Open AccessPosted Content
Cyber-Physical Systems Security -- A Survey
Reads0
Chats0
TLDR
This paper study and systematize existing research on CPS security under a unified framework, aiming to build a model that is abstract enough to be applicable to various heterogeneous CPS applications; and to gain a modular view of the tightly coupled CPS components.Abstract:
With the exponential growth of cyber-physical systems (CPS), new security challenges have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced for the new generation of CPS. However, there lack a systematic study of CPS security issues. In particular, the heterogeneity of CPS components and the diversity of CPS systems have made it very difficult to study the problem with one generalized model.
In this paper, we capture and systematize existing research on CPS security under a unified framework. The framework consists of three orthogonal coordinates: (1) from the \emph{security} perspective, we follow the well-known taxonomy of threats, vulnerabilities, attacks and controls; (2)from the \emph{CPS components} perspective, we focus on cyber, physical, and cyber-physical components; and (3) from the \emph{CPS systems} perspective, we explore general CPS features as well as representative systems (e.g., smart grids, medical CPS and smart cars). The model can be both abstract to show general interactions of a CPS application and specific to capture any details when needed. By doing so, we aim to build a model that is abstract enough to be applicable to various heterogeneous CPS applications; and to gain a modular view of the tightly coupled CPS components. Such abstract decoupling makes it possible to gain a systematic understanding of CPS security, and to highlight the potential sources of attacks and ways of protection.read more
Citations
More filters
Proceedings ArticleDOI
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS
TL;DR: It is shown that under data injection attacks on sensors, noise pattern deviations from the fingerprinted pattern enable the proposed scheme to detect attacks.
Journal ArticleDOI
Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions
Anshuman Singh,Brij B. Gupta +1 more
TL;DR: In this paper , the authors present a DDoS threat analysis along with a few novel ground-breaking defense mechanisms proposed by various researchers for numerous domains and discuss popular performance metrics that evaluate the defense schemes.
Journal ArticleDOI
A Survey on Attack Detection and Resilience for Connected and Automated Vehicles: From Vehicle Dynamics and Control Perspective
TL;DR: In this article , a survey summarizes and reviews the existing results on attack/anomaly detection and resilience of connected and automated vehicles in control frameworks, and some potential research directions and challenges are identified.
Journal ArticleDOI
Digital Twin perspective of Fourth Industrial and Healthcare Revolution
TL;DR: The paper focuses on studying the characteristics of DT, communication technologies and tools utilized in the creation of DT models, reference models, standards, and the researcher’s recent work in smart manufacturing and healthcare.
Journal ArticleDOI
A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning
TL;DR: In this paper , a knowledge distillation model based on triplet convolution neural network was proposed to improve the model performance and greatly enhance the speed of anomaly detection for industrial CPS as well as reduce the complexity of the model.
References
More filters
Journal ArticleDOI
False data injection attacks against state estimation in electric power grids
TL;DR: In this article, a new class of attacks, called false data injection attacks, against state estimation in electric power grids is presented and analyzed, under the assumption that the attacker can access the current power system configuration information and manipulate the measurements of meters at physically protected locations such as substations.
Journal ArticleDOI
Stuxnet: Dissecting a Cyberwarfare Weapon
TL;DR: Last year marked a turning point in the history of cybersecurity-the arrival of the first cyber warfare weapon ever, known as Stuxnet, which followed a completely new approach that's no longer aligned with confidentiality, integrity, and availability thinking.
Proceedings ArticleDOI
Experimental Security Analysis of a Modern Automobile
Karl Koscher,Alexei Czeskis,Franziska Roesner,Shwetak N. Patel,Tadayoshi Kohno,Stephen Checkoway,Damon McCoy,Brian Kantor,Danny Anderson,Hovav Shacham,Stefan Savage +10 more
TL;DR: It is demonstrated that an attacker who is able to infiltrate virtually any Electronic Control Unit (ECU) can leverage this ability to completely circumvent a broad array of safety-critical systems and present composite attacks that leverage individual weaknesses.
Journal ArticleDOI
Body Area Networks: A Survey
TL;DR: This paper provides a detailed investigation of sensor devices, physical layer, data link layer, and radio technology aspects of BAN research, and presents a taxonomy of B Ban projects that have been introduced/proposed to date.
Journal ArticleDOI
Security and Privacy Challenges in the Smart Grid
TL;DR: The smart grid is the modernization of the existing electrical system that enhances customers' and utilities' ability to monitor, control, and predict energy use.