Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review
<p>Phases conducted in this systematic literature review (SLR).</p> "> Figure 2
<p>Core smart city sectors.</p> "> Figure 3
<p>Primary studies selection process. IEEE—Institute of Electrical and Electronics Engineers; ACM—Association of Computing Machinery.</p> "> Figure 4
<p>Smart sectors addressed by the primary studies time series.</p> "> Figure 5
<p>Time series categorization of the threat layers addressed by the primary studies.</p> "> Figure 6
<p>Reference model layers categorisation of smart sectors addressed by the primary studies. In this graph, multiple sectors addressed in a single study are reported individually to preserve sector visibility.</p> "> Figure 7
<p>Time series categorisation of adversary type threat factor of smart sectors addressed by the primary studies.</p> "> Figure 8
<p>Adversary type threat factor categorisation of smart sectors addressed by the primary studies. In this graph, multiple sectors addressed in a single study are reported individually to preserve sector visibility.</p> "> Figure 9
<p>DFIR stages categorisation across smart sectors addressed by the primary studies. In this graph, multiple sectors addressed in a single study are reported individually to preserve sector visibility.</p> "> Figure 10
<p>DFIR stages addressed by the primary studies.</p> "> Figure 11
<p>Data source referenced by the primary studies.</p> "> Figure 12
<p>Smart sectors addressed by the primary studies.</p> "> Figure 13
<p>Comparison chart between empirical, non-empirical and survey studies. Non-empirical studies passed the systematic Phase0, Phase1 and Phase2 selection process’ stages. Survey-type studies were considered, based on the original search string, in Phase0 and Phase1 of the selection process.</p> "> Figure 14
<p>Geolocation by primary studies 2011-Q1/2019. (Microsoft product screenshot(s) reprinted with permission from Microsoft Corporation. <a href="https://www.microsoft.com/en-us/maps/product/print-rights" target="_blank">https://www.microsoft.com/en-us/maps/product/print-rights</a>).</p> "> Figure 15
<p>Continental distribution of primary studies.</p> ">
Abstract
:1. Introduction
2. Materials and Methods
2.1. Research Questions and Rationale
2.2. Primary Studies’ Data Sources and the Search Strategy
2.3. Selection Criteria
2.4. Selection Process
2.5. Quality Assessment
2.6. Validation Process
2.7. Data Extraction Strategy
3. Results Analysis and Discussion
3.1. Primary Studies
3.2. Keyword Analysis
3.3. Key Themes
3.3.1. Chronological Analysis of Key Events
3.3.2. Cyber Resilience Analysis
3.3.3. DFIR Analysis
3.3.4. Data Source Analysis
3.3.5. Analysis of Primary Studies Cross-Sector Proposals or Applications to Improve Digital Forensics
3.3.6. Typology Analysis
3.3.7. Geographic Analysis
4. Discussion
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Vogel-Heuser, B.; Hess, D. Guest Editorial Industry 4.0–Prerequisites and Visions. IEEE Trans. Autom. Sci. Eng. 2016, 13, 1–3. [Google Scholar] [CrossRef]
- Moustafa, N.; Adi, E.; Turnbull, B.; Hu, J. A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems. IEEE Access 2018, 6, 32910–32924. [Google Scholar] [CrossRef]
- Lom, M.; Pribyl, O.; Svitek, M. Industry 4.0 as a part of smart cities. In Proceedings of the 2016 Smart Cities Symposium Prague (SCSP), Prague, Czech Republic, 26–27 May 2016; pp. 1–6. [Google Scholar] [CrossRef]
- Postránecký, M.; Svítek, M. Smart city near to 4.0—An adoption of industry 4.0 conceptual model. In Proceedings of the 2017 Smart City Symposium Prague (SCSP), Prague, Czech Republic, 25–26 May 2017; pp. 1–5. [Google Scholar] [CrossRef]
- HM Government. National Cyber Security Strategy 2016–2021. 2016. Available online: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/national_cyber_security_strategy_2016.pdf (accessed on 15 October 2017).
- Nam, T.; Pardo, T.A. Conceptualizing smart city with dimensions of technology, people, and institutions. In Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times, College Park, MA, USA, 12–15 June 2011. [Google Scholar]
- Parliament, E. Mapping Smart Cities in the EU. 2014. Available online: http://www.europarl.europa.eu/RegData/etudes/etudes/join/2014/507480/IPOL-ITRE_ET%282014%29507480_EN.pdf (accessed on 26 April 2019).
