Safety and Security Considerations for Online Laboratory Management Systems
Abstract
:1. Introduction
2. Research Methodology
2.1. Taxonomy
2.2. Method
- Query 1 (Q1): TITLE-ABS-KEY ((safety OR security) AND (online AND laboratory AND management AND systems) OR (remote AND laboratories)).
- Query 2 (Q2): TITLE-ABS-KEY (first AND implementation AND remote AND laboratories) AND (history).
- Query 3 (Q3): TITLE-ABS-KEY (legal AND safety AND security AND requirements AND regulations).
- Query 4 (Q4): TITLE-ABS-KEY (computer AND safety AND security AND evolution).
- Query 5 (Q5): TITLE-ABS-KEY ((threat OR vulnerabilities) AND (remote AND laboratories)).
3. Literature Review
3.1. Remote Laboratories
- Remote laboratories based on client–server applications: Users access the laboratory remotely by identifying themselves, allowing them to participate in experiments and record their activities. A common disadvantage is installing specific software on client devices, which some educational institutions may restrict to prevent potential virus infections or security vulnerabilities.
- Remote laboratories based on Internet technologies: This category includes remote labs that only require a web browser on the client side, with a web server on the server side to facilitate communication with the laboratory hardware [17].
3.2. Computer Safety and Security Evolution
3.2.1. Security
3.2.2. Safety
3.3. Legal Safety and Security Requirements and Regulations
3.3.1. Safety and Security Regulations
3.3.2. Safety Consumer and Product Acts
3.3.3. Prevention Through Design
3.3.4. Privacy Regulations
3.3.5. Safety and Security Standards
3.4. Security in Remote Laboratories and OLMS
- Inflexible or static sharing: An instrument in a remote laboratory has some possible user input areas; a unique combination of these inputs related to specific functions is required in each laboratory experiment. In this situation, the security level must be controlled by the number of functions related to the inputs and restricting some instrumentation uses.
- Flexible or partial sharing: In this scenario, any input is connected with the corresponding function, and several combinations of this function can perform a range of values in a laboratory experiment activity. Here, the level of security is given by the number of functions allowed to the users over the instrumentation. Given that the user has more control over the instrumentation, it increases the risk of invalid inputs; for that reason, a stricter validation scheme is needed.
- Complete or total sharing: In this case, each input must be attached to an available function over the network with the capability of turning on/off the instruments, giving the user complete control over the remote laboratory instrumentation. The user controls the instrumentation, so strict and strong scheme validation is needed [64].
3.4.1. Classification of Security Attacks in OLMS
- Network-based attacks target the infrastructure that enables communication between users and remote laboratories, aiming to interrupt data flow or block users from accessing and controlling experiments. Typical network-based attacks, such as denial-of-service (DoS) and distributed denial-of-service (DDoS), can cause system outages, while more sophisticated threats, like man-in-the-middle (MITM) attacks, put at risk data integrity and confidentiality, compromising sensitive information [65,66,67,68].
- Access-based attacks involve unauthorized attempts to gain entry or privileges within the OLMS by exploiting weaknesses in authentication or authorization processes. These attacks can target some components, including hardware, software, and communication channels, exploit vulnerabilities in devices or networks to gain control, manipulate or hijack experiments, or cause serious harm to the integrity of OLMSs. Some examples include attempts to connect using protocols like RDP, WMI, and FTP, or exploiting vulnerabilities to gain unauthorized control over experiments in remote labs [67,68].
- Device-based attacks target physical devices to undermine their functionality, security, or integrity. These attacks may involve tampering with the hardware, exploiting weaknesses in the device’s software or firmware, or causing damage through manipulation or environmental influences. Examples include physical damage, hardware compromise, and attacks exploiting vulnerabilities in remote laboratory devices [67,68].
