A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields

Governments, companies, universities and research institutes are pushing the research and development of cyber-physical systems (CPS). However, the development of cyberphysical systems is constrained by security factors. According to this situation, this paper put forward a CPS security model, which contains security objectives, basic theories, simulation, and CPS framework, summarizes security attacks to cyber-physical systems as a theoretical reference for the study of cyber–physical systems and to provide useful security defense. Based on the cyber-physical systems framework, the paper classifies attacks for the execution layer, transport layer and control layer. The execution layer attacks include security attacks for nodes such as sensors and actuators. Transport layer attacks include data leakage or damage and security issues during massive data integration. Control layer attacks include the loss of user privacy, incorrect access control policies and inadequate security standards. This paper gives security defenses and recommendations for all types of security attacks. Finally, this paper introduces categorizations of CPS application fields and explores their relationships.

[1]  M. Govindarasu,et al.  Cyber vulnerability disclosure policies for the smart grid , 2012, 2012 IEEE Power and Energy Society General Meeting.

[2]  Kaiyu Wan,et al.  Dependable Context-Sensitive Services in Cyber Physical Systems , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[3]  Sandeep K. S. Gupta,et al.  Cyber Physical Security Solutions for Pervasive Health Monitoring Systems , 2012 .

[4]  Paulo Tabuada,et al.  Towards synthesis of platform-aware attack-resilient control systems: extended abstract , 2013, HiCoNS '13.

[5]  Yuan Xue,et al.  Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach , 2012, 2012 5th International Symposium on Resilient Control Systems.

[6]  G. Manimaran,et al.  Cybersecurity for electric power control and automation systems , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.

[7]  R. Poovendran,et al.  Cyber-physical integration in future aviation information systems , 2012, 2012 IEEE/AIAA 31st Digital Avionics Systems Conference (DASC).

[8]  Aditya Ashok,et al.  Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.

[9]  Insup Lee,et al.  Challenges and Research Directions in Medical Cyber–Physical Systems , 2012, Proceedings of the IEEE.

[10]  Insup Lee,et al.  Model-Driven Safety Analysis of Closed-Loop Medical Systems , 2014, IEEE Transactions on Industrial Informatics.

[11]  Goro Fujita,et al.  Power system stabilizing control using variable series capacitor based on H/sup /spl infin// control theory considering AVR and governor , 1997, CCECE '97. Canadian Conference on Electrical and Computer Engineering. Engineering Innovation: Voyage of Discovery. Conference Proceedings.

[12]  Wang Chunlei,et al.  Dynamically validate network security based on adaptive control theory , 2013 .

[13]  Sandeep K. S. Gupta,et al.  Toward autonomous vehicle safety verification from mobile cyber-physical systems perspective , 2011, SIGBED.

[14]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[15]  Liviu Miclea,et al.  About dependability in cyber-physical systems , 2011, 2011 9th East-West Design & Test Symposium (EWDTS).

[16]  Yuan Xue,et al.  Taxonomy for description of cross-domain attacks on CPS , 2013, HiCoNS '13.

[17]  Aditya Ashok,et al.  A cyber-physical security testbed for smart grid: system architecture and studies , 2011, CSIIRW '11.

[18]  Insup Lee,et al.  Security and Interoperable-Medical-Device Systems, Part 1 , 2012, IEEE Security & Privacy.

[19]  Radha Poovendran,et al.  AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.

[20]  Bruce M. McMillin,et al.  Verifying Noninterference in a Cyber-Physical System The Advanced Electric Power Grid , 2007 .

[21]  Zhen Li,et al.  HARDWARE-IN-THE-LOOP SIMULATION , 2004 .

[22]  Ángel Zufía,et al.  Mathematical Simulation and Controlled Cooling in an EDC Conveyor of a Wire Rod Rolling Mill , 2001 .

[23]  David Woods,et al.  Resilience Engineering: Concepts and Precepts , 2006 .

[24]  Francesco Bullo,et al.  Secure control systems: a control-theoretic approach to cyber-physical security , 2012 .

[25]  Zdzislaw Bubnicki,et al.  Modern Control Theory , 2005 .

[26]  Edward A. Lee Computing Foundations and Practice for Cyber- Physical Systems: A Preliminary Report , 2007 .

[27]  Ayan Banerjee,et al.  Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber–Physical Systems , 2012, Proceedings of the IEEE.

[28]  Goro Shirai,et al.  Power System Stabilizing Control Using Variable Series Capacitor Based on H_∞ Control Theory Considering AVR and GOV , 1996 .

[29]  Edward A. Lee Cyber-physical Systems -are Computing Foundations Adequate? Position Paper for Nsf Workshop on Cyber-physical Systems: Research Motivation, Techniques and Roadmap , 1998 .

[30]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[31]  Al-Sakib Khan Pathan,et al.  A survey on SQL injection: Vulnerabilities, attacks, and prevention techniques , 2011, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE).

[32]  Krishna K. Venkatasubramanian,et al.  Security solutions for cyber-physical systems , 2009 .

[33]  Insup Lee,et al.  Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification , 2012, IEEE Security & Privacy.

[34]  F. Bullo,et al.  A graph-theoretical characterization of power network vulnerabilities , 2011, Proceedings of the 2011 American Control Conference.

[35]  G. Manimaran,et al.  PENET: A practical method and tool for integrated modeling of security attacks and countermeasures , 2009, Comput. Secur..