- Albino, V.; Berardi, U.; Dangelico, R.M. Smart Cities: Definitions, Dimensions, Performance, and Initiatives. J. Urban Technol. 2015, 22, 3–21. [Google Scholar] [CrossRef]
- Harrison, C.; Eckman, B.; Hamilton, R.; Hartswick, P.; Kalagnanam, J.; Paraszczak, J.; Williams, P. Foundations for Smarter Cities. IBM J. Res. Dev. 2010, 54, 1–16. [Google Scholar] [CrossRef]
- Caragliu, A.; Del Bo, C.F.M.; Nijkamp, P. Smart Cities in Europe. J. Urban Technol. 2011, 18, 65–82. [Google Scholar] [CrossRef]
- Lazaroiu, G.C.; Roscia, M. Definition methodology for the smart cities model. Energy 2012, 47, 326–332. [Google Scholar] [CrossRef]
- Barrionuevo, J.M.; Berrone, P.; Costa, J.E.R. Smart Cities, Sustainable Progress: Opportunities for Urban Development. IESE Insight 2012, 50–57. [Google Scholar] [CrossRef]
- Belgaum, M.; Alansari, Z.; Jain, R.; Alshaer, J. A Framework for Evaluation of Cyber Security Challenges in Smart Cities. In Proceedings of the Smart Cities Symposium, Bahrain, 22–23 April 2018; Volume 4, p. 6. [Google Scholar] [CrossRef]
- Elmaghraby, A.S.; Losavio, M.M. Cyber security challenges in Smart Cities: Safety, security and privacy. J. Adv. Res. 2014, 5, 491–497. [Google Scholar] [CrossRef] [Green Version]
- Baig, Z.A.; Szewczyk, P.; Valli, C.; Rabadia, P.; Hannay, P.; Chernyshev, M.; Johnstone, M.; Kerai, P.; Ibrahim, A.; Sansurooah, K.; et al. Future challenges for smart cities: Cyber-security and digital forensics. Digit. Investig. 2017, 22, 3–13. [Google Scholar] [CrossRef]
- Vattapparamban, E.; Guvenc, I.; Yurekli, A.I.; Akkaya, K.; Uluagac, S. Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), Paphos, Cyprus, 5–9 September 2016; pp. 216–221. [Google Scholar]
- Bajramovic, E.; Waedt, K.; Ciriello, A.; Gupta, D. Forensic readiness of smart buildings: Preconditions for subsequent cybersecurity tests. In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2), Trento, Italy, 12–15 September 2015; pp. 1–6. [Google Scholar]
- Hollands, R.G. Will the real smart city please stand up? City 2008, 12, 303–320. [Google Scholar] [CrossRef]
- Cocchia, A. Smart and Digital City: A Systematic Literature Review; Smart City: How to Create Public and Economic Value with High Technology in Urban Space; Dameri, R.P., Rosenthal-Sabroux, C., Eds.; Springer International Publishing: Cham, Switzerland, 2014; pp. 13–43. [Google Scholar]
- Oliveira, Á.; Campolargo, M. From Smart Cities to Human Smart Cities. In Proceedings of the 2015 48th Hawaii International Conference on System Sciences, Kauai, HI, USA, 5–8 January 2015; pp. 2336–2344. [Google Scholar]
- Boyes, H.; Watson, T.; Norris, P.; Isbell, R. Enabling intelligent cities through cyber security of building information and building systems. In Proceedings of the IET Conference on Future Intelligent Cities, London, UK, 4–5 December 2014; pp. 1–6. [Google Scholar]
- Negri, E.; Fumagalli, L.; Macchi, M. A Review of the Roles of Digital Twin in CPS-based Production Systems. Procedia Manuf. 2017, 11, 939–948. [Google Scholar] [CrossRef]
- Desmit, Z.; Elhabashy, A.E.; Wells, L.J.; Camelio, J.A. An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems. J. Manuf. Syst. 2017, 43, 339–351. [Google Scholar] [CrossRef]
- Ahmadi-Assalemi, G.; Al-Khateeb, H.M.; Epiphaniou, G.; Cosson, J.; Jahankhani, H.; Pillai, P. Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace. In Proceedings of the 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), London, UK, 16–18 January 2019; pp. 1–9. [Google Scholar]
- Hsu, D.F.; Marinucci, D. Advances in Cyber Security: Technology, Operations, and Experiences; Oxford University Press: Oxford, UK, 2012. [Google Scholar]
- ENISA. ENISA Threat Landscape Report 2018, 15 Top Cyberthreats and Trends. 2019. Available online: https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2018 (accessed on 20 October 2019).
- Tankard, C. Advanced Persistent threats and how to monitor and deter them. Netw. Secur. 2011, 16–19. [Google Scholar] [CrossRef]
- Skopik, F.; Settanni, G.; Fiedler, R. A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Comput. Secur. 2016, 60, 154–176. [Google Scholar] [CrossRef]
- Verizon. Data Breach Digest. 2016. Available online: https://enterprise.verizon.com/resources/reports/2016/data-breach-digest.pdf (accessed on 2 November 2019).
- Verizon. 2016 Data Breach Investigations Report. 2016. Available online: https://regmedia.co.uk/2016/05/12/dbir_2016.pdf (accessed on 2 November 2019).
- Hutchins, E.M.; Cloppert, M.J.; Amin, R.M. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. In Leading Issues in Information Warfare & Security Research; Academic Publishing International Ltd.: Reading, UK, 2011; Volume 1, p. 80. [Google Scholar]
- Europol: Internet Organised Crime Threat Assessment (IOCTA). 2019. Available online: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2019 (accessed on 22 October 2019).
- Wang, Y.; Yan, G. A new model approach of electrical cyber physical systems considering cyber security. IEEJ Trans. Electr. Electron. Eng. 2018, 14, 201–213. [Google Scholar] [CrossRef]
- Langner, R. Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Secur. Priv. Mag. 2011, 9, 49–51. [Google Scholar] [CrossRef]
- Case, D.U. Analysis of the Cyber Attack on the Ukrainian Power Grid; Electricity Information Sharing and Analysis Center (E-ISAC): New York, NY, USA, 2016. [Google Scholar]
- Bryant, N.; Spencer, N.; King, A.; Crooks, P.; Deakin, J.; Young, S. IoT and smart city services to support independence and wellbeing of older people. In Proceedings of the 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 21–23 September 2017; pp. 1–6. [Google Scholar]
- Do, Q.; Martini, B.; Choo, K.-K.R. Cyber-physical systems information gathering: A smart home case study. Comput. Netw. 2018, 138, 1–12. [Google Scholar] [CrossRef]
- Jia, X.; Li, X.; Gao, Y. A Novel Semi-Automatic Vulnerability Detection System for Smart Home. In Proceedings of the International Conference on Big Data and Internet of Thing, London, UK, 20–22 December 2017; pp. 195–199. [Google Scholar]
- Comert, G.; Pollard, J.; Nicol, D.M.; Palani, K.; Vignesh, B. Modeling Cyber Attacks at Intelligent Traffic Signals. Transp. Res. Rec. J. Transp. Res. Board 2018, 2672, 76–89. [Google Scholar] [CrossRef] [Green Version]
- Ganin, A.A.; Mersky, A.C.; Jin, A.S.; Kitsak, M.; Keisler, J.M.; Linkov, I. Resilience in Intelligent Transportation Systems (ITS). Transp. Res. Part C Emerg. Technol. 2019, 100, 318–329. [Google Scholar] [CrossRef]
- Holland, K. Update on SFMTA Ransomware Attack. 2016. Available online: https://www.sfmta.com/blog/update-sfmta-ransomware-attack (accessed on 1 November 2019).
