An Analysis of Cyber Physical System Security Theories

Governments, companies, universities and research institutes are pushing the research and development of cyber-physical systems (CPS). However, the development of cyber-physical systems is constrained by security factors. According to this situation, this paper describes CPS security properties and basic theories, summarizes security attacks to cyber-physical systems as a theoretical reference for the study of cyber - physical systems and to provide useful security defense.

[1]  David Woods,et al.  Resilience Engineering: Concepts and Precepts , 2006 .

[2]  Francesco Bullo,et al.  Secure control systems: a control-theoretic approach to cyber-physical security , 2012 .

[3]  Goro Fujita,et al.  Power system stabilizing control using variable series capacitor based on H/sup /spl infin// control theory considering AVR and governor , 1997, CCECE '97. Canadian Conference on Electrical and Computer Engineering. Engineering Innovation: Voyage of Discovery. Conference Proceedings.

[4]  Bernhard Plattner,et al.  Network resilience: a systematic approach , 2011, IEEE Communications Magazine.

[5]  Ayan Banerjee,et al.  Model Based Safety Analysis and Verification of Cyber-Physical Systems , 2012 .

[6]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[7]  Andrew J. Kornecki,et al.  Studying interrelationships of safety and security for software assurance in cyber-physical systems: Approach based on bayesian belief networks , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[8]  Krishna K. Venkatasubramanian,et al.  Security solutions for cyber-physical systems , 2009 .

[9]  Suman Nath,et al.  On Bounding Data Stream Privacy in Distributed Cyber-physical Systems , 2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing.

[10]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[11]  Toshiaki Itoh,et al.  Future needs for control theory in industry-report of the control technology survey in Japanese industry , 1999, IEEE Trans. Control. Syst. Technol..

[12]  Adrian Perrig,et al.  Don't Sweat Your Privacy Using Humidity to Detect Human Presence , 2007 .

[13]  Neeraj Suri,et al.  A control theory approach for analyzing the effects of data errors in safety-critical control systems , 2002, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings..

[14]  Bjarne E. Helvik,et al.  A survey of resilience differentiation frameworks in communication networks , 2007, IEEE Communications Surveys & Tutorials.

[15]  Sandeep K. S. Gupta,et al.  Cyber Physical Security Solutions for Pervasive Health Monitoring Systems , 2012 .