메뉴 건너뛰기




Volumn 5, Issue 2, 2013, Pages 205-236

A review of cyber threats and defence approaches in emergency management

Author keywords

Emergency management; Network level security and protection; Pervasive computing; Physical security; Survey

Indexed keywords

CIVIL DEFENSE; DISASTERS; HUMAN RESOURCE MANAGEMENT; INFORMATION MANAGEMENT; NETWORK SECURITY; RISK MANAGEMENT; SURVEYING; UBIQUITOUS COMPUTING;

EID: 84990987405     PISSN: None     EISSN: 19995903     Source Type: Journal    
DOI: 10.3390/fi5020205     Document Type: Review
Times cited : (32)

References (100)
  • 4
    • 84878271783 scopus 로고    scopus 로고
    • Research on urban public safety emergency management early warning system based on technologies for the Internet of things
    • Du, C.; Zhu, S. Research on urban public safety emergency management early warning system based on technologies for the Internet of things. Procedia Eng. 2012, 45, 748-754.
    • (2012) Procedia Eng. , vol.45 , pp. 748-754
    • Du, C.1    Zhu, S.2
  • 6
    • 72949084378 scopus 로고    scopus 로고
    • Autonomous Networked Robots for the Establishment of Wireless Communication in Uncertain Emergency Response Scenarios
    • Hawaii, USA, 8-12 March
    • Timotheou, S.; Loukas, G. Autonomous Networked Robots for the Establishment of Wireless Communication in Uncertain Emergency Response Scenarios. In Proceedings of ACM Symposium on Applied Computing, Hawaii, USA, 8-12 March 2009; pp. 1171-1175.
    • (2009) Proceedings of ACM Symposium on Applied Computing , pp. 1171-1175
    • Timotheou, S.1    Loukas, G.2
  • 8
    • 78650516347 scopus 로고    scopus 로고
    • Emergency knowledge management and social media technologies: A case study of the 2010 Haitian earthquake
    • Yates, D.; Paquette, S. Emergency knowledge management and social media technologies: A case study of the 2010 Haitian earthquake. Int. J. Inf. Manag. 2011, 31, 6-13.
    • (2011) Int. J. Inf. Manag. , vol.31 , pp. 6-13
    • Yates, D.1    Paquette, S.2
  • 12
    • 24044548795 scopus 로고    scopus 로고
    • Prevention, preparedness, response, recovery-An outdated concept?
    • Crondstedt, M. Prevention, preparedness, response, recovery-An outdated concept? Aust. J. Emerg. Manag. 2002, 17, 10-13.
    • (2002) Aust. J. Emerg. Manag. , vol.17 , pp. 10-13
    • Crondstedt, M.1
  • 14
    • 42649104394 scopus 로고    scopus 로고
    • Approximating the evacuation of the World Trade Center north tower using computer simulation
    • Galea, E.R.; Sharp, G.; Lawrence, P.J.; Holden, R. Approximating the evacuation of the World Trade Center north tower using computer simulation. J. Fire Prot. Eng. 2008, 18, 85-115.
    • (2008) J. Fire Prot. Eng. , vol.18 , pp. 85-115
    • Galea, E.R.1    Sharp, G.2    Lawrence, P.J.3    Holden, R.4
  • 17
    • 85044257724 scopus 로고    scopus 로고
    • Cyberterrorism: Is the U.S. healthcare system safe?
    • Harries, D.; Yellowlees, P.M. Cyberterrorism: Is the U.S. healthcare system safe? Telemed. e-Health 2012, 19, 1-6.
    • (2012) Telemed. e-Health , vol.19 , pp. 1-6
    • Harries, D.1    Yellowlees, P.M.2
  • 18
    • 84880940274 scopus 로고    scopus 로고
    • Emergency Management; Eksioglu, B., Ed.; InTech: Rijeka, Croatia
    • Walker, J. Cyber Security Concerns for Emergency Management. In Emergency Management; Eksioglu, B., Ed.; InTech: Rijeka, Croatia, 2012; pp. 39-59.
    • (2012) Cyber Security Concerns for Emergency Management , pp. 39-59
    • Walker, J.1
  • 20
    • 84881520793 scopus 로고    scopus 로고
    • Cyber Terrorism: Problems, Perspectives and Prescription
    • Schmallager, F., Pittaro, M., Eds.; The ACM Digital Library: New York, NY, USA
