A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions

Recently, Cyber Physical System (CPS) is one of the core technologies for realizing Internet of Things (IoT). The CPS is a new paradigm that seeks to converge the physical and cyber worlds in which we live. However, the CPS suffers from certain CPS issues that could directly threaten our lives, while the CPS environment, including its various layers, is related to on-the-spot threats, making it necessary to study CPS security. Therefore, a survey-based in-depth understanding of the vulnerabilities, threats, and attacks is required of CPS security and privacy for IoT. In this paper, we analyze security issues, threats, and solutions for IoT-CPS, and evaluate the existing researches. The CPS raises a number challenges through current security markets and security issues. The study also addresses the CPS vulnerabilities and attacks and derives challenges. Finally, we recommend solutions for each system of CPS security threats, and discuss ways of resolving potential future issues.

[1]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[2]  Nikil D. Dutt,et al.  Resilient dependable cyber-physical systems: a middleware perspective , 2011, Journal of Internet Services and Applications.

[3]  M. Shalini,et al.  Security Issues And Challenges For Cyber Physical System , 2018 .

[4]  Yier Jin,et al.  Hardware-software collaboration for secure coexistence with kernel extensions , 2014, SIAP.

[5]  Kwok-Yan Lam,et al.  Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things , 2018, Proceedings of the IEEE.

[6]  Insup Lee,et al.  Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.

[7]  Jong Hyuk Park,et al.  DistArch-SCNet: Blockchain-Based Distributed Architecture with Li-Fi Communication for a Scalable Smart City Network , 2018, IEEE Consumer Electronics Magazine.

[8]  Yang Li,et al.  A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields , 2015 .

[9]  Qaisar Shafi,et al.  Cyber Physical Systems Security: A Brief Survey , 2012, 2012 12th International Conference on Computational Science and Its Applications.

[10]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[11]  Jong Hyuk Park,et al.  FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing , 2016 .

[12]  S. Shankar Sastry,et al.  A Taxonomy of Cyber Attacks on SCADA Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[13]  Beibei Li,et al.  Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system , 2017, J. Parallel Distributed Comput..

[14]  Eduardo Jacob,et al.  Software-defined networking in cyber-physical systems: A survey , 2017, Comput. Electr. Eng..

[15]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[16]  Young-Sik Jeong,et al.  DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.

[17]  Jameela Al-Jaroodi,et al.  Software Engineering Issues for Cyber-Physical Systems , 2016, 2016 IEEE International Conference on Smart Computing (SMARTCOMP).

[18]  Edward Griffor,et al.  Framework for Cyber-Physical Systems: Volume 1, Overview , 2017 .

[19]  Michail Maniatakos,et al.  Cyber-physical systems: A security perspective , 2015, 2015 20th IEEE European Test Symposium (ETS).

[20]  Gaurav Gupta Frequency Based Detection Algorithm of Wormhole Attack in WSNs , 2015 .

[21]  Lihui Wang,et al.  Current status and advancement of cyber-physical systems in manufacturing , 2015 .

[22]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[23]  Klaus-Dieter Thoben,et al.  A methodology to develop collaborative robotic cyber physical systems for production environments , 2016, Logist. Res..

[24]  Liviu Miclea,et al.  Secure and efficient communication in cyber-physical systems through cryptography and complex event processing , 2016, 2016 International Conference on Communications (COMM).

[25]  R. Poovendran,et al.  Cyber-physical system framework for future aircraft and air traffic control , 2012, 2012 IEEE Aerospace Conference.

[26]  Jay Lee,et al.  A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .

[27]  Wei Xu,et al.  Toward worm detection in online social networks , 2010, ACSAC '10.

[28]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[29]  Marina Thottan,et al.  Resilient End-to-End Message Protection for Cyber-Physical System Communications , 2018, IEEE Transactions on Smart Grid.

[30]  Jong Hyuk Park,et al.  Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City , 2017, J. Inf. Process. Syst..

[31]  Suku Nair,et al.  Cyber-physical security using system-level PUFs , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[32]  Edward A. Lee,et al.  Introduction to Embedded Systems - A Cyber-Physical Systems Approach , 2013 .

[33]  Zhang,et al.  Security Architecture on the Trusting Internet of Things , 2011 .

[34]  Luís Veiga,et al.  SD-CPS: Taming the challenges of Cyber-Physical Systems with a Software-Defined approach , 2017, 2017 Fourth International Conference on Software Defined Systems (SDS).

[35]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[36]  Yuan Xue,et al.  A language for describing attacks on cyber-physical systems , 2015, Int. J. Crit. Infrastructure Prot..

[37]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[38]  Ramón Alcarria,et al.  Predictive algorithms for mobility and device lifecycle management in Cyber-Physical Systems , 2016, EURASIP J. Wirel. Commun. Netw..

[39]  Meikang Qiu,et al.  Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data , 2017, IEEE Systems Journal.

[40]  Jong Hyuk Park,et al.  CF-CloudOrch: container fog node-based cloud orchestration for IoT networks , 2018, The Journal of Supercomputing.

[41]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[42]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[43]  Sylvain Guilley,et al.  Fault Analysis Attack on an FPGA AES Implementation , 2008, 2008 New Technologies, Mobility and Security.

[44]  Jong Hyuk Park,et al.  Social network security: Issues, challenges, threats, and solutions , 2017, Inf. Sci..

[45]  Pankaj Rohatgi,et al.  Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.

[46]  Qusay H. Mahmoud,et al.  Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..

[47]  Daniela Oliveira,et al.  Extended Abstract : Trustworthy SoC Architecture with On-Demand Security Policies and HW-SW Cooperation , 2014 .

[48]  Jong Hyuk Park,et al.  XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs , 2017, J. Inf. Process. Syst..

[49]  Jiafu Wan,et al.  A survey of Cyber-Physical Systems , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).

[50]  Tianbo Lu,et al.  Cyber-physical System Risk Assessment , 2013, 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[51]  Rina Bhattacharya A COMPARATIVE STUDY OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS , 2013 .

[52]  Piyush Maheshwari,et al.  Security Issues of Cyber Physical System: A Review , 2016 .

[53]  A. Pirzada,et al.  Circumventing Sinkholes and Wormholes in Wireless Sensor Networks , 2005 .

[54]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[55]  Wei He,et al.  Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System , 2016, CPSS@AsiaCCS.

[56]  Muhammad Khurram Khan,et al.  Design of sinkhole node detection mechanism for hierarchical wireless sensor networks , 2016, Secur. Commun. Networks.