scispace - formally typeset
Open AccessPosted Content

Cyber-Physical Systems Security -- A Survey

Reads0
Chats0
TLDR
This paper study and systematize existing research on CPS security under a unified framework, aiming to build a model that is abstract enough to be applicable to various heterogeneous CPS applications; and to gain a modular view of the tightly coupled CPS components.
Abstract
With the exponential growth of cyber-physical systems (CPS), new security challenges have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced for the new generation of CPS. However, there lack a systematic study of CPS security issues. In particular, the heterogeneity of CPS components and the diversity of CPS systems have made it very difficult to study the problem with one generalized model. In this paper, we capture and systematize existing research on CPS security under a unified framework. The framework consists of three orthogonal coordinates: (1) from the \emph{security} perspective, we follow the well-known taxonomy of threats, vulnerabilities, attacks and controls; (2)from the \emph{CPS components} perspective, we focus on cyber, physical, and cyber-physical components; and (3) from the \emph{CPS systems} perspective, we explore general CPS features as well as representative systems (e.g., smart grids, medical CPS and smart cars). The model can be both abstract to show general interactions of a CPS application and specific to capture any details when needed. By doing so, we aim to build a model that is abstract enough to be applicable to various heterogeneous CPS applications; and to gain a modular view of the tightly coupled CPS components. Such abstract decoupling makes it possible to gain a systematic understanding of CPS security, and to highlight the potential sources of attacks and ways of protection.

read more

Citations
More filters
Proceedings ArticleDOI

Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS

TL;DR: It is shown that under data injection attacks on sensors, noise pattern deviations from the fingerprinted pattern enable the proposed scheme to detect attacks.
Journal ArticleDOI

Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions

TL;DR: In this paper , the authors present a DDoS threat analysis along with a few novel ground-breaking defense mechanisms proposed by various researchers for numerous domains and discuss popular performance metrics that evaluate the defense schemes.
Journal ArticleDOI

A Survey on Attack Detection and Resilience for Connected and Automated Vehicles: From Vehicle Dynamics and Control Perspective

TL;DR: In this article , a survey summarizes and reviews the existing results on attack/anomaly detection and resilience of connected and automated vehicles in control frameworks, and some potential research directions and challenges are identified.
Journal ArticleDOI

Digital Twin perspective of Fourth Industrial and Healthcare Revolution

TL;DR: The paper focuses on studying the characteristics of DT, communication technologies and tools utilized in the creation of DT models, reference models, standards, and the researcher’s recent work in smart manufacturing and healthcare.
Journal ArticleDOI

A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning

TL;DR: In this paper , a knowledge distillation model based on triplet convolution neural network was proposed to improve the model performance and greatly enhance the speed of anomaly detection for industrial CPS as well as reduce the complexity of the model.
References
More filters
Journal ArticleDOI

False data injection attacks against state estimation in electric power grids

TL;DR: In this article, a new class of attacks, called false data injection attacks, against state estimation in electric power grids is presented and analyzed, under the assumption that the attacker can access the current power system configuration information and manipulate the measurements of meters at physically protected locations such as substations.
Journal ArticleDOI

Stuxnet: Dissecting a Cyberwarfare Weapon

R Langner
TL;DR: Last year marked a turning point in the history of cybersecurity-the arrival of the first cyber warfare weapon ever, known as Stuxnet, which followed a completely new approach that's no longer aligned with confidentiality, integrity, and availability thinking.
Proceedings ArticleDOI

Experimental Security Analysis of a Modern Automobile

TL;DR: It is demonstrated that an attacker who is able to infiltrate virtually any Electronic Control Unit (ECU) can leverage this ability to completely circumvent a broad array of safety-critical systems and present composite attacks that leverage individual weaknesses.
Journal ArticleDOI

Body Area Networks: A Survey

TL;DR: This paper provides a detailed investigation of sensor devices, physical layer, data link layer, and radio technology aspects of BAN research, and presents a taxonomy of B Ban projects that have been introduced/proposed to date.
Journal ArticleDOI

Security and Privacy Challenges in the Smart Grid

TL;DR: The smart grid is the modernization of the existing electrical system that enhances customers' and utilities' ability to monitor, control, and predict energy use.
Related Papers (5)