRef ] 41. Sikora, P.; Malina, L.; Kiac, M.; Martinasek, Z.; Riha, K.; Prinosil, J.; Jirik, L.; Srivastava, G. Artificial Intelligence-Based Surveillance System for Railway Crossing Traffic. IEEE Sens. J. 2021, 21, 15515–15526. [ CrossRef ] 42. Sun, W.; Yu, F.R.; Tang, T.; Bu, B. Energy-Efficient Communication-Based Train Control Systems With Packet Delay and Loss. IEEE Trans. Intell. Transp. Syst. 2016, 17, 452–468. [ CrossRef ] 43. Thaduri, A.; Aljumaili, M.; Kour, R.; Karim, R. Cybersecurity for eMaintenance in railway infrastructure: Risks and consequences. Int. J. Syst. Assur. Eng. Manag. 2019, 10, 149–159. [ CrossRef ] 44. Wang, Y.; Zhang, W.; Wang, X.; Guo, W.; Khan, M.K.; Fan, P. Improving the Security of LTE-R for High-Speed Railway: From the Access Authentication View. IEEE Trans. Intell. Transp. Syst. 2022, 23, 1332–1346. [ CrossRef ] 45. Wu, Y.; Wei, Z.; Weng, J.; Deng, R.H. Position Manipulation Attacks to Balise-Based Train Automatic Stop Control. IEEE Trans. Veh. Technol. 2018, 67, 5287–5301. [ CrossRef ] 46. Wu, Y.; Weng, J.; Tang, Z.; Li, X.; Deng, R.H. Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems. IEEE Trans. Intell. Transp. Syst. 2017, 18, 814–823. [ CrossRef ] 47. Wu, Y.; Ye, D.; Wei, Z.; Wang, Q.; Tan, W.; Deng, R.H. Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks. IEEE Internet Things J. 2019, 6, 1617–1627. [ CrossRef ] 48. Zeng, D.; Chawathe, S.S.; Huang, H.; Wang, F.Y. Protecting Transportation Infrastructure. IEEE Intell. Syst. 2007, 22, 8–11. [ CrossRef ] 49. Zhang, L.; Cheng, L.; Alsokhiry, F.; Mohamed, M.A. A Novel Stochastic Blockchain-Based Energy Management in Smart Cities Using V2S and V2G. IEEE Trans. Intell. Transp. Syst. 2022, 1, 1–8. [ CrossRef ] 50. Zhao, H.; Dai, X.; Ding, L.; Cui, D.; Ding, J.; Chai, T. Resilient Cooperative Control for High-Speed Trains Under Denial-of-Service Attacks. IEEE Trans. Veh. Technol. 2021, 70, 12427–12436. [ CrossRef ] 51. Zheng, Q.; Wang, X.; Khurram Khan, M.; Zhang, W.; Gupta, B.B.; Guo, W. A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service. IEEE Access 2018, 6, 711–722. [ CrossRef ] 52. Redmon, J.; Divvala, S.; Girshick, R.; Farhadi, A. You only look once: Unified, real-time object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016; pp. 779–788. 53. Sun, Y.; Zhang, R.; Wang, X.; Gao, K.; Liu, L. A Decentralizing Attribute-Based Signature for Healthcare Blockchain. In Proceedings of the 2018 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China, 30 July–2 August 2018; pp. 1–9. 54. Guo, R.; Shi, H.; Zhao, Q.; Zheng, D. Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems. IEEE Access 2018, 6, 11676–11686. [ CrossRef ] 55. European Commission. Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016. Off. J. Eur. Union 2016 , L 194/1. Available online: https://www.legislation.gov.uk/eudr/2016/1148/contents (accessed on 29 August 2022). 56. ENISA. Railway Cybersecurity Report. 2020. Available online: https://www.enisa.europa.eu/publications/railway- cybersecurity (accessed on 1 September 2022). 57. ENISA. Railway Cybersecurity—Good Practices in Cyber Risk Management. 2021. Available online: https://www.enisa.europa. eu/publications/railway-cybersecurity-good-practices-in-cyber-risk-management (accessed on 1 September 2022). 58. He, R.; Ai, B.; Wang, G.; Guan, K.; Zhong, Z.; Molisch, A.F.; Briso-Rodriguez, C.; Oestges, C.P. High-Speed Railway Communica- tions: From GSM-R to LTE-R. IEEE Veh. Technol. Mag. 2016, 11, 49–58. [ CrossRef ] 59. Shafiullah, G.M.; Ali, A.B.M.S.; Thompson, A.; Wolfs, P.J. Predicting Vertical Acceleration of Railway Wagons Using Regression Algorithms. IEEE Trans. Intell. Transp. Syst. 2010, 11, 290–299. [ CrossRef ] 60. Alawad, H.; Kaewunruen, S.; An, M. Learning From Accidents: Machine Learning for Safety at Railway Stations. IEEE Access 2020 , 8, 633–648. [ CrossRef ] 61. López-Aguilar, P.; Solanas, A. An Effective Approach to the Cross-Border Exchange of Digital Evidence Using Blockchain. In Proceedings of the 9th International Conference on Applications in Electronics Pervading Industry, Environment and Society, Pisa, Italy, 11–13 September 2021; pp. 1–5. 