    • Madhava, S.S.P.; Jaishankar, K. Cyber Terrorism: Problems, Perspectives and Prescription. In Crimes of the Internet; Schmallager, F., Pittaro, M., Eds.; The ACM Digital Library: New York, NY, USA, 2008; pp. 593-611.
    • (2008) Crimes of the Internet , pp. 593-611
    • Madhava, S.S.P.1    Jaishankar, K.2
  • 21
    • 84860380324 scopus 로고    scopus 로고
    • Characterizing the security implications of third-party emergency alert systems over cellular text messaging services
    • Traynor, P. Characterizing the security implications of third-party emergency alert systems over cellular text messaging services. IEEE Trans. Mob. Comput. 2012, 11, 983-994.
    • (2012) IEEE Trans. Mob. Comput. , vol.11 , pp. 983-994
    • Traynor, P.1
  • 22
    • 85019217337 scopus 로고    scopus 로고
    • Message Transmission System and Method, and Utilization of the Transmission System to Investigate Services Offered
    • US Patent, 31 October
    • Fournier, J.-C.; Rose, S. Message Transmission System and Method, and Utilization of the Transmission System to Investigate Services Offered. US Patent 7,130,648, 31 October 2006.
    • (2006)
    • Fournier, J.-C.1    Rose, S.2
  • 23
    • 85019194070 scopus 로고    scopus 로고
    • Method and Apparatus for Transmitting Secure Cell Broadcast Messages in a Cellular Communication Network
    • WIPO Patent Application WO/2012/108803, 18 June
    • Kristiansson, U.; Osth, K.-J.; Blomqvist, E.; Claassen, G. Method and Apparatus for Transmitting Secure Cell Broadcast Messages in a Cellular Communication Network. WIPO Patent Application WO/2012/108803, 18 June 2012.
    • (2012)
    • Kristiansson, U.1    Osth, K.-J.2    Blomqvist, E.3    Claassen, G.4
  • 24
    • 67651183943 scopus 로고    scopus 로고
    • Mitigation of control channel jamming under node capture attacks
    • Tague, P.; Li, M.; Poovendran, R. Mitigation of control channel jamming under node capture attacks. IEEE Trans. Mob. Comput. 2009, 8, 1221-1234.
    • (2009) IEEE Trans. Mob. Comput. , vol.8 , pp. 1221-1234
    • Tague, P.1    Li, M.2    Poovendran, R.3
  • 26
    • 85008524827 scopus 로고    scopus 로고
    • Thwarting control-channel jamming attacks from inside jammers
    • Liu, S.; Lazos, L.; Krunz, M. Thwarting control-channel jamming attacks from inside jammers. IEEE Trans. Mob. Comput. 2012, 11, 1545-1558.
    • (2012) IEEE Trans. Mob. Comput. , vol.11 , pp. 1545-1558
    • Liu, S.1    Lazos, L.2    Krunz, M.3
  • 27
    • 84862677964 scopus 로고    scopus 로고
    • Mobile menace: Why SDR poses such a threat
    • Jones, G. Mobile menace: Why SDR poses such a threat. Netw. Secur. 2012, 6, 5-7.
    • (2012) Netw. Secur. , vol.6 , pp. 5-7
    • Jones, G.1
  • 32
    • 85019254655 scopus 로고    scopus 로고
    • Securing Hastily Formed Networks for Disaster Relief and Emergency Response
    • San Diego, CA, USA, 10-14 June
    • Bharania, R. Securing Hastily Formed Networks for Disaster Relief and Emergency Response. Presented at CISCO Live, San Diego, CA, USA, 10-14 June 2012.
    • (2012) Presented at CISCO Live
    • Bharania, R.1
  • 34
    • 39549088728 scopus 로고    scopus 로고
    • Wireless mesh networks for public safety and crisis management applications
    • Portmann, M.; Pirzada, A.A. Wireless mesh networks for public safety and crisis management applications. IEEE Internet Comput. 2008, 12, 18-25.
    • (2008) IEEE Internet Comput. , vol.12 , pp. 18-25
    • Portmann, M.1    Pirzada, A.A.2
  • 40
    • 79953786886 scopus 로고    scopus 로고
    • Selective jamming/dropping insider attacks in wireless mesh networks
    • Lazos, L.; Krunz, M. Selective jamming/dropping insider attacks in wireless mesh networks. IEEE Netw. 2011, 25, 30-34.
    • (2011) IEEE Netw. , vol.25 , pp. 30-34