3.4.2. Impact of Security Attacks in OLMS
3.5. Safety and Security Issues and Solutions Proposed
4. Results
5. Conclusions and Future Work
Funding
Data Availability Statement
Conflicts of Interest
Appendix A
Aspects | Directive 89/391 | OSHA | HSG65 | WHS |
---|---|---|---|---|
Scope | EU’s general occupational safety and health principles. | U.S. federal agency overseeing workplace safety and health. | UK guidance for managing health and safety. | Australian model for workplace health and safety. |
Focus | General safety framework. | US federal agency overseeing. | UK guidance for managing health. | Integrated approach to workplace health and safety. |
Key Concepts | Employer and employee responsibilities, risk assessment, and preventive measures. | Employer responsibilities, standards, training, and inspections. | Plan–Do–Check–Act model, leadership, and risk management. | Duty of care, consultation, cooperation, and risk assessment. |
Enforcement | Implemented by EU member states’ laws and regulations. | Enforced by OSHA through inspections, citations, and fines. | Guidance rather than regulation based on risk management. | Regulated and enforced by Australian authorities. |
Reporting | Involves risk assessment and reporting of hazards and measures. | Reporting requirements for workplace incidents, injuries, and illnesses. | Emphasizes reporting incidents, near-misses, and lessons learned. | Requires reporting of certain incidents and hazards. |
Documentation | May require documentation of risk assessments and preventive measures. | Requires documentation of safety policies, training, incidents, and more. | Encourages documentation of risk assessments and safety measures. | Requires records of incidents, training, and assessments. |
Participation | Requires worker involvement in safety and health matters. | Emphasizes worker rights, reporting, and involvement. | Encourages employee involvement in safety management. | Involves worker consultation and representation. |
Improvements | Promotes a cycle of planning, acting, and evaluating for improvement. | Encourages continuous improvement in workplace safety. | Promotes a cycle of planning, acting, and evaluating for improvement. | Emphasizes ongoing improvement in health and safety. |
Standard/Initiative | Sector | Remarks |
---|---|---|
IT-Grundschutz [88] | IT | The IT-Grundschutz methodology, developed by Germany’s Federal Office for Information Security (BSI), offers a systematic framework for identifying and implementing cybersecurity measures across organizations. It is designed to align with the international standard for information security management systems [89]. |
HSG 65 (UK) [38] | Occupational health and safety | British guidelines mainly targeting executives, proprietors, and supervisors, especially those responsible for establishing or supervising their organization’s health and safety protocols. This guidance can also benefit employees, their representatives, professionals, and educators specializing in health and safety practices. |
ISA/IEC 62443 [90] | IT | This standard was developed by the International Society of Automation (ISA) and the International Electrotechnical Commission (IEC), outlines a framework for securing Industrial Automation and Control Systems (IACSs). It offers a systematic approach to safeguarding industrial networks, systems, and components against cyber threats. |
ISO 45001 [91] | Occupational health and safety | Facilitates the creation of secure and wellness-oriented work environments, prevent potential hazards, promoting the ongoing enhancement of processes, and diminishing risks persistently. Replaces the OHSAS 18001 standard. |
ISO/IEC 27000 [89] | IT | The ISO 27000 family is a series of international standards that provide guidelines and best practices for information security management. |
ISO/IEC 15408 [92] | IT | This standard is intended to be utilized as the fundamental basis for appraising the security attributes of IT products. |
Information Security Forum (UK) [93] | IT | Designed for experts in risk management, information security management, and security practitioners, SOGP assists organizations by enhancing agility in capitalizing on new opportunities while effectively handling linked risks and swiftly addressing ever-changing threats to prevent costly incidents, operational disruptions, and harm to reputation. Recognizing and fulfilling regulatory and compliance mandates. |
NERC 1300 [94] | IT | This standard requires organizations to recognize and safeguard essential cyber assets linked to the dependable functioning of the bulk electric system. |
NIST SP 800-53 [95] | IT | NIST 800-53, developed by the National Institute of Standards and Technology, is a cybersecurity standard and compliance framework. It establishes standards, controls, and assessments to address various risk factors, cost considerations, and organizational capabilities. |
VDI/VDE 2182 (Germany) [96] | IT | This standard outlines the implementation of precise measures to ensure the IT security of automated machinery and industrial facilities. It encompasses considerations regarding the automation devices, systems, and applications employed in automation processes. |
ISO 31000 [97] | IT | Risk management guidelines provide principles, the framework, and the process for effectively handling risks. It applies to organizations of all sizes across various sectors and industries. |
IEEE Cybersecurity Initiative [98] | IT | The IEEE Cybersecurity Initiative (CYBSI) was introduced through collaboration between the IEEE Computer Society and the IEEE Future Directions Committee in 2014. The objective is establishing a primary online platform for security and privacy experts, enhancing students’ and educators’ understanding of cybersecurity, and enhancing the design and execution of security and privacy measures by professionals. The CYBSI offers a collection of standards and initiatives designed to tackle fundamental components of the cybersecurity framework. |
ETSI EN 303 645 [99] | IT | It is an international standard designed for consumer IoT devices. This standard establishes a foundational level of security to shield IoT devices from prevalent cyber threats, as well as from extensive and orchestrated malicious activities like distributed denial-of-service (DDoS) attacks and unauthorized surveillance of individuals’ private lives. |
FIPS 140 [100] | IT | Developed by the NIST, FIPS 140 outlines the security criteria to be met by cryptographic modules, offering four tiers to include diverse potential uses and settings. It aims to ensure the security of the cryptographic module’s design and execution, such as specification, interfaces, authentication, state model, physical security, operational conditions, key management, electromagnetic compatibility, self-tests, design reliability, and countermeasures against various attacks. |
ACSC Essential Eight [101] | IT | The ACSC Essential Eight refers to a set of cybersecurity strategies outlined by the Australian Cyber Security Centre (ACSC). It outlines the security criteria to be met by cryptographic modules, offering four tiers to include diverse potential uses and settings. It aims to ensure the security of the cryptographic module’s design and execution, such as specification, interfaces, authentication, state model, physical security, operational conditions, key management, electromagnetic compatibility, self-tests, design reliability, and countermeasures against various attacks. |
IEC 61508-1:2010 [102] | Product | IEC 61508-1:2010 is a component of the IEC 61508 series, an international standard dedicated to securing the functional safety of electrical, electronic, and programmable electronic systems. |
ANSI Z10 [103] | Occupational health and safety | Occupational safety and health management systems aid organizations in recognizing and mitigating safety and health hazards. This process involves diminishing the likelihood of incidents, adhering to regulations, and executing interventions to lower risk levels. |
IEC 61511 [104] | Industrial | This is a technical guideline that outlines methodologies for engineering systems designed to safeguard industrial processes by employing instrumentation. These systems, known as Safety Instrumented Systems, are integral for ensuring process safety. |
UL 2900 [105] | Product | UL 2900 is a set of cybersecurity standards developed by Underwriters Laboratories (UL) to assess the security capabilities of network-connected products. |
Category | Attack Type | Target | Effect | Methods |
---|---|---|---|---|
Network-Based | Denial-of-service (DoS) and distributed denial-of-service (DDoS) | OLMS servers and networks | Prevents legitimate users from accessing services, causing downtime | CMP flood (Ping of Death): overloads servers with oversized ping packets (can be DoS or DDoS) |
SYN flood: floods system with incomplete TCP connection requests | ||||
UDP flood: xonsumes network resources with excessive UDP packets | ||||
HTTP flood: overwhelms web interfaces with fake requests, crashing the system | ||||
Spoofing, altered, and replayed routing attacks | Communication between IoT devices and remote labs | Attackers inject false routing data to manipulate information flow | Fake error messages, routing loops, or unauthorized redirection | |
Man-in-the-middle (MITM) attacks | Communication between remote lab users and servers | Intercepted credentials or altered experimental data | Attackers impersonate legitimate servers to deceive users | |
Access-Based | Unauthorized remote access (RDP, FTP, and SSH exploits) | Remote laboratory servers with public IPs | Attackers gain full control over OLMS | RDP exploit: an attacker can use brute-force methods to guess credentials and gain remote access to the system; once in, they can manipulate experiments or data |
FTP exploit: attackers can exploit vulnerable FTP services by downloading, uploading, or modifying sensitive files on the server | ||||
SSH exploit: attackers can exploit SSH vulnerabilities to gain unauthorized access, control remote systems, or steal sensitive data | ||||
Fake identity attacks | Remote authentication systems | Attackers impersonate users to execute malicious commands | Credential theft via phishing, social engineering, or database breaches | |
Device-Based | Physical tampering and power supply manipulation | Sensors, actuators, and lab hardware | Device malfunction, data manipulation, or permanent damage | Overloading circuits, altering firmware, or triggering power surges |
Device property exploits (low-end vs. high-end devices) | Low-end: limited processing power (easier to exploit) | Low-end: vulnerable to simple exploits | Exploiting security weaknesses based on device capabilities | |
High-end: more secure but susceptible to advanced threats | High-end: Targeted with malware injection |
Author/Year | Issue | Solution |
---|---|---|
Al-Maqousi., 2024 [84] | Security | Introduced a multilayered security model for remote cyber training laboratories, incorporating innovative techniques like multifactor authentication, VPNs, attribute-based access control, and anomaly detection, ensuring robust authentication, monitoring, integrity, encryption, and access control across multiple tiers. |
Al-Zoubi A. et al., 2023 [85] | Security | Implemented a secure, decentralized cyber-physical lab using blockchain, IPFS, and IoT devices, leveraging smart contracts for data storage and sharing, and a private blockchain network to ensure confidentiality, integrity, availability, and authorized access, thus protecting student privacy and the learning process. |
Border C. et al., 2007 [76] | Security | Access to the RLES (Remote Laboratories Emulation System) was facilitated through read-only virtual server libraries, which are capable of being copied, stored, and deployed. |
Casini M. et al., 2007 [70] | Safety | Proposed a technique involving the deployment of a bootable live CD on the server side of the remote laboratory to minimize downtime due to hardware or software failures and to enhance the system’s reliability. |
Chellaiah P. et al., 2017 [72] | Security | Implemented an image-based password system using a narrative framework that offers a unique approach to enhance both security and user experience on digital platforms. |
Fabini J. et al., 2021 [82] | Security | Developed SecTULab, a Moodle-integrated secure remote lab access system, emphasizing privacy and group-based access through end-to-end encryption. |
Gerza M. et al., 2014 [65] | Security | Examined the security aspects of remote laboratories against malicious attacks and analyzed the potential risks. |
Herrera M.R. S et al., 2013 [75] | Security | Employed EJS (Easy Java Simulation), which permits interaction between the laboratory station and the control panel that monitors operations. |
Kozik T. et al. 2012 [17] | Safety | Recommended using an authentication mechanism, firewall, and IDS (Intrusion Detection System). |
Krbecek M. et al., 2013 [67] | Security | Proposed the creation of automatic logs, the use of a registration-and-reservation system, and the use of Uninterruptible Power Supply in case of a power blackout. |
Krbecek M. et al., 2015 [73] | Security | Describes the security measures employed in the TCP/IP protocol and the development of a dedicated data communication and diagnostic interface for individual remote experiments within the RLMS (Remote Laboratory Management System). |
Li P. et al., 2008 [77] | Security | Introduced a decentralized virtual lab approach for a distance education course on intrusion detection, utilizing virtualization technology to run multiple virtual machines with diverse operating systems on students’ computers. |
Maiti A. et al., 2015 [69] | Safety | Described the features and components of distributed Peer-to-Peer Remote Access Laboratories (P2P RAL). |
Marange P. et al., 2007 [71] | Safety | To ensure the safety of the remote laboratories, a validation filter approach was used, based on the logical constraints and a modification of the difficulty level of automation. |
Palka L. et al., 2016 [79] | Security | Described a series of recommendations and procedures to secure data storage in the data warehouse scheme for the needs of remote laboratories. As a solution, an architecture with a dynamic multitiered trust model is deployed to ensure the security defining the level of access for users. |
Pedraza B. et al., 2024 [83] | Security | Incorporated a BridgeServer, which is a real-time web server that ensures secure access to remote labs using locally stored credentials. It includes secure file downloads, session time management, and automated access control through API validation integrated with a booking system. |
Richter Th. et al., 2012 [78] | Security | Utilized two separate virtual machines, one used to manage server access and the other to control external access to the virtual machine. |
Saenz J. et al., 2016 [74] | Security | Proposed a framework for reusing their VRLs through a Java model running on a server and a JavaScript GUI on the client side. |
Sanchez-Viloria J.A. et al., 2021 [80] | Security | Implemented the MQTT protocol (IoT Protocol) to SARL to ensure security. |
Uckelmann D. et al., 2021 [34] | Security/Safety | Applied the VDI/VDE 2182 guidelines for assessing safety and security in federated laboratories. |
Walchatwar N. et al., 2024 [68] | Security | Analyzed the security of IoT-based remote labs by conducting vulnerability assessments and targeted attacks, followed by proposing mitigation strategies to enhance confidentiality, integrity, and availability for secure educational platforms. |
Werner E. et al., 2021 [81] | Security | Proposed the use of blockchain technology to ensure security and access control in remote laboratories. |
References
- Larbaoui, Y. Security, Control and Management of Smart Remote Laboratory for Remote Experiments in Electricity and Electronics. Int. J. Adv. Trends Comput. Sci. Eng. 2020, 9, 4068–4076. [Google Scholar] [CrossRef]
- Pena-Molina, A.E.; Larrondo-Petrie, M.M.; Zapata-Rivera, L.F. The Need for E-Learning Standards for Online Laboratory Management Systems. In Proceedings of the 2022 IEEE Learning with MOOCs (LWMOOCS2022), Antigua Guatemala, Guatemala, 29–30 September 2022; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2022; pp. 240–245. [Google Scholar] [CrossRef]
- Latin American and Caribbean Consortium of Engineering Institutions (LACCEI). Available online: https://laccei.org (accessed on 23 January 2025).
- Organization of American States (OAS). Available online: https://www.oas.org/en/ (accessed on 23 January 2025).
- SARL. Available online: http://www.labinawindow.com/ (accessed on 23 January 2025).
- Larrondo-Petrie, M.M.; Zapata-Rivera, L.F.; Aranzazu-Suescun, C.; Sanchez-Viloria, J.A.; Pena-Molina, A.E.; Santana, K.S. Addressing the Need for Online Engineering Labs for Developing Countries. In Proceedings of the 2021 World Engineering Education Forum/Global Engineering Deans Council (IFEES/GEDC), Madrid, Spain, 15–18 November 2021; IEEE: Piscataway, NJ, USA, 2021. [Google Scholar] [CrossRef]
- IEEE 1876–2019; Standard for Networked Smart Learning for Online Laboratories. IEEE: Piscataway, NJ, USA, 2019. Available online: https://standards.ieee.org/ieee/1876/5482/ (accessed on 23 January 2025).
- IEEE P2834; Standard for Secure and Trusted Learning Systems. IEEE: Piscataway, NJ, USA, 2023. Available online: https://sagroups.ieee.org/2834/ (accessed on 25 January 2025).
- P7004.1; Recommended Practices for Virtual Classroom Security, Privacy, and Data Governance. IEEE: Piscataway, NJ, USA, 2023. Available online: https://standards.ieee.org/ieee/7004.1/10285/ (accessed on 29 January 2025).
- P2881; Standard for Learning Metadata. IEEE: Piscataway, NJ, USA, 2023. Available online: https://standards.ieee.org/ieee/2881/10248/ (accessed on 30 January 2025).
- ISO/IEC 2700x Information Security StandardsGeneva, Switzerland. 2023. Available online: https://www.audit-academy.be/en/glossary/iso-2700x-information-security-standards (accessed on 30 January 2025).
- Aburdene, M.F.; Mastascusa, E.J.; Massengale, R. A Proposal for a Remotely Shared Control Systems Laboratory. In Proceedings of the Frontiers in Education Twenty-First Annual Conference, Engineering Education in a New World Order, West Lafayette, IN, USA,, 21–24 September 1991; IEEE: Piscataway, NJ, USA, 1991; pp. 589–592. [Google Scholar] [CrossRef]
- Machotka, J.; Nafalski, A.; Nedić, Z. The History of Developments of Remote Experiments. In Proceedings of the 2nd World Conference on Technology and Engineering Education, Ljubljana, Slovenia, 5–8 September 2011; Available online: http://www.wiete.com.au/conferences/2wctee/papers/17-12-Machotka-J.pdf (accessed on 30 January 2025).