- National Cyber Security Centre. The Cyber Threat to UK Business; National Crime Agency, Ed.; UK Government: London, UK, 2018; p. 28.
- Sterbenz, J.P.G.; Hutchison, D.; Çetinkaya, E.K.; Jabbar, A.; Rohrer, J.P.; Schöller, M.; Smith, P. Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Comput. Netw. 2010, 54, 1245–1265. [Google Scholar] [CrossRef]
- Al-Khateeb, H.; Epiphaniou, G.; Daly, H. Blockchain for Modern Digital Forensics: The Chain-of-Custody as a Distributed Ledger. Phys. Autom. Target Recognit. 2019, 149–168. [Google Scholar] [CrossRef]
- NIST. Cybersecurity Framework; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2018; p. 55.
- Griffor, E.R.; Greer, C.; Wollman, A.D.; Burns, M.J. Framework for cyber-physical systems: Volume 1, Overview. Natl. Inst. Stand. Technol. 2017, 1. [Google Scholar] [CrossRef]
- Pacheco, J.; Hariri, S. IoT Security Framework for Smart Cyber Infrastructures; IEEE: New York, NY, USA, 2016; pp. 242–247. [Google Scholar] [CrossRef]
- Pacheco, J.; Satam, S.; Hariri, S.; Grijalva, C.; Berkenbrock, H. IoT Security Development Framework for building trustworthy Smart car services. In Proceedings of the 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, USA, 28–30 September 2016; pp. 237–242. [Google Scholar] [CrossRef]
- Rahman, A.; Rashid, M.; Hossain, M.S.; Hassanain, E.; Alhamid, M.F.; Guizani, M. Blockchain and IoT-Based Cognitive Edge Framework for Sharing Economy Services in a Smart City. IEEE Access 2019, 7, 18611–18621. [Google Scholar] [CrossRef]
- Lee, J.; Bagheri, B.; Kao, H.-A. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems. Manuf. Lett. 2015, 3, 18–23. [Google Scholar] [CrossRef]
- Shrivastava, S.; Adepu, S.; Mathur, A. Design and assessment of an Orthogonal Defense Mechanism for a water treatment facility. Robot. Auton. Syst. 2018, 101, 114–125. [Google Scholar] [CrossRef]
- Erdene-Ochir, O.; Abdallah, M.; Qaraqe, K.; Minier, M.; Valois, F. Routing resilience evaluation for smart metering: Definition, metric and techniques. In Proceedings of the 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC), Washington, DC, USA, 2–5 September 2014. [Google Scholar]
- Farley, T.R.; Colbourn, C.J. Multiterminal resilience for series-parallel networks. Networks 2007, 50, 164–172. [Google Scholar] [CrossRef]
- Cholda, P.; Mykkeltveit, A.; Helvik, B.E.; Wittner, O.J.; Jajszczyk, A. A survey of resilience differentiation frameworks in communication networks. IEEE Commun. Surv. Tutor. 2007, 9, 32–55. [Google Scholar] [CrossRef]
- Leszczyna, R. A review of standards with cybersecurity requirements for smart grid. Comput. Secur. 2018, 77, 262–276. [Google Scholar] [CrossRef]
- Lezzi, M.; Lazoi, M.; Corallo, A. Cybersecurity for Industry 4.0 in the current literature: A reference framework. Comput. Ind. 2018, 103, 97–110. [Google Scholar] [CrossRef]
- Daneva, M.; Lazarov, B. (Eds.) Requirements for smart cities: Results from a systematic review of literature. In Proceedings of the 2018 12th International Conference on Research Challenges in Information Science (RCIS), Nantes, France, 29–31 May 2018. [Google Scholar]
- Sterbenz, J.P. Smart City and IoT Resilience, Survivability, and Disruption Tolerance: Challenges, Modelling, and a Survey of Research Opportunities. 2017. Available online: https://doi.org/10.1109/RCIS.2018.8406655 (accessed on 7 December 2019).
- McKee, D.; Clement, S.J.; Almutairi, J.; Xu, J. Survey of advances and challenges in intelligent autonomy for distributed cyber-physical systems. CAAI Trans. Intell. Technol. 2018, 3, 75–82. [Google Scholar] [CrossRef]
- Yu, W.; Liang, F.; He, X.; Hatcher, W.G.; Lu, C.; Lin, J.; Yang, X. A Survey on the Edge Computing for the Internet of Things. IEEE Access 2018, 6, 6900–6919. [Google Scholar] [CrossRef]
- Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
- Kitchenham, B.A.; Charter, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering 2.3. Available online: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.154.1446&rep=rep1&type=pdf (accessed on 22 January 2019).
