A review of cyber threats and defence approaches in emergency management
Loukas, George ORCID: 0000-0003-3559-5182 , Gan, Diane ORCID: 0000-0002-0920-7572 and Vuong, Tuan (2013) A review of cyber threats and defence approaches in emergency management. Future Internet, 5 (2). pp. 205-236. ISSN 1999-5903 (doi:https://doi.org/10.3390/fi5020205)
|
PDF (This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.)
(ITEM_11710)_13_47_LOUKAS_2013_CMS.pdf - Published Version Available under License Creative Commons Attribution. Download (399kB) |
Abstract
Emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery. Failure of these systems, whether accidental or because of malicious action, can have severe implications for emergency management. Accidental failures have been extensively documented in the past and significant effort has been put into the development and introduction of more resilient technologies. At the same time researchers have been raising concerns about the potential of cyber attacks to cause physical disasters or to maximise the impact of one by intentionally impeding the work of the emergency services. Here, we provide a review of current research on the cyber threats to communication, sensing, information management and vehicular technologies used in emergency management. We emphasise on open issues for research, which are the cyber threats that have the potential to affect emergency management severely and for which solutions have not yet been proposed in the literature.
Item Type: | Article |
---|---|
Additional Information: | [1] This article belongs to the Special Issue Emergency Management, Communications and the Internet. [2] This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
Uncontrolled Keywords: | survey, pervasive computing, network-level security and protection, physical security, emergency management |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Pre-2014 Departments: | School of Computing & Mathematical Sciences |
Related URLs: | |
Last Modified: | 21 Oct 2020 08:00 |
URI: | http://gala.gre.ac.uk/id/eprint/11710 |
Actions (login required)
View Item |
Downloads
Downloads per month over past year