- Ramirez, D.; Ramirez, M.S.; Marrero, T.R. Novel Use of a Remote Laboratory for Active Learning in Class. Chem. Eng. Educ. 2016, 50, 1–8. [Google Scholar]
- Andini, N.F.; Dewi, P.M.; Marida, T.A.C.; Wibawa, A.P.; Nafalski, A. A Decade of Evolution of Virtual and Remote Laboratories. Bull. Soc. Inform. Theory Appl. 2023, 7, 63–73. [Google Scholar] [CrossRef]
- Zapata-Rivera, L.F. Models and Implementations of Online Laboratories; A Definition of a Standard Architecture to Integrate Distributed Remote Experiments. Ph.D. Thesis, Florida Atlantic University, Boca Raton, FL, USA, 2019. [Google Scholar]
- Kozik, T.; Simon, M. Preparing and Managing the Remote Experiment in Education. In Proceedings of the 2012 15th International Conference on Interactive Collaborative Learning (ICL), Villach, Austria, 26–28 September 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 1–4. [Google Scholar] [CrossRef]
- U.S. Department of Defense (DOD). Available online: https://www.defense.gov (accessed on 13 January 2025).
- Office of the Director of National Intelligence (NCSC). National Cyber Security Center. Available online: https://www.dni.gov/index.php/ncsc-home (accessed on 13 January 2025).
- DOD 5200.28-STD; Trusted Computer System Evaluation Criteria. US Department of Defense: Washington, DC, USA, 1985.
- Brewer, D.F.C. Applying Security Techniques to Achieve Safety. In Proceedings of the 3rd Safety-Critical Systems Symposium (SSS’93), Bristol, UK, 30 August–3 September 1993; pp. 246–256. [Google Scholar]
- Common Criteria International Standard. Common Criteria Portal. Available online: https://commoncriteriaportal.org (accessed on 30 January 2025).
- Communications-Electronics Security Group (CESG). Available online: https://www.gov.uk/government/organisations/cesg (accessed on 30 January 2025).
- Department of Trade and Industry (DTI). Available online: https://www.dti.gov.ph (accessed on 30 January 2025).
- Commercial Computer Security Centre (CCSC). Available online: https://www.cyber.gc.ca/en (accessed on 1 January 2025).
- Commission of European Communities. Available online: https://sdgs.un.org/statements/commission-european-community-14908 (accessed on 1 January 2025).
- Information Technology Security Evaluation Criteria (ITSEC). ITSEC Wikipedia. Available online: https://en.wikipedia.org/wiki/ITSEC (accessed on 1 January 2025).
- US Computer Security Act. Available online: https://www.govinfo.gov/app/details/BILLS-114s1990is (accessed on 1 January 2025).
- US National Institute for Standards and Technology (NIST). Available online: https://www.nist.gov/ (accessed on 1 January 2025).
- National Computer Security Center (NCSC). Available online: https://www.dni.gov/ncsc (accessed on 1 January 2025).
- Anderson, T. Safe and Secure Computer Systems; Blackwell Scientific Publications: London, UK, 1989. [Google Scholar]
- Jonsson, E.; Olovsson, T. On the Integration of Security and Dependability in Computer Systems. In Proceedings of the IASTED International Conference on Reliability, Quality Control and Risk Assessment, Washington, DC, USA, 4–6 November 1992; pp. 93–97. [Google Scholar]
- Pietre-Cambacedes, L.; Bouissou, M. Cross-Fertilization Between Safety and Security Engineering. Reliab. Eng. Syst. Saf. 2013, 110, 110–126. [Google Scholar] [CrossRef]
- Uckelmann, D.; Mezzogori, D.; Exposito, G.; Neroni, M.; Reverberi, D.; Ustenko, M. Safety and Security in Federated Remote Labs—A Requirement Analysis. In Cross Reality and Data Science in Engineering, REV 2020, Advances in Intelligent Systems and Computing; Springer: Cham, Switzerland, 2020; Volume 1231. [Google Scholar]
- Yang, S.; Sang, N.; Xiong, G. Safety Testing of Safety-Critical Software Based on Critical Mission Duration. In Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC’04), Washington, DC, USA, 3–5 March 2004; pp. 97–102. [Google Scholar]
- Directive 89/391. ISA. 2023. Available online: https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards (accessed on 12 January 2025).
- OSHA. 2023. Available online: https://www.osha.gov (accessed on 12 January 2025).
- HSG65. 2023. Available online: https://www.hse.gov.uk/pubns/books/hsg65.htm (accessed on 12 January 2025).
- Safe Work Australia. 2023. Available online: https://www.safeworkaustralia.gov.au (accessed on 12 January 2025).
- US Consumer Product Safety Act (CPSA). 2023. Available online: https://www.cpsc.gov/s3fs-public/pdfs/blk-media-cpsa.pdf (accessed on 12 January 2025).
- National Commission on Product Safety (NCPS). 2023. Available online: https://www.usa.gov/agencies/consumer-product-safety-commission (accessed on 12 January 2025).
- Canada Consumer Product Safety Act. 2023. Available online: https://www.canada.ca/en/health-canada/services/consumer-productsafety/reports-publications/industry-professionals/canada-consumer-product-safety-act-guide.html (accessed on 12 January 2025).
- UK Consumer Protection Act. 2023. Available online: https://iclg.com/practice-areas/consumer-protection-laws-and-regulations (accessed on 12 January 2025).
- General Product Safety Regulation (GPSR). 2024. Available online: https://trade.ec.europa.eu/access-to-markets/en/news/eus-general-product-safety-regulation-gpsr-new-era-consumer-protection (accessed on 10 January 2025).
- Australian Consumer Law (ACL). 2023. Available online: https://consumer.gov.au (accessed on 12 January 2025).
- Australian Competition and Consumer Commission (ACCC). 2023. Available online: https://www.accc.gov.au (accessed on 12 January 2025).
- Prevention Through Design (PtD). 2023. Available online: https://www.cdc.gov/niosh/docs/2011-121/pdfs/2011-121.pdf (accessed on 12 January 2025).
- Construction Design and Management Regulations. 2023. Available online: https://www.hse.gov.uk/construction/cdm/2015/index.htm (accessed on 12 January 2025).
- Design for Safety (DfS). 2023. Available online: https://www.tal.sg/wshc/topics/design-for-safety/about-design-for-safety (accessed on 12 January 2025).
- Workplace Safety and Health Council (WSHC). 2023. Available online: https://www.tal.sg/wshc (accessed on 12 January 2025).
- General Data Protection Regulation (GDPR). 2023. Available online: https://gdpr-info.eu (accessed on 12 January 2025).
- California Consumer Privacy Act (CCPA). 2023. Available online: https://oag.ca.gov/privacy/ccpa (accessed on 12 January 2025).
- IEEE. 2023. Available online: https://www.ieee.org (accessed on 12 January 2025).
- International Electrotechnical Commission (IEC). 2023. Available online: https://www.iso.org/about-us.html (accessed on 12 January 2025).
- International Organization for Standardization (ISO). 2023. Available online: https://ansi.org (accessed on 12 January 2025).
- American National Standards Institute (ANSI). 2023. Available online: https://www.ansi.org/ (accessed on 12 January 2025).
- National Institute of Standards and Technology (NIST). 2023. Available online: https://csrc.nist.gov/news/2023 (accessed on 12 January 2025).
- Underwriters Laboratories (UL). 2023. Available online: https://www.ul.com (accessed on 12 January 2025).
- European Committee for Standardization (CEN). 2023. Available online: https://www.cencenelec.eu/european-standardization/european-standards/ (accessed on 12 January 2025).
- European Committee for Electrotechnical Standardization (CENELEC). 2023. Available online: https://www.cencenelec.eu/european-standardization/cen-and-cenelec/ (accessed on 12 January 2025).
- Internet Engineering Task Force (IETF). 2023. Available online: https://www.ietf.org (accessed on 12 January 2025).
- International Society of Automation (ISA). 2023. Available online: https://www.isa.org (accessed on 12 January 2025).
- American Society of Mechanical Engineers (ASME). 2023. Available online: https://www.asme.org (accessed on 12 January 2025).
- Maiti, A.; Tripathy, B. Remote Laboratories: Design of Experiments and Their Web Implementation. Educ. Technol. Soc. 2013, 16, 220–233. [Google Scholar]
- Gerza, M.; Schauer, F.; Jasek, R. Security of ISES Measureserver® Module for Remote Experiments Against Malign Attacks. Int. J. Online Eng. 2014, 10, 4–10. [Google Scholar] [CrossRef]
- Nawir, M.; Amir, A.; Yaakob, N.; Lynn, O.B. Internet of Things (IoT): Taxonomy of security attacks. In Proceedings of the 3rd International Conference on Electronic Design (ICED), Phuket, Thailand, 11–12 August 2016; pp. 321–326. [Google Scholar] [CrossRef]
- Krbeček, M.; Schauer, F.; Jasek, R. Security Aspects of Remote e-Laboratories. Int. J. Online Eng. 2013, 9, 34–39. [Google Scholar] [CrossRef]
- Walchatwar, N.; Gureja, A.; Ihita, G.V.; Ojha, A.; Chaudhari, S. Security Analysis of IoT-based Remote Labs. In Proceedings of the 11th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 19–21 August 2024; pp. 39–46. [Google Scholar] [CrossRef]
- Maiti, A.; Kist, A.; Maxwell, A.D. Design and Operational Reliability of a Peer-to-Peer Distributed Remote Access Laboratory. In Proceedings of the 2015 12th International Conference on Remote Engineering and Virtual Instrumentation, Bangkok, Thailand, 25–27 February 2015. [Google Scholar]
- Casini, M.; Prattichizzo, D.; Vicino, A. Operating Remote Laboratories through a Bootable Device. IEEE Trans. Ind. Electron. 2007, 54, 3134–3140. [Google Scholar] [CrossRef]
- Marangé, P.; Gellot, F.; Riera, B. Control Validation of DES Systems: Application to Remote Laboratories. In Proceedings of the 2nd International Conference on Digital Information Management, Lyon, France, 28–31 October 2007. [Google Scholar]
- Chellaiah, P.; Nair, B.; Achuthan, K.; Diwakar, S. Using Theme-Based Narrative Construct of Images as Passwords: Implementation and Assessment of Remembered Sequences. Int. J. Online Eng. 2017, 13, 77–93. [Google Scholar] [CrossRef]
- Krbeček, M.; Schauer, F. Communication and Diagnostic Interfaces in Remote Laboratory Management Systems. Int. J. Online Eng. 2015, 11, 43–49. [Google Scholar] [CrossRef]
