Cyber-physical systems: A security perspective
- 1 May 2015
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 15301877,p. 1-8
- https://doi.org/10.1109/ets.2015.7138763
Abstract
A cyber-physical system (CPS) is a composition of independently interacting components, including computational elements, communications and control systems. Applications of CPS institute at different levels of integration, ranging from nation-wide power grids, to medium scale, such as the smart home, and small scale, e.g. ubiquitous health care systems including implantable medical devices. Cyber-physical systems primarily transmute how we interact with the physical world, with each system requiring different levels of security based on the sensitivity of the control system and the information it carries. Considering the remarkable progress in CPS technologies during recent years, advancement in security and trust measures is much needed to counter the security violations and privacy leakage of integration elements. This paper focuses on security and privacy concerns at different levels of the composition and presents system level solutions for ensuring the security and trust of modern cyber-physical systems.This publication has 56 references indexed in Scilit:
- Cyber–Physical Device Authentication for the Smart Grid Electric Vehicle EcosystemIEEE Journal on Selected Areas in Communications, 2014
- The Cousins of Stuxnet: Duqu, Flame, and GaussFuture Internet, 2012
- Analysis of the security of VPN configurations in industrial control environmentsInternational Journal of Critical Infrastructure Protection, 2012
- SCADA Protocol VulnerabilitiesLecture Notes in Computer Science, 2012
- Cyber Security for Smart Grid, Cryptography, and PrivacyInternational Journal of Digital Multimedia Broadcasting, 2011
- Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{\rm DDQ}$sIEEE Transactions on Information Forensics and Security, 2010
- An experimental investigation of malware attacks on SCADA systemsInternational Journal of Critical Infrastructure Protection, 2009
- INSENS: Intrusion-tolerant routing for wireless sensor networksComputer Communications, 2006
- Safety Issues Involving Medical DevicesJama-Journal Of The American Medical Association, 2005
- Protecting Software Code by GuardsLecture Notes in Computer Science, 2002