    • Lazos, L.1    Krunz, M.2
  • 48
    • 84897792134 scopus 로고    scopus 로고
    • Assessing and Improving the Trustworthiness of Social Media for Emergency Management: A Literature Review
    • Bodo, Norway, 19-21 November
    • Hiltz, S.R.; Gonzalez, J.J. Assessing and Improving the Trustworthiness of Social Media for Emergency Management: A Literature Review. In Proceedings of the Norwegian Information Security Conference (NISK), Bodo, Norway, 19-21 November 2012.
    • (2012) Proceedings of the Norwegian Information Security Conference (NISK)
    • Hiltz, S.R.1    Gonzalez, J.J.2
  • 51
    • 84864085461 scopus 로고    scopus 로고
    • Detection and Mitigation of Spoofing Attacks on a Vector Based Tracking GPS Receiver, ION ITM 2012
    • Newport Beach, CA, 30 January-1 February
    • Jafarnia-Jahromi, A.; Lin, T.; Broumandan, A.; Nielsen, J.; Lachapelle, G. Detection and Mitigation of Spoofing Attacks on a Vector Based Tracking GPS Receiver, ION ITM 2012, Newport Beach, CA, 30 January-1 February 2012.
    • (2012)
    • Jafarnia-Jahromi, A.1    Lin, T.2    Broumandan, A.3    Nielsen, J.4    Lachapelle, G.5
  • 52
    • 33646568855 scopus 로고    scopus 로고
    • GPS Spoofing Countermeasures
    • LAUR-03-6163
    • Warner, J.S.; Johnston, R.G. GPS Spoofing Countermeasures. Homel. Secur. J. 2003, LAUR-03-6163, 22-30.
    • (2003) Homel. Secur. J. , pp. 22-30
    • Warner, J.S.1    Johnston, R.G.2
  • 53
    • 84874328749 scopus 로고    scopus 로고
    • GPS Spoofing Attack on Time Synchronization in Wireless Networks and Detection Scheme Design
    • Orlando, FL, USA, 29 October-1 November
    • Zeng, Q.; Li, H.; Qian, L. GPS Spoofing Attack on Time Synchronization in Wireless Networks and Detection Scheme Design. In Proceedings of the Military Communications Conference (MILCOM), Orlando, FL, USA, 29 October-1 November 2012.
    • (2012) Proceedings of the Military Communications Conference (MILCOM)
    • Zeng, Q.1    Li, H.2    Qian, L.3
  • 54
    • 84878383015 scopus 로고    scopus 로고
    • Designer satellite collisions from covert cyber war
    • Kallberg, J. Designer satellite collisions from covert cyber war. Strateg. Stud. Q. 2012, 124-136.
    • (2012) Strateg. Stud. Q. , pp. 124-136
    • Kallberg, J.1
  • 55
    • 84857207653 scopus 로고    scopus 로고
    • Status Study on Sustainability of Satellite Communication Systems Under Hostile Jamming Environment
    • Hyderabad, India, 16-18 December
    • Rao, G.K.; Rao, R.S.H. Status Study on Sustainability of Satellite Communication Systems Under Hostile Jamming Environment. In Proceedings of 2011 Annual IEEE India Conference (INDICON), Hyderabad, India, 16-18 December 2011; pp. 1-7.
    • (2011) Proceedings of 2011 Annual IEEE India Conference (INDICON) , pp. 1-7
    • Rao, G.K.1    Rao, R.S.H.2
  • 58
    • 83755207008 scopus 로고    scopus 로고
    • A Cyber-Physical Integrated Security Framework with Fuzzy Logic Assessment for Cultural Heritages
    • Anchorage, AK, USA, 9-12 October
    • Chen, Y.J.; Shih, J.S.; Cheng, S.T. A Cyber-Physical Integrated Security Framework with Fuzzy Logic Assessment for Cultural Heritages. In Proceeding of the IEEE International Conference on Systems, Man and Cybernetics, Anchorage, AK, USA, 9-12 October 2011; ISBN 978-1-4577-0652-3, pp. 1843-1847.
    • (2011) Proceeding of the IEEE International Conference on Systems, Man and Cybernetics , pp. 1843-1847
    • Chen, Y.J.1    Shih, J.S.2    Cheng, S.T.3
  • 62
    • 77649094379 scopus 로고    scopus 로고
    • Data security and privacy in wireless body area networks
    • Li, M.; Lou, W.; Ren, K. Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 2010, 17, 51-58.
    • (2010) IEEE Wirel. Commun. , vol.17 , pp. 51-58