62. Sharma, P.K.; Park, J.H. Blockchain based hybrid network architecture for the smart city. Future Gener. Comput. Syst. 2018, 86, 650–655. [ CrossRef ] Sensors 2022, 22, 7698 25 of 25 63. Demissie, B.F.; Ranise, S. Assessing the Effectiveness of the Shared Responsibility Model for Cloud Databases: The Case of Google’s Firebase. In Proceedings of the IEEE International Conference on Smart Data Services, Chicago, IL, USA, 5–10 September 2021; pp. 121–131. 64. Stojkoska, B.R.; Nikolovski, Z. Data compression for energy efficient IoT solutions. In Proceedings of the 2017 25th Telecommuni- cation Forum (TELFOR), Belgrade, Serbia, 21–22 November 2017; pp. 1–4. 65. Zhang, W.; Cheung, S.; Chen, M. Hiding privacy information in video surveillance system. In Proceedings of the IEEE International Conference on Image Processing 2005, Genoa, Italy, 11–14 September 2005; Volume 3, pp. 2–868. 66. Hassan, M.U.; Rehmani, M.H.; Chen, J. Differential Privacy Techniques for Cyber Physical Systems: A Survey. IEEE Commun. Surv. Tutor. 2020, 22, 746–789. [ CrossRef ] 67. Shi, Y.; Piao, C.; Zheng, L. Differential-Privacy-Based Correlation Analysis in Railway Freight Service Applications. In Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Nanjing, China, 12–14 October 2017; pp. 35–39. 68. Bhati, B.S.; Ivanchev, J.; Bojic, I.; Datta, A.; Eckhoff, D. Utility-Driven k-Anonymization of Public Transport User Data. IEEE Access 2021, 9, 23608–23623. [ CrossRef ] 69. Riahi Sfar, A.; Challal, Y.; Moyal, P.; Natalizio, E. A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation. IEEE Trans. Intell. Transp. Syst. 2019, 20, 4405–4414. [ CrossRef ] 70. National Institute of Standards and Technology. Framework for Improving Critical Infrastructure Cybersecurity. 2018. Available online: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf (accessed on 1 September 2022). 71. International Organization for Standardization and International Electrotechnical Commission. ISO/IEC 27000 Family Standards. Available online: https://www.iso.org/search.html?q=27000 (accessed on 1 September 2022). 72. International Society of Automation and International Electrotechnical Commission. ISA/IEC 62443 Series of Standards. 2018. Available online: https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards (accessed on 1 September 2022). 73. CLC/TS 50701. Railway Applications—Cybersecurity. Available online: https://www.en-standard.eu/clc/ts-50701-2021 -railway-applications-cybersecurity/ (accessed on 1 September 2022). 74. Taherdoost, H. Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview. Electronics 2022, 11, 2181. [ CrossRef ] 75. A Body of the European Union. Shift2Rail. 2020. Available online: https://rail-research.europa.eu/about-shift2rail (accessed on 1 September 2022). 76. EU Horizon 2020 Research and Innovation Programme. CYbersecurity in the Railway Sector (CYRAIL). 2018. Available online: https://cyrail.eu/ (accessed on 1 September 2022). 77. López-Aguilar, P.; Solanas, A. Human Susceptibility to Phishing Attacks Based on Personality Traits: The Role of Neuroticism. In Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, Madrid, Spain, 12–16 July 2021; pp. 1363–1368. 78. Transportation Research Board and National Academies of Sciences, Engineering, and Medicine. Cybersecurity in Transit Systems; The National Academies Press: Washington, DC, USA, 2022. 79. Anti-Phishing Working Group. Phishing Activity Trends Report—1st Quarter 2022; Technical Report; Anti-Phishing Working Group: USA, 2022. 80. Belcher, S.; Belcher, T.; Greenwald, E.; Thomas, B. Is the Transit Industry Prepared for the Cyber Revolution? Policy Recommendations to Enhance Surface Transit Cyber Preparedness; Technical Report; San José State University and Mineta Transportation Institute: San Jose, CA, USA, 2020. 81. Fortune Business Insight. Railway Cyber Security Market Size, Share & COVID-19 Impact Analysis, by Security Type, by Type, and Regional Forecasts, 2021–2028; Technical Report; Fortune Business Insight: Pune, India, 2022. Download 1.44 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling