Analysis of Cyber Attacks within Critical IoT Infrastructures and Information Systems

Authors

  • Suh Charles Forbacha College of Technology, The University of Bamenda
  • Tambou Guemgne Eudoxie Juliana National Higher Polytechnic Institute, The University of Bamenda

DOI:

https://doi.org/10.47672/ejt.2617

Keywords:

Internet of Things, security, critical infrastructure, information systems, cyber attacks

Abstract

Purpose: This research aims were to provide valuable insights into the potentials, risks, and best practices of deploying IoT in critical sectors, thus contributing to the knowledge base and fostering decision-making. The goal was to identify the possible types of cyber-attacks, take various precautions against these attacks, and to develop protection methods.

Materials and Methods: To attain this goal, we conducted a series of targeted questionnaires with a sample size of 100 and 89 responded to the questionnaire. The primary data collected from the respondents was analysed with a statistical package for social science (SPSS) and the results were summarised in pie charts and frequency tables.

Findings: The result showed that 80.9% of the respondents were familiar with the concept of connected devices, a fundamental principle of IoT, 54% of them believed that IoT infrastructures in their sector were secure to a high or very high extent while 46% perceived them as only somewhat secure or not secure at all. On the other hand, 83.1% of respondents believed that there was a high or very high need for stricter regulations regarding the cybersecurity of critical IoT infrastructures.

Implications to Theory, Policy and Practice: The researchers proposed a framework for enhancing the security posture of critical IoT infrastructures. This framework encompasses a combination of technological measures, and policy recommendations.  In addition to this, they also recommended; Investing in the development of robust and reliable internet infrastructure to support the widespread deployment of IoT devices and enable seamless connectivity across the country. Providing training programs and workshops to enhance the technical skills of professionals in IoT technologies, cybersecurity, data analytics, and information systems management and implementing small-scale pilot projects in different sectors, such as healthcare, agriculture, transportation, or energy, to evaluate the feasibility and effectiveness of IoT infrastructures and information systems in the Cameroonian context. Conducting research to identify the specific needs and challenges in implementing IoT infrastructures and information systems in Cameroon, and developing tailored solutions to address them.

Keywords: Internet of Things, security, critical infrastructure, information systems, cyber attacks

Downloads

Download data is not yet available.

References

Abiodun, O., Omolara, O., Alawida, M., Alkhawaldeh, R., & Arshad, H. (2021). A Review on the Security of the Internet of Things: Challenges and Solutions. Wireless Personal Communications, 119, 1–35. https://doi.org/10.1007/s11277-021-08348-9

Acharya, B., Garikapati, K., Yarlagadda, A., & Dash, S. (2022). Internet of things (IoT) and data analytics in smart agriculture: Benefits and challenges (pp. 3–16). https://doi.org/10.1016/B978-0-12-823694-9.00013-X

Affia, A. O., Finch, H., Jung, W., Samori, I. A., Potter, L., & Palmer, X.-L. (2023). IoT Health Devices: Exploring Sec:urity Risks in the Connected Landscape. IoT, 4(2), Article 2. https://doi.org/10.3390/iot4020009

Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88, 10–28. https://doi.org/10.1016/j.jnca.2017.04.002

Alaine, B. T. (2 August 2023). How AI and IoT are driving SDGs in Cameroon and Beyond. Retrieved 27 January 2025, sur https://www.linkedin.com/pulse/how-ai-iot-driving-sdgs-cameroon-beyond-bate-tabenyang-alaine

Alcaraz, C., & Zeadally, S. (2015). Critical infrastructure protection: Requirements and challenges for the 21st century. International Journal of Critical Infrastructure Protection, 8, 53–66. https://doi.org/10.1016/j.ijcip.2014.12.002

Al Sadawi, A., Hassan, M., & Ndiaye, M. (2024). Blockchain Technology for IoT Security and Trust: A Comprehensive SLR.

Baykara, M., & Daş, R. (2015). A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems. International Journal of Computer Networks and Applications, 2(5).

Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M., & Assi, C. (2013). Communication security for smart grid distribution networks. IEEE Communications Magazine, 51(1), 42–49. https://doi.org/10.1109/MCOM.2013.6400437

Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016). A review of cyber security risk assessment methods for SCADA systems. Computers & Security, 56, 1–27. https://doi.org/10.1016/j.cose.2015.09.009

Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas, 113, 48–52. https://doi.org/10.1016/j.maturitas.2018.04.008

D. E. Whitehead, K. Owens, D. Gammel, and J. Smith. (2017). Ukraine cyber-induced power outage: Analysis and practical mitigation strategies | IEEE Conference Publication | IEEE Xplore. https://ieeexplore.ieee.org/document/8090056

DAILY SABAH. (2019). Cyberattacks blamed for Sunday’s internet disruption across Turkey | Daily Sabah. https://www.dailysabah.com/turkey/2019/10/28/cyberattacks-blamed-for-sundays-internet-disruption-across-turkey

Das, R., & Gündüz, M. Z. (2019). Analysis of Cyber-Attacks in IoT-based Critical Infrastructures.

Demi̇Rol, D., Daş, R., & Baykara, M. (2013). SQL Enjeksiyon Saldırı Uygulaması ve Güvenlik Önerileri.

E. Luiijf, I. Žutautaite, and B. M. Hämmerli. (2018). Critical Information Infrastructures Security: 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers [1st ed.] 978-3-030-05848-7, 978-3-030-05849-4. Dokumen.Pub. https://dokumen.pub/critical-information-infrastructures-security-13th-international-conference-critis-2018-kaunas-lithuania-september-24-26-2018-revised-selected-papers-1st-ed-978-3-030-05848-7-978-3-030-05849-4.html

Ericsson, 2020. (n.d.). The Internet of Things (IoT) technology. Retrieved 4 October 2023, from https://www.ericsson.com/en/internet-of-things

Google Forms. (2023). In Wikipedia. https://en.wikipedia.org/w/index.php?title=Google_Forms&oldid=1178230779

Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660. https://doi.org/10.1016/j.future.2013.01.010

Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., & Sikdar, B. (2019). A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures [Review]. Scopus OA2019; Institute of Electrical and Electronics Engineers Inc. https://scholarbank.nus.edu.sg/handle/10635/210052

Heath Muchena. (2019, November 13). African CIOs look to IoT for critical infrastructure applications. CIO. https://www.cio.com/article/215734/african-cios-look-to-iot-for-critical-infrastructure-applications.html

ISACA. (2019). Security Issues in IoT: Challenges and Countermeasures. ISACA. https://www.isaca.org/resources/isaca-journal/issues/2019/volume-1/security-issues-in-iot-challenges-and-countermeasures

J. P. Shim. (2019). Kinetic Threats and IoT Cybersecurity Cyber-physical Systems and Industrial IoT Cybersecurity: Issues and Solutions Emergent Research Forum (ERF) Paper. ResearchGate. https://www.researchgate.net/publication/344889050_Kinetic_Threats_and_IoT_Cybersecurity_Cyber-physical_Systems_and_Industrial_IoT_Cybersecurity_Issues_and_Solutions_Emergent_Research_Forum_ERF_Paper

J. Wilkins. (2019). Key Steps to Safeguard Industrial Environments from Cyber Threats. https://trout.software/blog/10-steps-to-protect-industrial-environments-from-cyber-threats

Kimani, K., Oduol, V., & Langat, K. (2019a). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36–49. https://doi.org/10.1016/j.ijcip.2019.01.001

Kimani, K., Oduol, V., & Langat, K. (2019b). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36–49. https://doi.org/10.1016/j.ijcip.2019.01.001

Kimani, K., Oduol, V., & Langat, K. (2019c). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25(C), 36–49.

Liu, X., Qian, C., Hatcher, W. G., Xu, H., Liao, W., & Yu, W. (2019). Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities. IEEE Access, 7, 79523–79544. https://doi.org/10.1109/ACCESS.2019.2920763

M. Li, W. Huang, Y. Wang, W. Fan, and J. Li. (2016). The study of APT attack stage model. ResearchGate. https://www.researchgate.net/publication/306925657_The_study_of_APT_attack_stage_model

Mansha Kapoor. (2023, August 11). IoT in Transportation: The Role of IoT Solutions in Transforming Mobility | CognitiveClouds Blog. https://www.cognitiveclouds.com/insights/iot-in-transportation

Maple, C. (2017). Security and privacy in the internet of things. Journal of Cyber Policy, 2(2), 155–184. https://doi.org/10.1080/23738871.2017.1366536

Mercan, S., Akkaya, K., Cain, L., & Thomas, J. (2020). Security, Privacy and Ethical Concerns of IoT Implementations in Hospitality Domain (No. arXiv:2009.10187). arXiv. http://arxiv.org/abs/2009.10187