    • Li, M.1    Lou, W.2    Ren, K.3
  • 63
    • 78049507383 scopus 로고    scopus 로고
    • A novel intrusion detection system for wireless body area network in health care monitoring
    • Sundararajan, T.V.P.; Shanmugam, A. A novel intrusion detection system for wireless body area network in health care monitoring. J. Comput. Sci. 2010, 6, 1355-1361.
    • (2010) J. Comput. Sci. , vol.6 , pp. 1355-1361
    • Sundararajan, T.V.P.1    Shanmugam, A.2
  • 65
    • 85032244491 scopus 로고    scopus 로고
    • The AMP attacker: A suite of tools for exploiting SQL injection vulnerabilities in web applications
    • in press
    • Cecchini, S.; Gan, D. The AMP attacker: A suite of tools for exploiting SQL injection vulnerabilities in web applications. Int. J. Electron. Secur. Digit. Forensics 2013, in press.
    • (2013) Int. J. Electron. Secur. Digit. Forensics
    • Cecchini, S.1    Gan, D.2
  • 66
    • 74249088444 scopus 로고    scopus 로고
    • Survey of network security systems to counter SIP-based denial-of-service attacks
    • Ehlerta, S.; Geneiatakis, D.; Magedanza, T. Survey of network security systems to counter SIP-based denial-of-service attacks. Comput. Secur. 2010, 29, 225-243.
    • (2010) Comput. Secur. , vol.29 , pp. 225-243
    • Ehlerta, S.1    Geneiatakis, D.2    Magedanza, T.3
  • 72
    • 33745796561 scopus 로고    scopus 로고
    • Exploiting open functionality in SMS-capable cellular networks
    • Traynor, P.; Enck, W.; McDaniel, P.; La Porta, T. Exploiting open functionality in SMS-capable cellular networks. J. Comput. Secur. 2008, 16, 393-404.
    • (2008) J. Comput. Secur. , vol.16 , pp. 393-404
    • Traynor, P.1    Enck, W.2    McDaniel, P.3    La Porta, T.4
  • 73
    • 61449199429 scopus 로고    scopus 로고
    • Mitigating attacks on open functionality in SMS-capable cellular networks
    • Traynor, P.; Enck, W.; McDaniel, P.; La Porta, T. Mitigating attacks on open functionality in SMS-capable cellular networks. IEEE/ACM Trans. Netw. 2009, 17, 182-193.
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , pp. 182-193
    • Traynor, P.1    Enck, W.2    McDaniel, P.3    La Porta, T.4
  • 78
    • 77249166094 scopus 로고    scopus 로고
    • A survey on security in wireless mesh networks
    • Yi, P.; Wu, Y.; Zou, F.; Liu, N. A survey on security in wireless mesh networks. IETE Tech. Rev. 2010, 27, 6-14.
    • (2010) IETE Tech. Rev. , vol.27 , pp. 6-14
    • Yi, P.1    Wu, Y.2    Zou, F.3    Liu, N.4
  • 79
    • 85029731561 scopus 로고    scopus 로고
    • A survey of attacks and countermeasures in mobile ad hoc networks
    • Wu, B.; Chen, J.; Wu, J.; Cardei, M. A survey of attacks and countermeasures in mobile ad hoc networks. Wirel. Netw. Secur. 2007, 103-135.
    • (2007) Wirel. Netw. Secur. , pp. 103-135
    • Wu, B.1    Chen, J.2    Wu, J.3    Cardei, M.4
  • 81
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation-tools for software protection
    • Collberg, C.; Thomborson, C.Watermarking, tamper-proofing, and obfuscation-tools for software protection. IEEE Trans. Softw. Eng. 2002, 28, 735-746.
    • (2002) IEEE Trans. Softw. Eng. , vol.28 , pp. 735-746
    • Collberg, C.1    Thomborson, C.2
  • 82
    • 33846199593 scopus 로고    scopus 로고
    • A self-aware approach to denial of service defence
    • Gelenbe, E.; Loukas, G. A self-aware approach to denial of service defence. Comput. Netw. 2007, 51, 1299-1314.
    • (2007) Comput. Netw. , vol.51 , pp. 1299-1314
    • Gelenbe, E.1    Loukas, G.2
  • 84
    • 84879602248 scopus 로고    scopus 로고
    • Evaluation of network resilience, survivability, and disruption tolerance: Analysis, topology generation, simulation, and experimentation
