2023
DOI: 10.1145/3558001
|View full text |Cite
|
Sign up to set email alerts
|

A Review on C3I Systems’ Security: Vulnerabilities, Attacks, and Countermeasures

Abstract: Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in critical civil and military domains for achieving information superiority, operational efficacy, and greater situational awareness. The critical civil and military domains include, but are not limited to battlefield, healthcare, transportation, and rescue missions. Given the sensitive nature and modernization of tactical domains, the security of C3I systems has recently become a critical concern. This is because cyber-atta… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 112 publications
0
4
0
Order By: Relevance
“…This study utilizes a combination of literature analysis and expert consultations to develop the indicator system. It starts with searching for keywords like "vulnerability of intelligent weapon systems", "AI system vulnerability", "intelligent weapon system reliability", and "AI system safety" in major document databases to identify relevant documents [21][22][23][24][25][26][27][28]. An initial indicator system, formed through keyword mining and clustering analysis, is then refined by consulting experts.…”
Section: Assessment Indicator Systemmentioning
confidence: 99%
“…This study utilizes a combination of literature analysis and expert consultations to develop the indicator system. It starts with searching for keywords like "vulnerability of intelligent weapon systems", "AI system vulnerability", "intelligent weapon system reliability", and "AI system safety" in major document databases to identify relevant documents [21][22][23][24][25][26][27][28]. An initial indicator system, formed through keyword mining and clustering analysis, is then refined by consulting experts.…”
Section: Assessment Indicator Systemmentioning
confidence: 99%
“…The process of transmitting tactical data to another element and receiving tactical data from another element [2,51] 등 전투체계/무기체계와 연관된 요소를 분석한 연 구뿐만 아니라 [3][4][5][6][7][8]23,50] 함정 항해•운용을 위한 장비(GPS, AIS 등)가 전투체계와 직접 연동됨에 따라 발생할 수 있는 위협 [52][53][54] , 전투체계 전반 COTS(Commercial Of The Shelf) 구성품 사용에 따른 공급망 공격 가능성 [55][56][57][58][59][60] , 전투체계가 함정 전투를 위해 각종 시스템을 제 어하는 체계라는 관점에서 ICS 측면의 특성 [61,62] [16] . T31, T34, T38, T42, T44, T46, T48, T50, T52, T54, T57, T61, T64, T67, T70, T72, T73, T74, T76, T79, T84, T90, T95, T107, T113, T116, T120, T125, T128, T132, T147, T180, T181 OR 1.1.1.2 Flooding T31, T34, T38, T42, T44, T46, T48, T50, T52, T54, T57, T61, T64, T67, T70, T72, T73, T74, T76, T79, T84, T90, T95, T107, T113, T116, T120, T125, T128, T132, T147, T179, T180, T181, T184, T186, T192 OR 1.1.1.3 Land attack T31, T34, T38, T42, T44, T46, T48, T50, T52, T54, T57, T61, T64, T67, T70, T72, T73, T74, T76, T79, T84, T90, T95, T107, T113, T116, T120, T125, T128, T132, T147, T180, T181, T192 OR 1.1.1.4 Teardrop T31, T34, T38, T42, T44, T46, T48, T50, T52, T54, T57, T76, T79, T84, T90, T95, T107, T113, T116, T120, T125, T128, T132, T147, T180, T181, T192 Installing Spy Chips T5, T15, T21, T27, T56, T83, T89, T94, T106, T112, T131, T196, T197 OR 3.1.1.2 ARP Spoofing T1, T4, T10, T12, T14, T18, T20, T56, T81, T86, T91, T97, T103, T109, T117, T122, T129, T106, T112, T131, T194, T195, T196, T197 OR 3.1.1.3 ICMP Redirect T1, T4, T5, T12, T15, T18, T21, T27, T56, T81, T86, T91, T97, T83, T89, T94, T103, T109, T117, T122, T129, T106, T112, T131, T194, T195, T196, T197 OR 3.1.1.4 Switch jamming attack T5, T15, T21, T27, T81, T86, T91, T97, T103, T109, T117, T122, T129, T106, T112, T131, T194, T195, T196, T197 Omit 를 정의하고 있다 [67] .…”
Section: Sharing Tactical Datamentioning
confidence: 99%
“…System crashes, data damage, unauthorized access, and the installation of new malware are all possible consequences of malware. Maintaining the overall security and stability of computer systems and networks involves finding and eliminating PDF malware [10].…”
Section: Attacks Using Social Engineeringmentioning
confidence: 99%