- Sáenz, J.; Esquembre, F.; Garcia, F.J.; de la Torre, L.; Dormido, S. A New Model for a Remote Connection with Hardware Devices Using Javascript. IFAC-PapersOnLine 2016, 49, 133–137. [Google Scholar] [CrossRef]
- Herrera, M.S.; Márquez, J.A.; Borrero, A.M.; Sánchez, M.M. Testing Bench for Remote Practical Training in Electric Machines. IFAC Proc. Vol. 2013, 46, 357–362. [Google Scholar] [CrossRef]
- Border, C. The Development and Deployment of a Multi-User, Remote Access Virtualization System for Networking, Security, and System Administration Classes. In Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, Covington, KY, USA, 7–11 March 2007; ACM: New York, NY, USA, 2007; pp. 576–580. [Google Scholar] [CrossRef]
- Li, P.; Mohammed, T. Integration of Virtualization Technology into Network Security Laboratory. In Proceedings of the 38th Annual Frontiers in Education Conference, Saratoga Springs, NY, USA, 22–25 October 2008; p. S2A. [Google Scholar]
- Richter, T.; Watson, R.; Kassavetis, S.; Kraft, M.; Grube, P.; Boehringer, D.; Logothetidis, S. The WebLabs of the University of Cambridge: A Study of Securing Remote Instrumentation. In Proceedings of the 9th International Conference on Remote England Virtual Instrumentation (REV), Bilbao, Spain, 4–6 July 2012. [Google Scholar]
- Pálka, L.; Schauer, F. Safety of Communication and Neural Networks for Security Enhancement in Data Warehouse for Remote Laboratories and Laboratory Management System. In Proceedings of the 6th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Dallas-Fortworth, TX, USA, 13–15 July 2015. [Google Scholar]
- Sanchez-Viloria, J.A.; Zapata-Rivera, L.F.; Aranzazu-Suescun, C.; Molina-Pena, A.E.; Larrondo-Petrie, M.M. Online Laboratory Communication Using MQTT IoT Standard. In Proceedings of the 2021 World Engineering Education Forum/Global Engineering Deans Council, WEEF/GEDC 2021, Madrid, Spain, 15–18 November 2021. [Google Scholar] [CrossRef]
- Werner, E.; Matias, J.C.; Berejuck, M.D.; Saliah-Hassane, H. Evaluation of Blockchain Techniques to Ensure Secure Access on Remote FPGA Laboratories. In Proceedings of the 9th International Symposium on Digital Forensics and Security, ISDFS 2021, Elazig, Turkey, 28–29 June 2021; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2021. [Google Scholar] [CrossRef]
- Fabini, J.; Hartl, A.; Meghdouri, F.; Breitenfellner, C.; Zseby, T. SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security Laboratories. In Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES’21), Vienna, Austria, 17–20 August 2021; Association for Computing Machinery: New York, NY, USA, 2021; p. 148. [Google Scholar] [CrossRef]
- Pedraza, B.; Villazón, A.; Ormachea, O. Enhancing Accessibility for Real-Time Remote Laboratories: A Web-Based Solution with Automated Validation and Access Control. In Smart Technologies for a Sustainable Future; Auer, M.E., Langmann, R., May, D., Roos, K., Eds.; STE 2024. Lecture Notes in Networks and Systems; Springer: Cham, Switzerland, 2024; Volume 1028. [Google Scholar]
- Al-Maqousi, A. Enhancing Security in Remote Laboratory Environments: A Layered Approach. In Proceedings of the 6th International Conference on Statistics: Theory and Applications (ICSTA’24), Barcelona, Spain, 19–21 August 2024. [Google Scholar] [CrossRef]
- Al-Zoubi, A.; Aldmour, M.; Sedky, M.; Aldmour, R. Blockchain Utilization in Cyber-Physical Laboratories for Engineering Education 4.0. In Proceedings of the Open Science in Engineering, REV 2023, Thessaloniki, Greece, 1–3 March 2023; Lecture Notes in Networks and Systems. Auer, M.E., Langmann, R., Tsiatsos, T., Eds.; Springer: Cham, Switzerland, 2023; Volume 763. [Google Scholar]
- IEEE Learning Technology Standards Committee (IEEE LTSC). Available online: https://sagroups.ieee.org/ltsc/ (accessed on 12 February 2025).
- Total Learning Architecture (TLA). Available online: https://adlnet.gov/projects/tla/ (accessed on 12 February 2025).
- IT-Grundschutz. Available online: https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/IT-Grundschutz/it-grundschutz_node.html (accessed on 8 January 2025).
- ISO/IEC 27000 Family. Available online: https://www.iso.org/standard/iso-iec-27000-family (accessed on 11 January 2025).
- ISA/IEC 62443 Series of Standards; The World’s Only Consensus-Based Automation and Control Systems Cybersecurity Standards. International Auditing and Assurance Standards Board (IAASB): New York, NY, USA, 2025. Available online: https://www.isa.org/standards-and-publications/isa-standards/isa-iec62443-series-of-standards (accessed on 8 January 2025).
- ISO 45001:2018; Occupational Health and Safety Management Systems—Requirements with Guidance for Use. ISO: Geneva, Switzerland, 2018. Available online: https://www.iso.org/iso-45001-occupational-health-and-safety.html (accessed on 11 January 2025).