- Cheh, C.; Keefe, K.; Feddersen, B.; Chen, B.; Temple, W.G.; Sanders, W.H. Developing Models for Physical Attacks in Cyber-Physical Systems. In Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, 3 November 2017; pp. 49–55. [Google Scholar]
- Lin, Q.; Adepu, S.; Verwer, S.; Mathur, A. TABOR. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Incheon, Korea, 4–8 June 2018; pp. 525–536. [Google Scholar]
- Li, F.; Shi, Y.; Shinde, A.; Ye, J.; Song, W.Z. Enhanced Cyber-Physical Security in Internet of Things through Energy Auditing. IEEE Internet Things J. 2019, 6, 5224–5231. [Google Scholar] [CrossRef]
- Oriwoh, E.; Jazani, D.; Epiphaniou, G.; Sant, P. Internet of Things Forensics: Challenges and Approaches. In Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, 20–23 October 2013. [Google Scholar]
- Feng, X.; Dawam, E.S.; Amin, S. A New Digital Forensics Model of Smart City Automated Vehicles. In Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 21–23 June 2017. [Google Scholar]
- Clarke, A.C.; Crane, A. Cross-Sector Partnerships for Systemic Change: Systematized Literature Review and Agenda for Further Research. J. Bus. Ethic 2018, 150, 303–313. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Wohlin, C. Guidelines for snowballing in systematic literature studies and a replication in software engineering. In Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, London, UK, 13–14 May 2014; pp. 1–10. [Google Scholar]
- Li, Z.; Shahidehpour, M. Deployment of cybersecurity for managing traffic efficiency and safety in smart cities. Electr. J. 2017, 30, 52–61. [Google Scholar] [CrossRef]
- Sani, A.S.; Yuan, D.; Jin, J.; Gao, L.; Yu, S.; Dong, Z.Y. Cyber security framework for Internet of Things-based Energy Internet. Futur. Gener. Comput. Syst. 2019, 93, 849–859. [Google Scholar] [CrossRef]
- Salimitari, M.; Bhattacharjee, S.; Chatterjee, M. Prospect Theoretic Approach for Data Integrity in IoT Networks under Manipulation Attacks. arXiv 2018, arXiv:1809.07928. [Google Scholar]
- Arnautovic, E. Consolidated State-of-the-Art Report, Computer Networks. 2010. Available online: https://iot4cps.at/wp-content/uploads/2019/03/IoT4CPS_D2.1_V1.2b.pdf (accessed on 26 April 2019).
- Schmittner, C.; Ratasich, D.; Matschnig, M. Design & Methods Concept Transactions on Emerging Telecommunications Technologies. 2018. Available online: https://iot4cps.at/wp-content/uploads/2019/03/IoT4CPS_D3.1_V1.0.pdf (accessed on 26 April 2019).
- Xia, Z.Q.; Jiang, L.L.; Xu, M. Electric power CPS attack prediction method based on path analysis. J. Tsinghua Univ. Nat. Sci. Ed. 2018, 58, 157–163. [Google Scholar]
- Pullen, D.; Anagnostopoulos, N.A.; Arul, T.; Katzenbeisser, S. Poster: Hierarchical Integrity Checking in Heterogeneous Vehicular Networks. In Proceedings of the 2018 IEEE Vehicular Networking Conference (VNC), Taipei, Taiwan, 5–7 December 2018. [Google Scholar] [CrossRef]
- Albela, M.S.; Fraga-Lamas, P.; Fernández-Caramés, T.M. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices. Sensors 2018, 18, 3868. [Google Scholar] [CrossRef] [Green Version]
- Clincy, V.; Shahriar, H. Detection of Anomaly in Firewall Rule-Sets. Adv. Intell. Syst. Comput. 2018, 422–431. [Google Scholar] [CrossRef]
- Singh, S.P.; Nayyar, A.; Kumar, R.; Sharma, A. Fog computing: From architecture to edge computing and big data processing. J. Supercomput. 2018, 75, 2070–2105. [Google Scholar] [CrossRef]
- Hosseini, S.; Turhan, B.; Gunarathna, D. A Systematic Literature Review and Meta-Analysis on Cross Project Defect Prediction. IEEE Trans. Softw. Eng. 2017, 45, 111–147. [Google Scholar] [CrossRef] [Green Version]
- Hall, T.; Beecham, S.; Bowes, D.; Gray, D.; Counsell, S. A Systematic Literature Review on Fault Prediction Performance in Software Engineering. IEEE Trans. Softw. Eng. 2011, 38, 1276–1304. [Google Scholar] [CrossRef]
- Pfeiffer, S. The Vision of “Industrie 4.0” in the Making—A Case of Future Told, Tamed, and Traded. NanoEthics 2017, 11, 107–121. [Google Scholar] [CrossRef] [Green Version]
- Elliott, L.; Kollewe, J. Germany’s Smaller Firms Emerge Intact from the Recession, Theguardian. 2011. Available online: https://www.theguardian.com/world/2011/mar/15/new-europe-germany-manufacturing (accessed on 4 July 2019).
- Hancké, B.; Coulter, S. The German manufacturing sector unpacked: Institutions, policies and future trajectories, London School of Economics and Political Science, Foresight, Government Office for Science. 2013. Available online: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/283889/ep13-german-manufacturing.pdf (accessed on 4 July 2019).
- Infrastructure and Projects Authority. National Infrastructure Delivery Plan 2016–2021; HM Treasury and Cabinet Office: London, UK, 2016; p. 113.
