What Are the Security Challenges Concerning Maintenance Data in the Railway Industry
Total Page:16
File Type:pdf, Size:1020Kb
What Are the Security Challenges Concerning Maintenance Data in the Railway Industry Hiba Khan Information Security, master's level (120 credits) 2019 Luleå University of Technology Department of Computer Science, Electrical and Space Engineering Abstract Recently, technology advancement has brought improvement in all the sectors, including the railway sector. The Internet of Things (IoT) based railway systems have immense potential to improve quality and systems that will enable more efficient, environmental friendly railway system. Many research brought innovations that offer enormous benefits for rail travel. The current research focuses on the railway industries, as they want to reap the benefits of IT concept such as Cloud Computing, Information Security, and Internet of Things (IoT). Railway industries are generating a large volume of data every day from different sources. In addition, machine and human interactions are rapidly increasing along with the development of technologies. This data need to be properly gathered, analysed and shared in a way that it is safe from different types of cyberattacks and calamities. To overcome smart devices’ and Cloud’s limitations, the new paradigm known as Fog computing has appeared. In which an additional layer processes the data and sends the results to the Cloud. Despite numerous benefits of Fog, computing brings into IoT- based environments, privacy and security issues remain the main challenge for its implementation. Hence, the primary purpose of this research is to investigate the potential challenges, consequences, threats, vulnerabilities, and risk management of data security in the railway infrastructure in the context of eMaintenance. Keywords: Cloud computing, Railway, Identification, Authorization, Authentication, Internet of Things (IoT). i Acknowledgements The research process is by no mean an isolated activity, and I am grateful to all those who helped me in completing my research work. First, I would like to thank my supervisor, John Lidström and co-supervisor Ramin Karim for their valuable comments and suggestions. Without their support and teaching, I would have never been able to research scientifically. The ideas, motivations, and encouragement they shared with me will assist me throughout my life. I am much obliged to my husband, Saad Ahmed Khan for extensive proofreading of my thesis draft and supporting me is difficult phases. He deserves my deepest gratitude for being so supportive throughout. I would like to thank all the interview and questionnaire participants who kindly shared their views, ideas, and knowledge with me. Without their support, I would have never been able to achieve the outcome I did with this research work. I would also like to thank my parents for their constant support in encouraging and motivating me throughout. It is wholeheartedly their support, which assisted me in finishing this research work. Hiba Khan ii Contents Introduction ..................................................................................................................................... 1 1.1 Background ....................................................................................................................... 1 1.2 Related Work .................................................................................................................... 2 1.3 Purpose and Objective of Research .................................................................................. 4 1.4 Research Gap .................................................................................................................... 5 1.5 The Research Question ..................................................................................................... 5 2 Literature Review .................................................................................................................... 6 2.1 Different Type of Cyberattacks in IoT Environment ....................................................... 6 2.1.1 Botnet ........................................................................................................................ 7 2.1.2 Man-in-the-middle .................................................................................................... 8 2.1.3 Denial of service (DoS) ............................................................................................. 8 2.1.4 Data and identity theft ............................................................................................... 9 2.1.5 Social engineering ..................................................................................................... 9 2.2 Different type of Cyberattacks in Cloud Environment ..................................................... 9 2.2.1 Denial of Service (DoS) attacks ................................................................................ 9 2.2.2 Data Breaches .......................................................................................................... 10 2.2.3 Man-in-the-middle .................................................................................................. 10 2.2.4 Data Loss ................................................................................................................. 10 2.3 Different type of Cyberattacks happened In IIoT and Cloud Computing ...................... 10 2.3.1 October 21 Attack ................................................................................................... 10 2.3.2 Cold in Finland ........................................................................................................ 11 2.3.3 WannaCry, the world most renowned malware ...................................................... 11 2.3.4 Operation Cloud Hopper ......................................................................................... 11 2.3.5 Equifax, the worst data breach in the world so far .................................................. 12 2.3.6 Slammer worm crashed Ohio nuke plant net .......................................................... 12 2.3.7 Ukraine power grid cyberattack .............................................................................. 12 2.3.8 Phishing Attack on Amazon and Apple .................................................................. 13 2.3.9 Security Breach in Sony .......................................................................................... 13 2.3.10 DDoS Attack Took Place on Bitbuchet ................................................................... 13 2.4 Cyberattacks in the Railway Industry ............................................................................. 13 2.4.1 IoT Cyberattacks and Railway ................................................................................ 14 2.4.2 Cyberattack in Cloud Environment in Railway ...................................................... 15 3 Research Methodology .......................................................................................................... 16 iii 3.1 What is Research ............................................................................................................ 16 3.2 Qualitative Research and its Methods ............................................................................ 17 3.2.1 Definition ................................................................................................................ 17 3.2.2 Qualitative Research Methods ................................................................................ 17 3.3 Selection of research approach ....................................................................................... 19 3.3.1 More on case study research approach .................................................................... 19 3.3.2 Selection of the case study for my research ............................................................ 20 3.4 Data Collection Methods ................................................................................................ 20 3.4.1 Direct Observation .................................................................................................. 21 3.4.2 Focus groups ........................................................................................................... 21 3.4.3 Archival Records ..................................................................................................... 21 3.4.4 Direct Interview ....................................................................................................... 21 3.5 Selection of Data Collection Method as Semi-Structural Interview .............................. 22 3.6 Data Analysis Methods ................................................................................................... 23 3.6.1 Graph ....................................................................................................................... 23 3.6.2 Table and Matrix ..................................................................................................... 23 3.7 Selection of Data Analysis Method as Matrix ................................................................ 23 3.8 Research Process ............................................................................................................ 24 3.9 Validity, Reliability and Generalizability of present research ....................................... 26 3.9.1 Validity .................................................................................................................... 26 3.9.2 Reliability ...............................................................................................................