Security of Cyber Physical System

Cyber Physical System (CPS), which is based on the environment perception, combines computing, communications, and control processes effectively. Through the interaction and the feedback loop between physical space and cyber space, it implements the function of real-time sensing and dynamic control. The view of this paper will firstly describe the structure of CPS and its security issues in industry applications. Then it explains the security threats and defines the security goal, comprehensively analyses the key technologies to solve the system’s security issues from the perspective of system’s protection, detection and resilience, and finally expects the development of cyber physical system’s security.

[1]  Wenye Wang,et al.  Greenbench: A benchmark for observing power grid vulnerability under data-centric threats , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[2]  Ing-Ray Chen,et al.  Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[3]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[4]  Timothy W. Finin,et al.  CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies , 2011, 2011 IEEE International Symposium on Policies for Distributed Systems and Networks.

[5]  David K. Y. Yau,et al.  Impact of integrity attacks on real-time pricing in smart grids , 2013, CCS.

[6]  Steven Tom,et al.  Recommended Practice for Patch Management of Control Systems , 2008 .

[7]  Rosalind W. Picard,et al.  Non-contact, automated cardiac pulse measurements using video imaging and blind source separation , 2022 .

[8]  Min Song,et al.  Detecting Compromised Nodes in Wireless Sensor Networks , 2007 .

[9]  William H. Sanders,et al.  Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[10]  Sangkyum Kim,et al.  Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems , 2010, 2010 IEEE International Conference on Data Mining.

[11]  Frank Mueller,et al.  Time-based intrusion detection in cyber-physical systems , 2010, ICCPS '10.

[12]  Vladimir Oleshchuk,et al.  Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.

[13]  Saurabh Amin,et al.  In quest of benchmarking security risks to cyber-physical systems , 2013, IEEE Network.

[14]  Farinaz Koushanfar,et al.  Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.

[15]  Yuan Qi,et al.  Minimizing private data disclosures in the smart grid , 2012, CCS '12.

[16]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[17]  Xi Fang,et al.  Truthful incentive mechanisms for k-anonymity location privacy , 2013, 2013 Proceedings IEEE INFOCOM.

[18]  Qing Wang,et al.  Security threats and measures for the cyber-physical systems , 2013 .

[19]  Min Wu,et al.  How secure are power network signature based time stamps? , 2012, CCS.