- The White House. Fact Sheet: Cybersecurity National Action Plan. 2016. Available online: https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan (accessed on 3 July 2019).
- World Econnomic Forum. World Economic Forum Annual Meeting 2016 Mastering the Fourth Industrial Revolution, REF 300116, Davos-Klosters. 2016. Available online: http://www3.weforum.org/docs/WEF_AM16_Report.pdf (accessed on 3 July 2019).
- Australian Cyber Security Growth Network. Australia’s Cyber Security Sector Competitiveness Plan; Australian Government Department for Industry: Canberra, Australia, 2018; p. 136. Available online: https://www.austcyber.com/file-download/download/public/415 (accessed on 6 July 2019).
- House of Lords House of Commons Joint Committee on the National Security Strategy. Cyber Security of the UK’s Critical National Infrastructure; UK Government: London, UK, 2018; p. 64. Available online: https://publications.parliament.uk/pa/jt201719/jtselect/jtnatsec/1708/1708.pdf (accessed on 6 July 2019).
- Buhr, D.; Stehnken, T. Industry 4.0 and European Innovation Policy: Big Plans, Small Steps; The Friedrich-Ebert-Stiftung-Economic and Social Policy Department: Berlin, Germany, 2018. [Google Scholar]
- Maresova, P.; Soukal, I.; Svobodová, L.; Hedvicakova, M.; Javanmardi, E.; Selamat, A.; Krejcar, O. Consequences of Industry 4.0 in Business and Economics. Economies 2018, 6, 46. [Google Scholar] [CrossRef] [Green Version]
- Friedberg, I.; McLaughlin, K.; Smith, P.; Wurzenberger, M. Towards a Resilience Metric Framework for Cyber-Physical Systems. In Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, Belfast, UK, 23–25 August 2016. [Google Scholar] [CrossRef]
- Arghandeh, R.; Von Meier, A.; Mehrmanesh, L.; Mili, L. On the definition of cyber-physical resilience in power systems. Renew. Sustain. Energy Rev. 2016, 58, 1060–1069. [Google Scholar] [CrossRef] [Green Version]
- Kissel, R. Glossary of Key Information Security Terms; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2013; p. 222. [CrossRef]
- Linkov, I.; Eisenberg, D.A.; Plourde, K.; Seager, T.; Allen, J.; Kott, A. Resilience metrics for cyber systems. Environ. Syst. Decis. 2013, 33, 471–476. [Google Scholar] [CrossRef]
- Watson, J.-P.; Guttromson, R.; Silva-Monroy, C.; Jeffers, R.; Jones, K.; Ellison, J.; Rath, C.; Gearhart, J.; Jones, D.; Corbet, T.; et al. Conceptual Framework for Developing Resilience Metrics for the Electricity, Oil, and Gas Sectors in the United States. Concept. Framew. Dev. Resil. Metr. Electr. Oil Gas Sect. United States 2014. [Google Scholar] [CrossRef]
- Internet Engineering Task Force. Requirements for Internet Hosts-Communication Layers; IETF: Fremont, CA, USA, 1989; p. 116. Available online: https://history-computer.com/Library/rfc1122.pdf (accessed on 20 September 2019).
- National Institute of Standards and Technology NIST. Computer Security Incident Handling Guide; NIST: Gaithersburg, MD, USA, 2004; p. 148. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf (accessed on 28 August 2019).
- Siboni, S.; Sachidananda, V.; Meidan, Y.; Bohadana, M.; Mathov, Y.; Bhairav, S.; Shabtai, A.; Elovici, Y. Security Testbed for Internet-of-Things Devices. IEEE Trans. Reliab. 2018, 68, 23–44. [Google Scholar] [CrossRef]
- Ratasich, D.; Khalid, F.; Geissler, F.; Grosu, R.; Shafique, M.; Bartocci, E. A Roadmap toward the Resilient Internet of Things for Cyber-Physical Systems. IEEE Access 2019, 7, 13260–13283. [Google Scholar] [CrossRef]
- Mohandes, B.; Al Hammadi, R.; Sanusi, W.; Mezher, T.; El Khatib, S. Advancing cyber–physical sustainability through integrated analysis of smart power systems: A case study on electric vehicles. Int. J. Crit. Infrastruct. Prot. 2018, 23, 33–48. [Google Scholar] [CrossRef]
- Cárdenas, A.A.; Amin, S.; Lin, Z.-S.; Huang, Y.-L.; Sastry, S. Attacks against process control systems. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, 22–24 March 2011; p. 355. [Google Scholar]
- Marrone, S.; Rodriguez, R.J.; Nardone, R.; Flammini, F.; Vittorini, V. On synergies of cyber and physical security modelling in vulnerability assessment of railway systems. Comput. Electr. Eng. 2015, 47, 275–285. [Google Scholar] [CrossRef] [Green Version]
- Pacheco, J.; Ibarra, D.; Vijay, A.; Hariri, S. IoT Security Framework for Smart Water System. In Proceedings of the 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Hammamet, Tunisia, 30 Octorber–3 November 2017. [Google Scholar]
- Lakshminarayana, S.; Teng, T.Z.; Tan, R.; Yau, D.K.Y. Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems. ACM Trans. Cyber-Phys. Syst. 2018, 2, 1–29. [Google Scholar] [CrossRef] [Green Version]
- Bathelt, A.; Ricker, N.L.; Jelali, M. Revision of the tennessee eastman process model. IFAC-PapersOnLine 2015, 48, 309–314. [Google Scholar] [CrossRef]
- Pacheco, J.; Hariri, S. IoT Security Framework for Smart Cyber Infrastructures. In Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W), Augsburg, Germany, 12–16 September 2016. [Google Scholar]
