Skip navigation

A review of cyber threats and defence approaches in emergency management

A review of cyber threats and defence approaches in emergency management

Loukas, George ORCID: 0000-0003-3559-5182, Gan, Diane ORCID: 0000-0002-0920-7572 and Vuong, Tuan (2013) A review of cyber threats and defence approaches in emergency management. Future Internet, 5 (2). pp. 205-236. ISSN 1999-5903 (doi:https://doi.org/10.3390/fi5020205)

[img]
Preview
PDF (This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.)
(ITEM_11710)_13_47_LOUKAS_2013_CMS.pdf - Published Version
Available under License Creative Commons Attribution.

Download (399kB)

Abstract

Emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery. Failure of these systems, whether accidental or because of malicious action, can have severe implications for emergency management. Accidental failures have been extensively documented in the past and significant effort has been put into the development and introduction of more resilient technologies. At the same time researchers have been raising concerns about the potential of cyber attacks to cause physical disasters or to maximise the impact of one by intentionally impeding the work of the emergency services. Here, we provide a review of current research on the cyber threats to communication, sensing, information management and vehicular technologies used in emergency management. We emphasise on open issues for research, which are the cyber threats that have the potential to affect emergency management severely and for which solutions have not yet been proposed in the literature.

Item Type: Article
Additional Information: [1] This article belongs to the Special Issue Emergency Management, Communications and the Internet. [2] This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Uncontrolled Keywords: survey, pervasive computing, network-level security and protection, physical security, emergency management
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Pre-2014 Departments: School of Computing & Mathematical Sciences
Related URLs:
Last Modified: 21 Oct 2020 08:00
URI: http://gala.gre.ac.uk/id/eprint/11710

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics