Problematic Issues of Information Security of Cyber-Physical Systems

This paper is an analysis and systematization of modern research in the field of cyber-physical system information security. The problematic issues of information security of such systems are considered: «what is being attacked?», «who is attacking?», «why is someone attacking?», «how is someone attacking?» and «how to protect the system?». As an answer to the first question, the paper proposes a definition and classification of cyber-physical systems according to such criteria as complexity, connectivity, criticality and social aspect. As an answer to the second and the third questions, the paper describes a classification of attacker according to such criteria as type of access, method of access, intentions, knowledge and resources. As  an answer to the fourth question, the paper contains a classification of attack actions according to such criteria as subject and object, method of influence, prerequisites and consequences. As an answer to the fifth question, the paper proposes a classification of protection methods and security tools according to such criteria as principle of operation, object of protection and task to be solved. The scientific significance of the paper is systematization of a current state of the art in the subject area. The practical value of the paper is providing information about security issues that are specific to cyber-physical systems, which will allow one to develop, manage and use such systems in a more secure way.

[1]  S. Shankar Sastry,et al.  A Taxonomy of Cyber Attacks on SCADA Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[2]  Manfred Broy,et al.  Engineering Cyber-Physical Systems: Challenges and Foundations , 2012, CSDM.

[3]  Konstantin Mikhaylov,et al.  Evaluation of Power Efficiency for Digital Serial Interfaces of Microcontrollers , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).

[4]  Wang Xiao-le,et al.  A Service-Oriented Architecture Framework for Cyber-Physical Systems , 2012 .

[5]  Tianbo Lu,et al.  Analysis of security threats and vulnerability for cyber-physical systems , 2013, Proceedings of 2013 3rd International Conference on Computer Science and Network Technology.

[6]  László Monostori,et al.  ScienceDirect Variety Management in Manufacturing . Proceedings of the 47 th CIRP Conference on Manufacturing Systems Cyber-physical production systems : Roots , expectations and R & D challenges , 2014 .

[7]  Xiaobo Guo,et al.  A Systematic Review of Studies on Cyber Physical System Security , 2015 .

[8]  Siddhartha Kumar Khaitan,et al.  Design Techniques and Applications of Cyberphysical Systems: A Survey , 2015, IEEE Systems Journal.

[9]  Yuan Xue,et al.  A language for describing attacks on cyber-physical systems , 2015, Int. J. Crit. Infrastructure Prot..

[10]  Jay Lee,et al.  A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .

[11]  Gary Newe Delivering the Internet of Things , 2015, Netw. Secur..

[12]  Birgit Vogel-Heuser,et al.  Design, modelling, simulation and integration of cyber physical systems: Methods and applications , 2016, Comput. Ind..

[13]  Dieter Gollmann,et al.  Cyber-Physical Systems Security , 2015, The New Codebreakers.

[14]  Remi Badonnel,et al.  A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..

[15]  Nils Ole Tippenhauer,et al.  On Attacker Models and Profiles for Cyber-Physical Systems , 2016, ESORICS.

[16]  Igor V. Kotenko,et al.  Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System , 2016, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[17]  Qusay H. Mahmoud,et al.  Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..

[18]  Maria A. Poltavtseva,et al.  Systematization and security assessment of cyber-physical systems , 2017, Automatic Control and Computer Sciences.

[19]  Fengjun Li,et al.  Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.

[20]  Renato Vidoni,et al.  Enabling Connectivity of Cyber-physical Production Systems: A Conceptual Framework , 2017 .

[21]  Jaime A. Camelio,et al.  An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems , 2017 .

[22]  Hafiz Malik,et al.  Linking received packet to the transmitter through physical-fingerprinting of controller area network , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).

[23]  Igor Kotenko,et al.  Integrated Approach to Provide Security of Cyber-Physical Systems Based on Microcontrollers , 2018 .

[24]  Kwok-Yan Lam,et al.  Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things , 2018, Proceedings of the IEEE.

[25]  Rasim M. Alguliyev,et al.  Cyber-physical systems and their security issues , 2018, Comput. Ind..

[26]  George Loukas,et al.  A taxonomy of cyber-physical threats and impact in the smart home , 2018, Comput. Secur..

[27]  Nilanjan Dey,et al.  Medical cyber-physical systems: A survey , 2018, Journal of Medical Systems.

[28]  Michael Huth,et al.  Future Developments in Cyber Risk Assessment for the Internet of Things , 2018, Comput. Ind..

[29]  Wei Ni,et al.  Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[30]  Dmitrii Zegzhda,et al.  Advanced Production Technologies Security in the Era of Digital Transformation , 2019 .

[31]  Stefano Chessa,et al.  Internet of Things for enabling smart environments: A technology-centric perspective , 2019, J. Ambient Intell. Smart Environ..

[32]  Yanyu Li,et al.  Limestone-gypsum wet flue gas desulfurization based on Cyber-Physical System , 2019, 2019 Chinese Control And Decision Conference (CCDC).

[33]  Shuang-Hua Yang,et al.  Safety and security risk assessment in cyber-physical systems , 2019, IET Cyper-Phys. Syst.: Theory & Appl..

[34]  Yannick Chevalier,et al.  Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems , 2019, 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS).

[35]  Olivier Cardin,et al.  Classification of cyber-physical production systems applications: Proposition of an analysis framework , 2018, Comput. Ind..

[36]  Hongcheng Wang,et al.  A Design of Cyber-Physical System Architecture for Smart City , 2020 .

[37]  I. Kulagina,et al.  Modeling the Practice of Aggression in the Socio-Cyber-Physical Environment , 2019 .

[38]  Sotiris Makris,et al.  A cyber physical system (CPS) approach for safe human-robot collaboration in a shared workplace , 2019, Robotics and Computer-Integrated Manufacturing.

[39]  Daphney-Stavroula Zois,et al.  Incorporating Artificial Intelligence into Medical Cyber Physical Systems: A Survey , 2019, Connected Health in Smart Cities.

[40]  Lihui Wang,et al.  Remote human–robot collaboration: A cyber–physical system application for hazard manufacturing environment , 2020 .