- Orozco, Á.; Pacheco, J.; Hariri, S. Anomaly behavior analysis for smart grid automation system. In Proceedings of the 2017 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC), Ixtapa, Mexico, 8–10 November 2017. [Google Scholar]
- Ahmed, C.M.; Zhou, J.; Mathur, A.P. Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS. In Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, PR, USA, 9–13 December 2018. [Google Scholar]
- Ramotsoela, D.T.; Hancke, G.P.; Abu-Mahfouz, A.M. Attack detection in water distribution systems using machine learning. Hum. Cent. Comput. Inf. Sci. 2019, 9, 13. [Google Scholar] [CrossRef]
- Liu, X.; Zhang, J.; Zhu, P. Dependence analysis based cyber-physical security assessment for critical infrastructure networks. In Proceedings of the 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 13–15 October 2016; pp. 1–7. [Google Scholar]
- Abeykoon, I.; Feng, X. A Forensic Investigation of the Robot Operating System. In Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 21–23 June 2017; pp. 851–857. [Google Scholar] [CrossRef]
- Palleti, V.R.; Tan, Y.C.; Samavedham, L. A mechanistic fault detection and isolation approach using Kalman filter to improve the security of cyber physical systems. J. Process. Control. 2018, 68, 160–170. [Google Scholar] [CrossRef]
- Tundis, A.; Egert, R.; Mühlhäuser, M. Attack Scenario Modeling for Smart Grids Assessment through Simulation. In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 29 August–1 September 2017; p. 13. [Google Scholar]
- Aloqaily, M.; Otoum, S.; Al Ridhawi, I.; Jararweh, Y. An intrusion detection system for connected vehicles in smart cities. Ad. Hoc. Netw. 2019, 90, 101842. [Google Scholar] [CrossRef]
- Elsaeidy, A.; Munasinghe, K.S.; Sharma, D.; Jamalipour, A. Intrusion detection in smart cities using Restricted Boltzmann Machines. J. Netw. Comput. Appl. 2019, 135, 76–83. [Google Scholar] [CrossRef]
- Firoozi, F.; Zadorozhny, V.I.; Li, F.Y. Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks. IEEE Sens. J. 2018, 18, 6446–6460. [Google Scholar] [CrossRef]
- Sugumar, G.; Mathur, A. Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems. In Proceedings of the 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Prague, Czech Republic, 25–29 July 2017. [Google Scholar]
- Ahmed, C.M.; Ochoa, M.; Zhou, J.; Mathur, A.P.; Qadeer, R.; Murguia, C.; Ruths, J. NoisePrint. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Incheon, Korea, 4–8 June 2018; pp. 483–497. [Google Scholar]
- Elsaeidy, A.; Elgendi, I.; Munasinghe, K.S.; Sharma, D.; Jamalipour, A. A smart city cyber security platform for narrowband networks. In Proceedings of the 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, Australia, 22–24 November 2017; pp. 1–6. [Google Scholar]
- Liu, J.; Zhang, C.; Fang, Y. EPIC: A Differential Privacy Framework to Defend Smart Homes against Internet Traffic Analysis. IEEE Internet Things J. 2018, 5, 1206–1217. [Google Scholar] [CrossRef]
- Garg, S.; Singh, A.; Batra, S.; Kumar, N.; Yang, L.T. UAV-Empowered Edge Computing Environment for Cyber-Threat Detection in Smart Vehicles. IEEE Netw. 2018, 32, 42–51. [Google Scholar] [CrossRef]
- Pacheco, J.; Zhu, X.; Badr, Y.; Hariri, S. Enabling Risk Management for Smart Infrastructures with an Anomaly Behavior Analysis Intrusion Detection System. In Proceedings of the 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W), Tucson, AZ, USA, 18–22 September 2017. [Google Scholar]
- Zhu, X.; Badr, Y.; Pacheco, J.; Hariri, S. Autonomic Identity Framework for the Internet of Things. In Proceedings of the 2017 International Conference on Cloud and Autonomic Computing (ICCAC), Tucson, AZ, USA, 18–22 September 2017. [Google Scholar]
- Shaikh, F.; Bou-Harb, E.; Crichigno, J.; Ghani, N. A Machine Learning Model for Classifying Unsolicited IoT Devices by Observing Network Telescopes. In Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018. [Google Scholar]
- Mozzaquatro, B.A.; Agostinho, C.; Goncalves, D.; Martins, J.F.; Jardim-Goncalves, R. An Ontology-Based Cybersecurity Framework for the Internet of Things. Sensors 2018, 18, 3053. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Hamza, A.; Ranathunga, D.; Gharakheili, H.H.; Roughan, M.; Sivaraman, V. Clear as MUD. In Proceedings of the 2018 Workshop on IoT Security and Privacy, Budapest, Hungary, 20 August 2018; pp. 8–14. [Google Scholar]
- Khan, Z.A. Using energy-efficient trust management to protect IoT networks for smart cities. Sustain. Cities Soc. 2018, 40, 1–15. [Google Scholar] [CrossRef]
- Anthi, E.; Ahmad, S.; Rana, O.; Theodorakopoulos, G.; Burnap, P. EclipseIoT: A secure and adaptive hub for the Internet of Things. Comput. Secur. 2018, 78, 477–490. [Google Scholar] [CrossRef]
- Gupta, M.; Benson, J.; Patwa, F.; Sandhu, R. Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars. In Proceedings of the 9th ACM Conference on Data and Application Security and Privacy, Richardson, TX, USA, 25–27 March 2019; pp. 61–72. [Google Scholar]
- Adepu, S.; Mathur, A. Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, Xi’an, China, 30 May–3 June 2016; pp. 449–460. [Google Scholar]
- Garg, S.; Singh, A.; Kaur, K.; Aujla, G.S.; Batra, S.; Kumar, N.; Obaidat, M.S. Edge Computing-Based Security Framework for Big Data Analytics in VANETs. IEEE Netw. 2019, 33, 72–81. [Google Scholar] [CrossRef]
- Vegh, L. Cyber-physical systems security through multi-factor authentication and data analytics. In Proceedings of the 2018 IEEE International Conference on Industrial Technology (ICIT), Lyon, France, 20–22 February 2018; pp. 1369–1374. [Google Scholar]
- Alansari, Z.; Anuar, N.B.; Kamsin, A.; Belgaum, M.R.; Alshaer, J.; Soomro, S.; Miraz, M.H. Internet of Things: Infrastructure, Architecture, Security and Privacy. In Proceedings of the 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), Southend, UK, 16–17 August 2018; pp. 150–155. [Google Scholar] [CrossRef] [Green Version]
- Seymer, P.; Wijesekera, D. In-Flight Aircraft Smart Space Security using Multi-Entity Trust Evaluations. In Proceedings of the 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC), London, UK, 10 December 2018. [Google Scholar]
- Ralston, P.A.; Graham, J.H.; Hieb, J.L. Cyber security risk assessment for SCADA and DCS networks. ISA Trans. 2007, 46, 583–594. [Google Scholar] [CrossRef]
- Kang, E.; Adepu, S.; Jackson, D.; Mathur, A.P. Model-based security analysis of a water treatment system. In Proceedings of the International Workshop on Software Engineering for Smart Cyber-Physical Systems, Austin, TX, USA, 16 May 2016; pp. 22–28. [Google Scholar]
- Navarro-Ortiz, J.; Sendra, S.; Ameigeiras, P.; Lopez-Soler, J.M. Integration of LoRaWAN and 4G/5G for the Industrial Internet of Things. IEEE Commun. Mag. 2018, 56, 60–67. [Google Scholar] [CrossRef]
- Pollitt, M. A History of Digital Forensics. In Advances in Digital Forensics VI; Chow, K.P., Shenoi, S., Eds.; IFIP Advances in Information and Communication Technology; Springer: Berlin/Heidelberg, Germany, 2010; Volume 337. [Google Scholar] [CrossRef] [Green Version]
- Reith, M.; Carr, C.; Gunsch, G. An examination of digital forensic models. Int. J. Digit. Evid. 2002, 1, 1–12. Available online: https://pdfs.semanticscholar.org/c73f/47d8385f452dfd25bbaab754874b65594ccd.pdf (accessed on 15 August 2019).
- Agarwal, A.; Gupta, M.; Gupta, S.; Gupta, S.C. Systematic digital forensic investigation model. Int. J. Comput. Sci. Secur. 2011, 5, 118–131. [Google Scholar]
- Qadeer, R.; Murguia, C.; Ahmed, C.M.; Ruths, J. Multistage Downstream Attack Detection in a Cyber Physical System. Comput. Vis. 2017, 177–185. [Google Scholar] [CrossRef] [Green Version]
- National Institute of Standards and Technology (NIST). NIST Special Publocation 800-183 Nentworks of ‘Things’; Department of Commerce: New York, NY, USA, 2016.
- Friedman, J.; Bouchard, M. Definitive Guide to Cyber Threat Intelligence: Using Knowledge about Adversaries to Win the War against Targeted Attacks; CyberEdge Group: Annapolis, MD, USA, 2015. [Google Scholar]
- Paolini, P.; Blas, N.D.; Copelli, S.; Mercalli, F. City4Age: Smart cities for health prevention. In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2), Trento, Italy, 12–15 September 2016; pp. 1–4. [Google Scholar] [CrossRef]
- Boddington, R. Practical Digital Forensics; Packt Publishing Ltd.: London, UK, 2016. [Google Scholar]
- Ahmadi-Assalemi, G.; Al-Khateeb, H.; Maple, C.; Epiphaniou, G.; Alhaboby, Z.A.; Alkaabi, S.; Alhaboby, D. Digital Twins for Precision Healthcare. In Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity; Springer Nature Switzerland AG: Cham, Switzerland, 2020; pp. 133–158. [Google Scholar]
- Rahman, A.; Hassanain, E.; Hossain, M.S. Towards a Secure Mobile Edge Computing Framework for Hajj. IEEE Access 2017, 5, 11768–11781. [Google Scholar] [CrossRef]
- Mackintosh, M.; Epiphaniou, G.; Al-Khateeb, H.; Burnham, K.; Pillai, P.; Hammoudeh, M. Preliminaries of Orthogonal Layered Defence using Functional and Assurance Controls in Industrial Control Systems. J. Sens. Actuator Netw. 2019, 8, 14. [Google Scholar] [CrossRef] [Green Version]
- Cam-Winget, N.; Sadeghi, A.-R.; Jin, Y. Can IoT be secured: Emerging challenges in connecting the unconnected. In Proceedings of the 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC), Austin, TX, USA, 5–9 June 2016; pp. 1–6. [Google Scholar] [CrossRef]
- Al-Khateeb, H.; Epiphaniou, G.; Reviczky, A.; Karadimas, P.; Heidari, H. Proactive Threat Detection for Connected Cars Using Recursive Bayesian Estimation. IEEE Sens. J. 2017, 18, 4822–4831. [Google Scholar] [CrossRef] [Green Version]
- Kwak, B.I.; Woo, J.; Kim, H.K. Know your master: Driver profiling-based anti-theft method. In Proceedings of the 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12–14 December 2016. [Google Scholar]
- ACPO Good PRactice Guide for Digital Evidence; Association of Chief Police Officers: London, UK, 2012; p. 43.