[36]  Ayan Banerjee,et al.  Towards modeling and analysis of cyber-physical medical systems , 2011, ISABEL '11.

[37]  Ayan Banerjee,et al.  Hybrid simulator for cyber-physical energy systems , 2013, 2013 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES).

[38]  Ruggero Carli,et al.  Distributed estimation via iterative projections with application to power network monitoring , 2011, Autom..

[39]  Zhihao Jiang,et al.  Cyber–Physical Modeling of Implantable Cardiac Medical Devices , 2012, Proceedings of the IEEE.

[40]  Tansu Alpcan,et al.  Network Security , 2010 .

[41]  Lui Sha,et al.  A framework for the safe interoperability of medical devices in the presence of network failures , 2010, ICCPS '10.

[42]  Chen-Ching Liu,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees , 2007, 2007 IEEE Power Engineering Society General Meeting.

[43]  Edward A. Lee,et al.  Addressing Modeling Challenges in Cyber-Physical Systems , 2011 .

[44]  Bernhard Plattner,et al.  Network resilience: a systematic approach , 2011, IEEE Communications Magazine.

[45]  G. Manimaran,et al.  Application of Sensor Network for Secure Electric Energy Infrastructure , 2007, IEEE Transactions on Power Delivery.

[46]  Bjarne E. Helvik,et al.  A survey of resilience differentiation frameworks in communication networks , 2007, IEEE Communications Surveys & Tutorials.

[47]  S. Shankar Sastry,et al.  A Taxonomy of Cyber Attacks on SCADA Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[48]  G. Manimaran,et al.  Data integrity attacks and their impacts on SCADA control system , 2010, IEEE PES General Meeting.

[49]  Adrian Perrig,et al.  Don't Sweat Your Privacy Using Humidity to Detect Human Presence , 2007 .

[50]  Lu Feng,et al.  Assuring the safety of on-demand medical cyber-physical systems , 2013, 2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA).

[51]  Yue Zhao,et al.  Fundamental limits of cyber-physical security in smart power grids , 2013, 52nd IEEE Conference on Decision and Control.

[52]  G. Manimaran,et al.  Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[53]  A. Bouscayrol,et al.  Different types of Hardware-In-the-Loop simulation for electric drives , 2008, 2008 IEEE International Symposium on Industrial Electronics.

[54]  Xiaoqing Frank Liu,et al.  Verifying Noninterference in a Cyber-Physical System The Advanced Electric Power Grid , 2007, Seventh International Conference on Quality Software (QSIC 2007).

[55]  Chen-Ching Liu,et al.  Cyber-vulnerability of power grid monitoring and control systems , 2008, CSIIRW '08.

[56]  Andrew J. Kornecki,et al.  Studying interrelationships of safety and security for software assurance in cyber-physical systems: Approach based on bayesian belief networks , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[57]  Roger B. Myerson,et al.  Game theory - Analysis of Conflict , 1991 .

[58]  Soo Dong Kim,et al.  A Service-Based Approach to Designing Cyber Physical Systems , 2010, 2010 IEEE/ACIS 9th International Conference on Computer and Information Science.

[59]  Neeraj Suri,et al.  A control theory approach for analyzing the effects of data errors in safety-critical control systems , 2002, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings..

[60]  Rolf Isermann,et al.  Hardware-in-the-loop simulation for the design and testing of engine-control systems , 1998 .

[61]  K. Venkatasubramanian,et al.  Ayushman: a secure, usable pervasive health monitoring system , 2008, HealthNet '08.

[62]  Florian Dörfler,et al.  Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.

[63]  Maciej J. Zawodniok,et al.  Stability of a Cyber-physical Smart Grid System Using Cooperating Invariants , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference.

[64]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[65]  Ayan Banerjee,et al.  Model Based Safety Analysis and Verification of Cyber-Physical Systems , 2012 .

[66]  Ayan Banerjee,et al.  Spatio-temporal hybrid automata for safe cyber-physical systems: A medical case study , 2013, 2013 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).

[67]  Toshiaki Itoh,et al.  Future needs for control theory in industry-report of the control technology survey in Japanese industry , 1999, IEEE Trans. Control. Syst. Technol..

[68]  G. Manimaran,et al.  Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.

[69]  Jong-Ho Lee,et al.  Detection of replay attacks in smart grid systems , 2013, 2013 International Conference on Computing, Management and Telecommunications (ComManTel).

[70]  Michael Steurer,et al.  A Megawatt-Scale Power Hardware-in-the-Loop Simulation Setup for Motor Drives , 2010, IEEE Transactions on Industrial Electronics.

[71]  Quanyan Zhu,et al.  Game-theoretic methods for security and resilience in cyber-physical systems , 2013 .

[72]  Suman Nath,et al.  On Bounding Data Stream Privacy in Distributed Cyber-physical Systems , 2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing.

[73]  Radha Poovendran,et al.  Aviation Cyber–Physical Systems: Foundations for Future Aircraft and Air Transport , 2013, Proceedings of the IEEE.

[74]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[75]  Sahra Sedigh Sarvestani,et al.  Integrated Cyber-Physical Fault Injection for Reliability Analysis of the Smart Grid , 2010, SAFECOMP.

[76]  Siddharth Sridhar,et al.  Development of the PowerCyber SCADA security testbed , 2010, CSIIRW '10.