INVESTIGATION STUDY OF CYBER-PHYSICAL SYSTEMS : CHARACTERISTICS , APPLICATION DOMAINS , AND SECURITY CHALLENGES

Cyber-Physical Systems (CPSs) are currently widely used in people’s daily lives but present risks and threats, especially when used by cybercriminals against the governments, corporations, organizations, or individuals. CPS applications are increasingly becoming attractive and are targeted by cyber-attacks. Tools and theories that can be used by organizations and researchers to understand the types of new threats and the impacts that each threat can cause to the physical systems are lacking at present. In this research, current physical security threats of CPSs for the last few years are investigated to briefly describe the usage, application domains, and security challenges of CPSs in their field of application. This work serves a basis for further studies on cyber physical security.

[1]  M. Shalini,et al.  Security Issues And Challenges For Cyber Physical System , 2018 .

[2]  Qaisar Shafi,et al.  Cyber Physical Systems Security: A Brief Survey , 2012, 2012 12th International Conference on Computational Science and Its Applications.

[3]  Michael Paulitsch,et al.  MILS-related information flow control in the avionic domain: A view on security-enhancing software architectures , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).

[4]  Jiafu Wan,et al.  A survey of Cyber-Physical Systems , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).

[5]  Deirdre K. Mulligan,et al.  Privacy in the Smart Grid: An Information Flow Analysis , 2011 .

[6]  Nabeel Salih Ali A four-phase methodology for protecting web applications using an effective real-time technique , 2016 .

[7]  Insup Lee,et al.  Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.

[8]  Erol Gelenbe,et al.  A simulation framework for the investigation of adaptive behaviours in largely populated building evacuation scenarios , 2008 .

[9]  Syed Mahfuzul Aziz,et al.  False Alarm Detection in Cyber-physical Systems for Healthcare Applications , 2013 .

[10]  Juliane Jung Computers As Components Principles Of Embedded Computing System Design , 2016 .

[11]  Guang Gong,et al.  Security Challenges in Smart-Grid Metering and Control Systems , 2013 .

[12]  Chris Riley,et al.  Aircraft systems cyber security , 2012, 2012 Integrated Communications, Navigation and Surveillance Conference.

[13]  Eui-Nam Huh,et al.  Emerging Sensor-Cloud Technology for Pervasive Services and Applications , 2014, Int. J. Distributed Sens. Networks.

[14]  Danny Hughes,et al.  Specification, Analyzing Challenges and Approaches for Cyber-Physical Systems (CPS) , 2010 .

[15]  Emilio Iasiello Getting Ahead of the Threat: Aviation and Cyber Security , 2013 .

[16]  Edwin R. Galea,et al.  Approximating the evacuation of the World Trade Center North Tower using computer simulation , 2008 .

[17]  Nabeel Salih Ali,et al.  REVIEW OF VIRTUAL REALITY TRENDS (PREVIOUS, CURRENT, AND FUTURE DIRECTIONS), AND THEIR APPLICATIONS, TECHNOLOGIES AND TECHNICAL ISSUES , 2017 .

[18]  Wei Sun,et al.  Emerging challenges in cyber-physical systems: A balance of performance, correctness, and security , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[19]  Pieter J. Mosterman,et al.  Cyber-physical systems challenges: a needs analysis for collaborating embedded software systems , 2016, Software & Systems Modeling.

[20]  Erol Gelenbe,et al.  Future Research on Cyber-Physical Emergency Management Systems , 2013, Future Internet.

[21]  Scott D. Applegate The dawn of Kinetic Cyber , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[22]  Rong Zheng,et al.  Cyber-physical systems: Milestones and research challenges , 2012, Comput. Commun..

[23]  George Loukas,et al.  A taxonomy of cyber attack and defence mechanisms for emergency management networks , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[24]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[25]  David Harries,et al.  Cyberterrorism: is the U.S. healthcare system safe? , 2013, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.

[26]  Insup Lee,et al.  Challenges and Research Directions in Medical Cyber–Physical Systems , 2012, Proceedings of the IEEE.

[27]  Radha Poovendran,et al.  A Framework for Securing Future e-Enabled Aircraft Navigation and Surveillance , 2009 .

[28]  C. Richard G. Helps,et al.  Comprehensive design of cyber physical systems , 2012, SIGITE '12.

[29]  Joseph P. Loyall,et al.  Cyber-physical Systems Security-Challenges and Research Ideas , 2009 .

[30]  Syed Mahfuzul Aziz,et al.  Review of Cyber-Physical System in Healthcare , 2014, Int. J. Distributed Sens. Networks.

[31]  Yu Peng,et al.  Review on cyber-physical systems , 2017, IEEE/CAA Journal of Automatica Sinica.

[32]  George Loukas,et al.  A Review of Cyber Threats and Defence Approaches in Emergency Management , 2013, Future Internet.

[33]  Yenumula B. Reddy,et al.  Security and Design Challenges in Cyber-Physical Systems , 2015, 2015 12th International Conference on Information Technology - New Generations.