- ISO/IEC 15408-1:2022; Information Security, Cybersecurity, and Privacy Protection. ISO: Geneva, Switzerland, 2022. Available online: https://www.iso.org/standard/72891.html (accessed on 11 January 2025).
- The ISF Is a Leading Authority on Information Security and Risk Management. Available online: https://www.securityforum.org (accessed on 11 January 2025).
- NERC 1300: Cyber Security Standard. Available online: https://www.nerc.com/pa/Stand/Pages/default.aspx (accessed on 11 January 2025).
- NIST SP 800-53 Rev. 5; Security and Privacy Controls for Information Systems and Organizations. NIST: Gaithersburg, MD, USA, 2025. Available online: https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final (accessed on 11 January 2025).
- VDI/VDE 2182; IT-Security for Industrial Automation—General Model. Available online: https://www.vdi.de/richtlinien/details/vdivde-2182-blatt-1-it-security-for-industrial-automation-general-model (accessed on 11 January 2025).
- ISO 31000:2018; Risk Management. ISO: Geneva, Switzerland, 2018. Available online: https://www.iso.org/iso-31000-risk-management.html (accessed on 11 January 2025).
- IEEE Cybersecurity Initiative. Available online: https://cybersecurity.ieee.org (accessed on 11 January 2025).
- ETSI EN 303 645; Cyber Security for Consumer Internet of Things: Baseline Requirements. ETSI: Sophia Antipolis, France, 2025. Available online: https://www.etsi.org (accessed on 11 January 2025).
- FIPS 140Security Requirements for Cryptographic Modules. Available online: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf (accessed on 11 January 2025).
- ACSC Essential Eight. Available online: https://Cyber.gov.au (accessed on 12 January 2025).
- IEC 61508:2010 CMV; Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems—Parts 1 to 7. IEC: Columbus, OH, USA, 2025. Available online: https://webstore.iec.ch/publication/22273 (accessed on 12 January 2025).
- ANSI Z10 Standards; Occupational Safety and health Management Systems Help Organizations to Continuously Identify and Eliminate Safety and Health Risks, Reduce Incident Potential, Comply with Regulations and Implement Risk-Reducing Interventions. American Society of Safety Professionals: Park Ridge, IL, USA, 2025. Available online: https://www.assp.org/standards/standards-topics/osh-management-z10 (accessed on 12 January 2025).
- IEC 61511; Functional Safety—Safety Instrumented Systems for the Process Industry Sector—Part 1: Framework, Definitions, System, Hardware and Application Programming Requirements. IEC: Columbus, OH, USA, 2025. Available online: https://webstore.iec.ch/publication/24241 (accessed on 12 January 2025).
- UL 2900; Your Destination for Trusted Safety Standards. UL Standards & Engagement: Evanston, IL, USA, 2025. Available online: https://www.shopulstandards.com (accessed on 12 January 2025).
Query | Total Number | Related | Possible Related | Not Related |
---|---|---|---|---|
Q1 | 381 | 32 | 93 | 256 |
Q2 | 215 | 5 | 25 | 185 |
Q3 | 148 | 0 | 3 | 145 |
Q4 | 223 | 1 | 28 | 194 |
Q5 | 233 | 31 | 8 | 184 |
Research Rabbit | 58 | 10 | 7 | 41 |
General Security Concerns | Security Frameworks | Access Control and Authentication | Threat and Vulnerabilities | Integrity and Monitoring | Communication Security | Safety |
---|---|---|---|---|---|---|
Saenz J. et al. [74] | Maiti A. et al. [69] | Pedraza B. et al. [83] | Walchatwar et al. [68] | Al-Zoubi, A. et al. [85] | Sanchez-Viloria J.A. et al. [80] | Casini, M. et al. [70] |
Uckelmann D. et al. [34] | Li P. et al. [77] | Werner E. et al. [81] | Gerza, M. et al. [65] | Krbecek, M. et al. [73] | Kozik T. et al. [17] | |
Border C. et al. [76] | Richter Th. et al. [78] | Fabini J. et al. [82] | Krbecek M. et al. [67] | Palka L. et al. [79] | Maiti A. et al. [69] | |
Chellaiah P. et al. [72] | Marange P. et al. [71] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pena-Molina, A.E.; Larrondo-Petrie, M.M. Safety and Security Considerations for Online Laboratory Management Systems. J. Cybersecur. Priv. 2025, 5, 24. https://doi.org/10.3390/jcp5020024
Pena-Molina AE, Larrondo-Petrie MM. Safety and Security Considerations for Online Laboratory Management Systems. Journal of Cybersecurity and Privacy. 2025; 5(2):24. https://doi.org/10.3390/jcp5020024
Chicago/Turabian StylePena-Molina, Andrea Eugenia, and Maria Mercedes Larrondo-Petrie. 2025. "Safety and Security Considerations for Online Laboratory Management Systems" Journal of Cybersecurity and Privacy 5, no. 2: 24. https://doi.org/10.3390/jcp5020024
APA StylePena-Molina, A. E., & Larrondo-Petrie, M. M. (2025). Safety and Security Considerations for Online Laboratory Management Systems. Journal of Cybersecurity and Privacy, 5(2), 24. https://doi.org/10.3390/jcp5020024