Mezam. (2024). Mapcarta. https://mapcarta.com/16799338

Microsoft Windows 10 Pro. (n.d.). StackSocial. Retrieved 4 October 2023, from https://www.stacksocial.com/sales/stacksocial.com/sales/microsoft-windows-10-pro

Miller, B., & Rowe, D. (2012). A survey SCADA of and critical infrastructure incidents. Proceedings of the 1st Annual Conference on Research in Information Technology, 51–56. https://doi.org/10.1145/2380790.2380805

Moffa, A. (2024). Implementing Zero-trust to IoT Solutions. Retrieved on https://www.ptc.com/en/

Paré, G., & Kitsiou, S. (2017). Chapter 9 Methods for Literature Reviews. In Handbook of eHealth Evaluation: An Evidence-based Approach [Internet]. University of Victoria. https://www.ncbi.nlm.nih.gov/books/NBK481583/

R. Da¸s, A. Karabade, and G. Tuna. (2015). Common network attack types and defense mechanisms,. https://www.researchgate.net/publication/350374715_Analysis_of_cyber-attacks_in_IoT-based_critical_infrastructures

Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266–2279. https://doi.org/10.1016/j.comnet.2012.12.018

Sánchez, H. S., Rotondo, D., Escobet, T., Puig, V., & Quevedo, J. (2019). Bibliographical review on cyber attacks from a control oriented perspective. Annual Reviews in Control, 48, 103–128. https://doi.org/10.1016/j.arcontrol.2019.08.002

Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: An overview from machine learning perspective. Journal of Big Data, 7(1), 41. https://doi.org/10.1186/s40537-020-00318-5

Sean, L. (2020). Taiwan’s state-owned company CPC Corp. Suffers ransomware attack—CyberScoop. https://cyberscoop.com/cpc-corp-ransomware-attack-taiwan-trend-micro/

Segovia, M., Cavalli, A., Cuppens-Boulahia, N., & Garcia-Alfaro, J. (2019). A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper) (pp. 257–264). https://doi.org/10.1007/978-3-030-18419-3_17

Ślusarczyk, B. (2018). INDUSTRY 4.0-ARE WE READY? Polish Journal of Management Studies, 17. https://doi.org/10.17512/pjms.2018.17.1.19

SPSS. (2023). In Wikipedia. https://en.wikipedia.org/w/index.php?title=SPSS&oldid=1171239082

Stouffer, K. (2023). Guide to Operational Technology (OT) Security (No. NIST SP 800-82r3; p. NIST SP 800-82r3). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-82r3

Tahiru, A. (2018). CYBERSECURITY IN AFRICA: THE THREATS AND CHALLANGES. 3(5).

Tariq, N., Khan, F. A., & Asim, M. (2021). Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis. Procedia Comput. Sci., 191(C), 425–430. https://doi.org/10.1016/j.procs.2021.07.053

Team, T. (2021, October 21). How IoT Works? TechVidvan. https://techvidvan.com/tutorials/how-iot-works/

Thales. (2022). Top IoT security issues and challenges (2022) – Thales. https://www.thalesgroup.com/en/markets/digital-identity-and-security/iot/magazine/internet-threats

Thomas Brinkhoff. (2017). Mfoundi (Department, Cameroon)—Population Statistics, Charts, Map and Location. https://www.citypopulation.de/en/cameroon/admin/0207__mfoundi/

Tracey, T. (2024, January 3). Phishing Attacks: A Recent Comprehensive Study and a New Anatomy. CybSafe. https://www.cybsafe.com/research-library/phishing-attacks-a-comprehensive-study/

Ugur, N. G., & Barutcu, M. T. (2018). A Critical Analysis on Internet of Things: Features and Vulnerabilities.

wang wei. (2018). Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer. The Hacker News. https://thehackernews.com/2018/04/iot-hacking-thermometer.html

Weber, R. H. (2010). Internet of Things – New security and privacy challenges. Computer Law & Security Review, 26(1), 23–30. https://doi.org/10.1016/j.clsr.2009.11.008

Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), 74–77. https://doi.org/10.1016/j.mfglet.2014.01.005

Zhang, X., Upton, O., Beebe, N. L., & Choo, K.-K. R. (2020). IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers. Forensic Science International: Digital Investigation, 32, 300926. https://doi.org/10.1016/j.fsidi.2020.300926

Published

2025-02-05

How to Cite

Forbacha, S. C., & Juliana, T. G. E. (2025). Analysis of Cyber Attacks within Critical IoT Infrastructures and Information Systems. European Journal of Technology, 8(6), 28–61. https://doi.org/10.47672/ejt.2617

Issue

Section

Articles