scispace - formally typeset
Search or ask a question
Topic

Cyber-physical system

About: Cyber-physical system is a research topic. Over the lifetime, 11096 publications have been published within this topic receiving 162489 citations. The topic is also known as: CPS.


Papers
More filters
Proceedings ArticleDOI
14 Apr 2015
TL;DR: This paper shows how a specific series of "permitted" operations can elude standard intrusion detection systems and still damage an infrastructure, and presents a possible approach to the development of a sequence-aware intrusion detection system (S-IDS).
Abstract: Nowadays, several threats endanger cyber-physical systems. Among these systems, industrial control systems (ICS) operating on critical infrastructures have been proven to be an attractive target for attackers. The case of Stuxnet has not only showed that ICSs are vulnerable to cyber-attacks, but also that some of these attacks rely on understanding the processes beyond the employed systems and using such knowledge to maximize the damage. This concept is commonly known as "semantic attack". Our paper discusses a specific type of semantic attack involving "sequences of events". Common network intrusion detection systems (NIDS) generally search for single, unusual or "not permitted" operations. In our case, rather than a malicious event, we show how a specific series of "permitted" operations can elude standard intrusion detection systems and still damage an infrastructure. Moreover, we present a possible approach to the development of a sequence-aware intrusion detection system (S-IDS). We propose a S-IDS reference architecture and we discuss all the steps through its implementations. Finally, we test the S-IDS on real ICS traffic samples captured from a water treatment and purification facility.

153 citations

Journal ArticleDOI
TL;DR: This paper addresses the attack modeling using vulnerability of information, communication and electric grid network using graph theory based approach and shows the possible impact on smart grid caused by integrated cyber-physical attack.
Abstract: This paper addresses the attack modeling using vulnerability of information, communication and electric grid network. Vulnerability of electric grid with incomplete information has been analyzed using graph theory based approach. Vulnerability of information and communication (cyber) network has been modeled utilizing concepts of discovery, access, feasibility, communication speed and detection threat. Common attack vector based on vulnerability of cyber and physical system have been utilized to operate breakers associated with generating resources to model aurora-like event. Real time simulations for modified IEEE 14 bus test case system and graph theory analysis for IEEE 118 bus system have been presented. Test case results show the possible impact on smart grid caused by integrated cyber-physical attack.

152 citations

Journal ArticleDOI
TL;DR: A survey covering the main CPS architecture models available in the industrial environment, emphasizing their key characteristics and technologies, as well as the correlations among them, pointing objectives, advantages and contribution for the IIoT introduction in I4.0.

151 citations

Journal ArticleDOI
TL;DR: Various Artificial Intelligence (AI) techniques and tools for SC privacy protection are investigated and a case study of retail marketing is presented, which uses AI and SC to preserve its security and privacy.
Abstract: Applications of Blockchain (BC) technology and Cyber-Physical Systems (CPS) are increasing exponentially. However, framing resilient and correct smart contracts (SCs) for these smart application is a quite challenging task because of the complexity associated with them. SC is modernizing the traditional industrial, technical, and business processes. It is self-executable, self-verifiable, and embedded into the BC that eliminates the need for trusted third-party systems, which ultimately saves administration as well as service costs. It also improves system efficiency and reduces the associated security risks. However, SCs are well encouraging the new technological reforms in Industry 4.0, but still, various security and privacy challenges need to be addressed. In this paper, a survey on SC security vulnerabilities in the software code that can be easily hacked by a malicious user or may compromise the entire BC network is presented. As per the literature, the challenges related to SC security and privacy are not explored much by the authors around the world. From the existing proposals, it has been observed that designing a complex SCs cannot mitigate its privacy and security issues. So, this paper investigates various Artificial Intelligence (AI) techniques and tools for SC privacy protection. Then, open issues and challenges for AI-based SC are analyzed. Finally, a case study of retail marketing is presented, which uses AI and SC to preserve its security and privacy.

151 citations

Journal ArticleDOI
TL;DR: This paper addresses the challenge of how to govern this evolution of work and purposely guide the process of integrating people within CPSs in order to move towards the desired scenario, by proposing a methodology to support the design and assessment of different work configurations.

150 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
90% related
Network packet
159.7K papers, 2.2M citations
86% related
Control theory
299.6K papers, 3.1M citations
86% related
Wireless network
122.5K papers, 2.1M citations
85% related
Optimization problem
96.4K papers, 2.1M citations
85% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023831
20221,955
20211,283
20201,586
20191,576
20181,441