    • Sterbenz, J.P.G.; Cetinkaya, E.K.; Hameed, M.A.; Jabbar, A.; Qian, S.; Rohrer, J.P. Evaluation of network resilience, survivability, and disruption tolerance: Analysis, topology generation, simulation, and experimentation. Telecommun. Syst. 2011, 1-34; doi:10.1007/s11235-011-9573-6.
    • (2011) Telecommun. Syst. , pp. 1-34
    • Sterbenz, J.P.G.1    Cetinkaya, E.K.2    Hameed, M.A.3    Jabbar, A.4    Qian, S.5    Rohrer, J.P.6
  • 87
    • 84881528596 scopus 로고    scopus 로고
    • Resilient Emergency Evacuation Using Opportunistic Communications
    • Gelenbe, E., Lent, R., Ed.; Springer: Berlin, Germany
    • Gorbil, G.; Gelenbe, E. Resilient Emergency Evacuation Using Opportunistic Communications. In Computer and Information Sciences III; Gelenbe, E., Lent, R., Ed.; Springer: Berlin, Germany, 2013; pp. 249-257.
    • (2013) Computer and Information Sciences III , pp. 249-257
    • Gorbil, G.1    Gelenbe, E.2
  • 88
    • 77955689268 scopus 로고    scopus 로고
    • Protection against denial of service attacks: A survey
    • Loukas, G.; Oke, G. Protection against denial of service attacks: A survey. Comput. J. Br. Comput. Soc. 2010, 53, 1020-1037.
    • (2010) Comput. J. Br. Comput. Soc. , vol.53 , pp. 1020-1037
    • Loukas, G.1    Oke, G.2
  • 89
    • 84889742206 scopus 로고    scopus 로고
    • Disaster Management and Community Warning Systems: Inter-Organisational Collaboration and ICT Innovation
    • Hyderabad, India, 10-12 July
    • Bunker, D.; Smith, S. Disaster Management and Community Warning Systems: Inter-Organisational Collaboration and ICT Innovation. In Proceedings of the Pacific Asia Conference on Information Systems, Hyderabad, India, 10-12 July 2009.
    • (2009) Proceedings of the Pacific Asia Conference on Information Systems
    • Bunker, D.1    Smith, S.2
  • 91
    • 84912093114 scopus 로고    scopus 로고
    • Information and communication technology and crisis management
    • Wojciechowicz, W.; Zych, J.; Holubowicz, W. Information and communication technology and crisis management. Tech. Sci. 2012, 15, 101-110.
    • (2012) Tech. Sci. , vol.15 , pp. 101-110
    • Wojciechowicz, W.1    Zych, J.2    Holubowicz, W.3
  • 92
    • 84896895465 scopus 로고    scopus 로고
    • Social Media for Crisis Management: Problems and Challenges from an IT-Perspective
    • 2012, Jindřichův Hradec, Czech Republic, 12-14 September
    • Kreiner, K.; Neubaur, G. Social Media for Crisis Management: Problems and Challenges from an IT-Perspective. In Proceedings of Interdisciplinary Information and Management Talks IDIMT 2012, Jindřichův Hradec, Czech Republic, 12-14 September 2012.
    • (2012) Proceedings of Interdisciplinary Information and Management Talks IDIMT
    • Kreiner, K.1    Neubaur, G.2
  • 94
    • 69949156439 scopus 로고    scopus 로고
    • Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer
    • Institute of Navigation, Savanna, GA, USA, 16-19 September
    • Humphreys, T.E.; Ledvina, B.M.; Psiaki, M.L.; O'Hanlon, B.W.; Kintner, P.M., Jr. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. In Proceedings of ION GNSS Conference, Institute of Navigation, Savanna, GA, USA, 16-19 September 2008.
    • (2008) Proceedings of ION GNSS Conference
    • Humphreys, T.E.1    Ledvina, B.M.2    Psiaki, M.L.3    O'Hanlon, B.W.4    Kintner, P.M.5
  • 98
    • 78249231217 scopus 로고    scopus 로고
    • Security vulnerabilities in wireless sensor networks: A survey
    • Kavitha, T.; Sridharan, D. Security vulnerabilities in wireless sensor networks: A survey. J. Inf. Assur. Secur. 2010, 5, 31-44.
    • (2010) J. Inf. Assur. Secur. , vol.5 , pp. 31-44
    • Kavitha, T.1    Sridharan, D.2
  • 99


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.