- Best Practice for Seizing Electronic Evidence v4.2; US Department of Homeland Security: Washington, DC, USA, 2018; p. 27.
- Montasari, R.; Hill, R.; Carpenter, V.; Hosseinian-Far, A. The Standardised Digital Forensic Investigation Process Model (SDFIPM). In Blockchain and Clinical Trial: Securing Patient Data; Jahankhani, H., Kendzierskyj, S., Jamal, A., Epiphaniou, G., Al-Khateeb, H., Eds.; Springer Nature Switzerland AG: Cham, Switzerland, 2019; pp. 169–209. [Google Scholar]
- Miller, C.; Valasek, C. Remote Exploitation of an Unaltered Passenger Vehicle. 2015. Available online: https://ericberthomier.fr/IMG/pdf/remote_car_hacking.pdf (accessed on 4 May 2019).
PICOC Criteria | Criteria Description |
---|---|
Population | Frameworks addressing smart cities |
Intervention | Digital forensic incident response (DFIR) frameworks that support cyber resilience |
Comparison | Frameworks addressing cyber resilience |
Outcomes | Scope, technique, security application and sector of the studies analysed |
Context | Academic research |
Inclusion Criteria (IC) | Exclusion Criteria (EC) |
---|---|
IC1: Must be a peer-reviewed, English language primary study. | EC1: Duplicate studies. |
IC2: Must contain cyber–physical system (CPS)-specific information related to cyber resilience, modern DFIR or frameworks. | EC2: Study is not a framework that supports cyber resilience or DFIR. |
IC3: Must include empirical evidence related to the cyber resilience security application and use of CPSs. |
Year | 11 | 14 | 15 | 16 | 17 | 18 | Q1/19 | Total Studies |
---|---|---|---|---|---|---|---|---|
%/year | 2% | 2% | 2% | 10% | 23% | 40% | 21% | 52 |
J | 1 | 13 | 10 | 24 | ||||
C | 1 | 1 | 5 | 12 | 8 | 1 | 28 |
Keyword | Occurrence | In Studies |
---|---|---|
Attacks | 4165 | 50 |
System(s) | 3650 | 52 |
Security | 2272 | 51 |
Internet of Things/IoT | 2024 | 36 |
Model(s)(ing) | 2002 | 52 |
Cyber-Physical Systems | 1857 | 52 |
Smart | 1750 | 52 |
Device(s) | 1610 | 50 |
Detection | 1193 | 47 |
Approach(es) | 589 | 50 |
Method(s) | 579 | 49 |
Analysis | 579 | 52 |
Framework(s) | 491 | 44 |
Technique(s) | 461 | 44 |
Cyber * resilience/resilience | 251 | 26 |
Processing | 242 | 38 |
Architecture | 239 | 43 |
Forensic(s) | 214 | 16 |
Cyber * security | 179 | 37 |
Response | 156 | 33 |
Incident(s) | 41 | 15 |
Prevention | 38 | 20 |
Recovery | 32 | 10 |
Year | Primary Study | Smart Sector |
---|---|---|
2011 | [102] | Infrastructure |
2012 | ||
2013 | ||
2014 | [52] | Energy |
2015 | [103] | Mobility—Automotive |
2016 | ||
2017 | [104] | Infrastructure |
2018 | [101,105] | Energy, Mobility—Aviation |
Q1 2019 | [40,99,100] | Security, Mobility—Aviation |
Threat Layers | Primary Studies |
---|---|
Physical, Communication and Application | [48,105,107] |
Physical and Communication | [2,38,39,51,63,65,101,103,104,108,109,110,111,112,113,114] |
Physical | [36,37,67,84,85] |
Communication | [33,37,40,52,99,100,115,116,117,118,119,120,121,122,123,124,125,126,127,128,129,130,131] |
Application | [36,49,132,133,134,135] |
Key Stage | Primary Studies |
---|---|
Preparation | [13,48,100,111] |
Detection and Analysis | [2,33,36,37,38,39,40,51,63,64,65,67,99,100,101,102,103,104,105,107,108,109,110,111,113,115,116,117,118,119,120,122,123,124,125,126,128,129,131,132,133,137,142] |
Containment, Eradication and Recovery | [40,49,52,100,103,104,107,114,121,127,129,130,133,135] |
Post-Incident Activities | none |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ahmadi-Assalemi, G.; Al-Khateeb, H.; Epiphaniou, G.; Maple, C. Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review. Smart Cities 2020, 3, 894-927. https://doi.org/10.3390/smartcities3030046
Ahmadi-Assalemi G, Al-Khateeb H, Epiphaniou G, Maple C. Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review. Smart Cities. 2020; 3(3):894-927. https://doi.org/10.3390/smartcities3030046
Chicago/Turabian StyleAhmadi-Assalemi, Gabriela, Haider Al-Khateeb, Gregory Epiphaniou, and Carsten Maple. 2020. "Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review" Smart Cities 3, no. 3: 894-927. https://doi.org/10.3390/smartcities3030046
APA StyleAhmadi-Assalemi, G., Al-Khateeb, H., Epiphaniou, G., & Maple, C. (2020). Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review. Smart Cities, 3(3), 894-927. https://doi.org/10.3390/smartcities3030046